By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
Science Briefing
  • Medicine
  • Biology
  • Engineering
  • Environment
  • More
    • Dentistry
    • Chemistry
    • Physics
    • Agriculture
    • Business
    • Computer Science
    • Energy
    • Materials Science
    • Mathematics
    • Politics
    • Social Sciences
Notification
  • Home
  • My Feed
  • SubscribeNow
  • My Interests
  • My Saves
  • History
  • SurveysNew
Personalize
Science BriefingScience Briefing
Font ResizerAa
  • Home
  • My Feed
  • SubscribeNow
  • My Interests
  • My Saves
  • History
  • SurveysNew
Search
  • Quick Access
    • Home
    • Contact Us
    • Blog Index
    • History
    • My Saves
    • My Interests
    • My Feed
  • Categories
    • Business
    • Politics
    • Medicine
    • Biology

Top Stories

Explore the latest updated news!

This week’s Engineering Key Highlights

A simpler path to the pleura: rethinking pneumothorax in thoracoscopy

The Immunological Crossroads: How Sepsis Reshapes Host Defense and Anesthetic Management

Stay Connected

Find us on socials
248.1KFollowersLike
61.1KFollowersFollow
165KSubscribersSubscribe
Made by ThemeRuby using the Foxiz theme. Powered by WordPress

Home - Computer Science - A new twist on white-box AES: hide secrets in plain lookup tables

Computer Science

A new twist on white-box AES: hide secrets in plain lookup tables

Last updated: January 25, 2026 8:47 pm
By
Science Briefing
ByScience Briefing
Science Communicator
Instant, tailored science briefings — personalized and easy to understand. Try 30 days free.
Follow:
No Comments
Share
SHARE

A new twist on white-box AES: hide secrets in plain lookup tables

This paper targets a hard deployment reality for symmetric cryptography: white-box settings where attackers can inspect and tamper with the implementation. The authors propose a protection strategy for substitution–permutation network (SPN) ciphers (including AES) that injects additional secret components into lookup tables to expand and substantially alter internal encryption states, while keeping the produced ciphertext essentially unchanged and preserving standard decryption with only simple extra operations. They report security analysis arguing resistance to known and unknown white-box attacks, and experimental results indicating the scheme runs efficiently across platforms—suggesting a potentially more durable building block for real-world white-box encryption deployments.

Why it might matter to you:
If you build or evaluate cryptographic protections for exposed edge/IoT devices, this is a concrete design pattern for hardening SPN implementations when the adversary can see and control the runtime. It also offers a testable research target: verifying whether the “ciphertext unchanged, internals transformed” approach measurably improves robustness under modern white-box threat models.


Source →


As we continue to impprove, your feedback means a lot to us.

- Advertisement -


Feedback

Stay curious. Stay informed — with
Science Briefing.

Share This Article
Facebook Flipboard Pinterest Whatsapp Whatsapp LinkedIn Tumblr Reddit Telegram Threads Bluesky Email Copy Link Print
Share
ByScience Briefing
Science Communicator
Follow:
Instant, tailored science briefings — personalized and easy to understand. Try 30 days free.
Previous Article The Fairness Imperative in the Solar Revolution
Next Article image Libevitug approved in China as first-in-class treatment for hepatitis D
Leave a Comment Leave a Comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Related Stories

Uncover the stories that related to the post!

LLMs Outperform Specialized Models in Coreference Resolution

Auditing the Invisible Shield: A New Framework for Verifying Differential Privacy in Databases

A New Twist on 3D Vision: Curvature Guides the Way for Precise Camera Localization

A New Benchmark for Metaphor in Multilingual AI

Can AI Truly See Science? A New Benchmark Tests Large Multimodal Models

The Cognitive Leap: How Next-Generation Semantic Communication is Powering the Digital Twin World

A Unified Framework to Sharpen Deep Learning’s Edge

The Formal Grammar of Tokenization: Unifying BPE and WordPiece

Show More

Science Briefing delivers personalized, reliable summaries of new scientific papers—tailored to your field and interests—so you can stay informed without doing the heavy reading.

Science Briefing
  • Categories:
  • Medicine
  • Biology
  • Gastroenterology
  • Social Sciences
  • Surgery
  • Natural Language Processing
  • Engineering
  • Cell Biology
  • Chemistry
  • Genetics

Quick Links

  • My Feed
  • My Interests
  • History
  • My Saves

About US

  • Adverts
  • Our Jobs
  • Term of Use

ScienceBriefing.com, All rights reserved.

Personalize you Briefings
To Receive Instant, personalized science updates—only on the discoveries that matter to you.
Please enable JavaScript in your browser to complete this form.
Loading
Zero Spam, Cancel, Upgrade or downgrade anytime!
Welcome Back!

Sign in to your account

Username or Email Address
Password

Lost your password?