{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T18:19:12Z","timestamp":1761675552280},"publisher-location":"Berlin, Heidelberg","reference-count":14,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540773597"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-77360-3_18","type":"book-chapter","created":{"date-parts":[[2007,12,1]],"date-time":"2007-12-01T08:04:18Z","timestamp":1196496258000},"page":"278-295","source":"Crossref","is-referenced-by-count":51,"title":["Cryptanalysis of White Box DES Implementations"],"prefix":"10.1007","author":[{"given":"Louis","family":"Goubin","sequence":"first","affiliation":[]},{"given":"Jean-Michel","family":"Masereel","sequence":"additional","affiliation":[]},{"given":"Micha\u00ebl","family":"Quisquater","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"18_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/3-540-44647-8_1","volume-title":"CRYPTO 2001","author":"B. Barak","year":"2001","unstructured":"Barak, B., Goldreich, O., Impagliazzo, R., Rudich, S., Sahai, A., Vadhan, S.P., Yang, K.: On the (im)possibility of obfuscating programs. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol.\u00a02139, pp. 1\u201318. Springer, Heidelberg (2001)"},{"key":"18_CR2","unstructured":"Billet, O.: Cryptologie Multivariable Ph.D. thesis University of Versailles (December 2005)"},{"key":"18_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"227","DOI":"10.1007\/978-3-540-30564-4_16","volume-title":"Selected Areas in Cryptography","author":"O. Billet","year":"2004","unstructured":"Billet, O., Gilbert, H., Ech-Chatbi, C.: Cryptanalysis of a white box AES implementation. In: Handschuh, H., Hasan, M.A. (eds.) SAC 2004. LNCS, vol.\u00a03357, pp. 227\u2013240. Springer, Heidelberg (2004)"},{"key":"18_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"250","DOI":"10.1007\/3-540-36492-7_17","volume-title":"Selected Areas in Cryptography","author":"S. Chow","year":"2003","unstructured":"Chow, S., Eisen, P., Johnson, H., van Oorschot, P.: White-box cryptography and an AES implementation. In: Nyberg, K., Heys, H.M. (eds.) SAC 2002. LNCS, vol.\u00a02595, pp. 250\u2013270. Springer, Heidelberg (2003)"},{"key":"18_CR5","series-title":"Lecture Notes in Computer Science","first-page":"1","volume-title":"Digital Rights Management","author":"S. Chow","year":"2003","unstructured":"Chow, S., Johnson, H., van Oorschot, P., Eisen, P.: A white-box DES implementation for DRM applications. In: Feigenbaum, J. (ed.) DRM 2002. LNCS, vol.\u00a02696, pp. 1\u201315. Springer, Heidelberg (2003)"},{"key":"18_CR6","unstructured":"Jacob, M., Boneh, D., Felten, E.: Attacking an obfuscated cipher by injecting faults. In: Proceedings 2002 ACM Workshop on Digital Rights Management, November 18, 2002, Washington DC, USA (2002)"},{"key":"18_CR7","doi-asserted-by":"crossref","unstructured":"Link, H.E., Neumann, W.D.: Clarifying obfuscation: Improving the security of white-box encoding (2004), http:\/\/eprint.iacr.org\/","DOI":"10.1109\/ITCC.2005.100"},{"key":"18_CR8","doi-asserted-by":"crossref","unstructured":"Patarin, J., Goubin, L.: Asymmetric cryptography with S-boxes. In: Proc. 1st International Information and Communications Security Conference, pp. 369\u2013380 (1997)","DOI":"10.1007\/BFb0028492"},{"key":"18_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"184","DOI":"10.1007\/BFb0054126","volume-title":"EUROCRYPT 1998","author":"J. Patarin","year":"1998","unstructured":"Patarin, J., Goubin, L., Courtois, N.: Improved Algorithms for Isomorphisms of Polynomials. In: Nyberg, K. (ed.) EUROCRYPT 1998. LNCS, vol.\u00a01403, pp. 184\u2013200. Springer, Heidelberg (1998)"},{"key":"18_CR10","unstructured":"http:\/\/www.itl.nist.gov\/fipspubs\/fip46-2.htm"},{"key":"18_CR11","unstructured":"Wyseur, B., Michiels, W., Gorissen, P., Preneel, B.: Cryptanalysis of White-Box DES Implementations with Arbitrary External Encodings. Cryptology ePrint Archive, Report 2007\/104 (2007), http:\/\/eprint.iacr.org\/"},{"key":"18_CR12","unstructured":"http:\/\/www.cloakware.com"},{"key":"18_CR13","unstructured":"http:\/\/www.retrologic.com"},{"key":"18_CR14","unstructured":"http:\/\/www.yworks.com\/en\/products_yguard_about.htm"}],"container-title":["Lecture Notes in Computer Science","Selected Areas in Cryptography"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-77360-3_18.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T11:09:30Z","timestamp":1619521770000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-77360-3_18"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540773597"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-77360-3_18","relation":{},"subject":[]}}