{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,6]],"date-time":"2026-04-06T10:30:14Z","timestamp":1775471414730,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":25,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540006220","type":"print"},{"value":"9783540364924","type":"electronic"}],"license":[{"start":{"date-parts":[[2003,1,1]],"date-time":"2003-01-01T00:00:00Z","timestamp":1041379200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2003]]},"DOI":"10.1007\/3-540-36492-7_17","type":"book-chapter","created":{"date-parts":[[2007,10,23]],"date-time":"2007-10-23T23:36:10Z","timestamp":1193182570000},"page":"250-270","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":175,"title":["White-Box Cryptography and an AES Implementation"],"prefix":"10.1007","author":[{"given":"Stanley","family":"Chow","sequence":"first","affiliation":[]},{"given":"Philip","family":"Eisen","sequence":"additional","affiliation":[]},{"given":"Harold","family":"Johnson","sequence":"additional","affiliation":[]},{"given":"Paul C.","family":"Van Oorschot","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2003,2,17]]},"reference":[{"key":"17_CR1","doi-asserted-by":"crossref","unstructured":"J. Algesheimer, C. Cachin, J. Camenisch, G. Karjoth, Cryptographic Security for Mobile Code, pp. 2\u201311 in Proceedings of the 2001 ieee Symposium on Security and Privacy, May 2001.","DOI":"10.1109\/SECPRI.2001.924283"},{"key":"17_CR2","doi-asserted-by":"crossref","unstructured":"R.J. Anderson, M.G. Kuhn, Low Cost Attacks on Tamper-Resistant Devices, pp. 125\u2013136, 5th International Workshop on Security Protocols (lncs 1361), Springer 1997.","DOI":"10.1007\/BFb0028165"},{"key":"17_CR3","doi-asserted-by":"crossref","unstructured":"B. Barak, O. Goldreich, R. Impagliazzo, S. Rudich, A. Sahai, S. Vadhan, K. Yang, On the (Im)possibility of Obfuscating Programs, pp. 1\u201318, Advances in Cryptology-Crypto 2001 (lncs 2139), Springer-Verlag, 2001.","DOI":"10.1007\/3-540-44647-8_1"},{"key":"17_CR4","doi-asserted-by":"publisher","first-page":"513","DOI":"10.1007\/BFb0052259","volume-title":"Advances in Cryptology \u2014 CRYPTO '97","author":"Eli Biham","year":"1997","unstructured":"E. Biham, A. Shamir, Differential Fault Analysis of Secret Key Cryptosystems, pp. 513\u2013525, Advances in Cryptology-Crypto\u2019 97 (lncs 1294), Springer-Verlag, 1997. Revised: Technion-C.S. Dept.-Technical Report CS0910-revised, 1997."},{"key":"17_CR5","unstructured":"E. Biham, A. Shamir, Power Analysis of the Key Scheduling of the aes Candidates, presented at the 2nd aes Candidate Conference, Rome, Mar. 22-23 1999."},{"issue":"2","key":"17_CR6","doi-asserted-by":"publisher","first-page":"101","DOI":"10.1007\/s001450010016","volume":"14","author":"D. Boneh","year":"2001","unstructured":"D. Boneh, R.A. DeMillo, R.J. Lipton, On the Importance of Eliminating Errors in Cryptographic Computations, J. Cryptology 14(2), pp. 101\u2013119, 2001.","journal-title":"J. Cryptology"},{"key":"17_CR7","unstructured":"S. Chari, C. Jutla, J.R. Rao, P. Rohatgi, A Cautionary Note Regarding Evaluation of aes Candidates on Smart-Cards, presented at the Second aes Candidate Conference, Rome, Italy, March 22-23, 1999."},{"key":"17_CR8","unstructured":"S. Chow, P. Eisen, H. Johnson, P.C. van Oorschot, A White-Box des Implementation for drm Applications, Proceedings of drm 2002-2nd acm Workshop on Digital Rights Management, Nov. 18, 2002 (Springer-Verlag lncs, to appear)."},{"key":"17_CR9","doi-asserted-by":"crossref","unstructured":"S. Chow, Y. Gu, H. Johnson, V.A. Zakharov, An Approach to the Obfuscation of Control-Flow of Sequential Computer Programs, pp. 144\u2013155, Proceedings of isc 2001-Information Security, 4th International Conference (Malaga, Spain, 1-3 October 2001), lncs 2200, Springer-Verlag, 2001.","DOI":"10.1007\/3-540-45439-X_10"},{"issue":"6","key":"17_CR10","doi-asserted-by":"publisher","first-page":"565","DOI":"10.1016\/0167-4048(93)90054-9","volume":"12","author":"F. Cohen","year":"1993","unstructured":"F. Cohen, Operating System Protection Through Program Evolution, Computers and Security 12(6), 1 Oct. 1993, pp. 565\u2013584.","journal-title":"Computers and Security"},{"key":"17_CR11","unstructured":"J. Daemen, V. Rijmen, Resistance Against Implementation Attacks: A Comparative Study of the aes proposals, presented at the Second aes Candidate Conference, Rome, Italy, March 22-23, 1999."},{"key":"17_CR12","doi-asserted-by":"crossref","unstructured":"J. Daemen, M. Peeters, G. [van Assche, Bitslice Ciphers and Power Analysis Attacks, pp. 134\u2013149, 7th International Workshop on Fast Software Encryption-fse 2000 (lncs 1978), Springer-Verlag, 2000.","DOI":"10.1007\/3-540-44706-7_10"},{"key":"17_CR13","unstructured":"J. Daemen, V. Rijmen, aes Proposal: Rijndael, http:\/\/csrc.nist.gov\/encryption\/aes\/rijndael\/Rijndael_OnlinePDF.pdf , 1999."},{"key":"17_CR14","doi-asserted-by":"crossref","unstructured":"J. Daemen, V. Rijmen, The Design of Rijndael: aes-The Advanced Encryption Standard, Springer, 2001.","DOI":"10.1007\/978-3-662-04722-4"},{"key":"17_CR15","unstructured":"S. Forrest, A. Somayaji, D. H. Ackley, Building Diverse Computer Systems, pp. 67\u201372, Proceedings of the 6th Workshop on Hot Topics in Operating Systems, ieee Computer Society Press, 1997."},{"key":"17_CR16","doi-asserted-by":"crossref","unstructured":"M. Jakobsson, M.K. Reiter, Discouraging Software Piracy Using Software Aging, pp. 1\u201312, Security and Privacy in Digital Rights Management-acm ccs-8 Workshop drm 2001 (lncs 2320), Springer-Verlag, 2002.","DOI":"10.1007\/3-540-47870-1_1"},{"key":"17_CR17","doi-asserted-by":"crossref","unstructured":"P.C. Kocher, Timing Attacks against Implementations of Di.e-Hellman, RSA, DSS, and Other Systems, pp. 104\u2013113, Advances in Cryptology-Crypto\u2019 96 (lncs 1109), Springer-Verlag, 1996.","DOI":"10.1007\/3-540-68697-5_9"},{"key":"17_CR18","doi-asserted-by":"crossref","unstructured":"P. Kocher, J. Jaffe, B. Jun, Differential Power Analysis, pp. 388\u2013397, Advances in Cryptology-Crypto\u2019 99 (lncs 1666), Springer-Verlag, 1999.","DOI":"10.1007\/3-540-48405-1_25"},{"key":"17_CR19","unstructured":"O. K\u00f6mmerling, M.G. Kuhn, Design Principles for Tamper-Resistant Smartcard Processors, pp. 9\u201320, Proceedings of the usenix Workshop on Smartcard Technology (Smartcard\u2019 99), usenix Association, isbn 1-880446-34-0, 1999."},{"issue":"6","key":"17_CR20","doi-asserted-by":"publisher","first-page":"742","DOI":"10.1145\/62959.62969","volume":"31","author":"P. L\u2019Ecuyer","year":"1988","unstructured":"P. L\u2019Ecuyer, Efficient and Portable Combined Random Number Generators, Communications of the acm 31(6), pp. 742\u2013749, 1988.","journal-title":"Communications of the acm"},{"key":"17_CR21","doi-asserted-by":"crossref","unstructured":"T. Sander, C.F. Tschudin, Towards Mobile Cryptography, pp. 215\u2013224, Proceedings of the 1998 ieee Symposium on Security and Privacy.","DOI":"10.1109\/SECPRI.1998.674837"},{"key":"17_CR22","doi-asserted-by":"crossref","unstructured":"T. Sander, C.F. Tschudin, Protecting Mobile Agents Against Malicious Hosts, pp. 44\u201360, Mobile Agent Security (lncs 1419), Springer-Verlag, 1998.","DOI":"10.1007\/3-540-68671-1_4"},{"key":"17_CR23","doi-asserted-by":"crossref","unstructured":"N. van Someren, A. Shamir, Playing Hide and Seek with Keys, pp. 118\u2013124, Financial Cryptography\u2019 99 (lncs 1648), Springer-Verlag, 1999.","DOI":"10.1007\/3-540-48390-X_9"},{"key":"17_CR24","unstructured":"C. Wang, A Security Architecture for Survivability Mechanisms, Doctoral thesis, University of Virginia, October 2000."},{"key":"17_CR25","unstructured":"J. Xiao, Y. Zhou, Generating Large Non-Singular Matrices over an Arbitrary Field with Blocks of Full Rank, Cryptology ePrint Archive ( http:\/\/eprint.iacr.org ), no. 2002\/096."}],"container-title":["Lecture Notes in Computer Science","Selected Areas in Cryptography"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-36492-7_17","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,21]],"date-time":"2025-01-21T21:10:16Z","timestamp":1737493816000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-36492-7_17"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2003]]},"ISBN":["9783540006220","9783540364924"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/3-540-36492-7_17","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2003]]},"assertion":[{"value":"17 February 2003","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}