{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,14]],"date-time":"2026-04-14T16:34:57Z","timestamp":1776184497206,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":12,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540404101","type":"print"},{"value":"9783540449935","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2003]]},"DOI":"10.1007\/978-3-540-44993-5_1","type":"book-chapter","created":{"date-parts":[[2010,6,22]],"date-time":"2010-06-22T19:21:24Z","timestamp":1277234484000},"page":"1-15","source":"Crossref","is-referenced-by-count":119,"title":["A White-Box DES Implementation for DRM Applications"],"prefix":"10.1007","author":[{"given":"Stanley","family":"Chow","sequence":"first","affiliation":[]},{"given":"Phil","family":"Eisen","sequence":"additional","affiliation":[]},{"given":"Harold","family":"Johnson","sequence":"additional","affiliation":[]},{"given":"Paul C.","family":"van Oorschot","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"1_CR1","unstructured":"Aucsmith, D., Graunke, G.: Tamper-Resistant Methods and Apparatus, U.S. Patent No. 5,892,899 (1999)"},{"key":"1_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/3-540-44647-8_1","volume-title":"Advances in Cryptology - CRYPTO 2001","author":"B. Barak","year":"2001","unstructured":"Barak, B., Goldreich, O., Impagliazzo, R., Rudich, S., Sahai, A., Vadhan, S., Yang, K.: On the (Im)possibility of Obfuscating Programs. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol.\u00a02139, pp. 1\u201318. Springer, Heidelberg (2001)"},{"key":"#cr-split#-1_CR3.1","doi-asserted-by":"crossref","unstructured":"Biham, E., Shamir, A.: Differential Fault Analysis of Secret Key Cryptosystems. In: Kaliski Jr., B.S. (ed.) CRYPTO 1997. LNCS, vol.??1294, pp. 513???525. Springer, Heidelberg (1997);","DOI":"10.1007\/BFb0052259"},{"key":"#cr-split#-1_CR3.2","unstructured":"Revised: Technion ??? Computer Science Department ??? Technical Report cs0910-revised (1997)"},{"key":"1_CR4","doi-asserted-by":"crossref","unstructured":"Chow, S., Eisen, P., Johnson, H., van Oorschot, P.C.: White-box cryptography and an AES implementation. In: Nyberg, K., Heys, H.M. (eds.) SAC 2002. LNCS, vol.\u00a02595, pp. 250\u2013270. Springer, Heidelberg (2003) (to appear)","DOI":"10.1007\/3-540-36492-7_17"},{"key":"1_CR5","volume-title":"The Design of Rijndael: AES \u2013 The Advanced Encryption Standard","author":"J. Daemen","year":"2001","unstructured":"Daemen, J., Rijmen, V.: The Design of Rijndael: AES \u2013 The Advanced Encryption Standard. Springer, Heidelberg (2001)"},{"key":"1_CR6","first-page":"77","volume-title":"Linear Groups, with an Exposition of Galois Field Theory","author":"L.E. Dickson","year":"1958","unstructured":"Dickson, L.E.: Linear Groups, with an Exposition of Galois Field Theory, p. 77. Dover Publications, New York (1958)"},{"key":"1_CR7","doi-asserted-by":"crossref","unstructured":"Jacob, M., Boneh, D., Felten, E.: Attacking an obfuscated cipher by injecting faults. In: Feigenbaum, J. (ed.) DRM 2002. LNCS, vol.\u00a02696, pp. 16\u201331. Springer, Heidelberg (2003) (to appear)","DOI":"10.1007\/978-3-540-44993-5_2"},{"key":"1_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/3-540-47870-1_1","volume-title":"Security and Privacy in Digital Rights Management","author":"M. Jakobsson","year":"2002","unstructured":"Jakobsson, M., Reiter, M.K.: Discouraging Software Piracy Using Software Aging. In: Sander, T. (ed.) DRM 2001. LNCS, vol.\u00a02320, pp. 1\u201312. Springer, Heidelberg (2002)"},{"key":"1_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"252","DOI":"10.1007\/3-540-68697-5_20","volume-title":"Advances in Cryptology - CRYPTO \u201996","author":"J. Kilian","year":"1996","unstructured":"Kilian, J., Rogaway, P.: How to protect DES against exhaustive key search. In: Koblitz, N. (ed.) CRYPTO 1996. LNCS, vol.\u00a01109, pp. 252\u2013267. Springer, Heidelberg (1996)"},{"key":"1_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"388","DOI":"10.1007\/3-540-48405-1_25","volume-title":"Advances in Cryptology - CRYPTO \u201999","author":"P. Kocher","year":"1999","unstructured":"Kocher, P., Jaffe, J., Jun, B.: Differential power analysis. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol.\u00a01666, pp. 388\u2013397. Springer, Heidelberg (1999)"},{"key":"1_CR11","unstructured":"Menezes, A.J., van Oorschot, P.C., Vanstone, S.A.: Handbook of Applied Cryptography, pp. 250\u2013259. CRC Press, Boca Raton (2001) (5th printing with corrections), Down-loadable from \n                    \n                      http:\/\/www.cacr.math.uwaterloo.ca\/hac\/"}],"container-title":["Lecture Notes in Computer Science","Digital Rights Management"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-44993-5_1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,3,15]],"date-time":"2019-03-15T01:32:40Z","timestamp":1552613560000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-44993-5_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2003]]},"ISBN":["9783540404101","9783540449935"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-44993-5_1","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2003]]}}}