Abstract Wireless Sensor Networks (WSNs) are often deployed in hostile environments and an adversary canpotentially capture sensor nodes. This is a typical white-box attack context, i.e., the adversary may have total visibility of the implementation of the build-in cryptosystem and full control overits execution platform -- the sensor nodes. Existing encryption algorithms for white-box attack contexts require large memory footprint and hence are not applicable for wireless sensor network ...