{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,3]],"date-time":"2026-03-03T16:06:47Z","timestamp":1772554007844,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":22,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540775348","type":"print"},{"value":"9783540775355","type":"electronic"}],"license":[{"start":{"date-parts":[[2007,1,1]],"date-time":"2007-01-01T00:00:00Z","timestamp":1167609600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2007]]},"DOI":"10.1007\/978-3-540-77535-5_5","type":"book-chapter","created":{"date-parts":[[2008,1,8]],"date-time":"2008-01-08T15:23:47Z","timestamp":1199805827000},"page":"61-75","source":"Crossref","is-referenced-by-count":40,"title":["Information Hiding in Software with Mixed Boolean-Arithmetic Transforms"],"prefix":"10.1007","author":[{"given":"Yongxin","family":"Zhou","sequence":"first","affiliation":[]},{"given":"Alec","family":"Main","sequence":"additional","affiliation":[]},{"given":"Yuan X.","family":"Gu","sequence":"additional","affiliation":[]},{"given":"Harold","family":"Johnson","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"1","key":"5_CR1","doi-asserted-by":"publisher","first-page":"70","DOI":"10.1145\/273865.273901","volume":"45","author":"S. Arora","year":"1998","unstructured":"Arora, S., Safra, S.: Probabilistic checking of proofs: A new characterization of NP. Journal of the ACM\u00a045(1), 70\u2013122 (1998)","journal-title":"Journal of the ACM"},{"key":"5_CR2","unstructured":"Average Case Complexity Forum, http:\/\/www.uncg.edu\/mat\/avg.html"},{"key":"5_CR3","unstructured":"Chow, S., Johnson, H., Gu, Y.X.: Tamper resistant software encoding, US Patent No.\u00a06594761 (2003)"},{"key":"5_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"144","DOI":"10.1007\/3-540-45439-X_10","volume-title":"Information Security","author":"S. Chow","year":"2001","unstructured":"Chow, S., Gu, Y.X., Johnson, H., Zakharov, V.A.: An Approach to the Obfuscation of Control-Flow of Sequential Computer Programs. In: Davida, G.I., Frankel, Y. (eds.) ISC 2001. LNCS, vol.\u00a02200, pp. 144\u2013155. Springer, Heidelberg (2001)"},{"key":"5_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-36492-7_17","volume-title":"Selected Areas in Cryptography","author":"S. Chow","year":"2003","unstructured":"Chow, S., Eisen, P., Johnson, H., van Oorschot, P.C.: White-Box Cryptography and an AES Implementation. In: Nyberg, K., Heys, H.M. (eds.) SAC 2002. LNCS, vol.\u00a02595, Springer, Heidelberg (2003)"},{"key":"5_CR6","doi-asserted-by":"crossref","unstructured":"Collberg, C.S., Thomborson, C.: Watermarking, Tamper-Proofing, and Obfuscation - Tools for Software Protection. IEEE Trans. Software Eng.\u00a028(6) (June 2002)","DOI":"10.1109\/TSE.2002.1027797"},{"key":"5_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"400","DOI":"10.1007\/3-540-36415-3_26","volume-title":"Information Hiding 2002","author":"Y. Chen","year":"2003","unstructured":"Chen, Y., Venkatesan, R., Cary, M., Pang, R., Sinha, S., Jakubowski, M.H.: Oblivious Hashing: A Stealthy Software Integrity Verification Primitive. In: Petitcolas, F.A.P. (ed.) IH 2002. LNCS, vol.\u00a02578, pp. 400\u2013414. Springer, Heidelberg (2003)"},{"key":"5_CR8","unstructured":"Electronic Colloquium on Computational Complexity, http:\/\/eccc.hpi-web.de\/eccc\/ ISSN 1433-8092"},{"key":"5_CR9","volume-title":"Computers and Intractability","author":"M.R. Garey","year":"1979","unstructured":"Garey, M.R., Johnson, D.S.: Computers and Intractability. W.H. Freeman and Company, New York (1979)"},{"key":"5_CR10","unstructured":"Kandanchatha, A.N., Zhou, Y.: System and method for obscuring bit-wise and two\u2019s complement integer computations in software, Canadian patent application 2456644, 2004; US Patent Application 20050166191 (2005)"},{"key":"5_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"248","DOI":"10.1007\/978-3-540-24654-1_18","volume-title":"Selected Areas in Cryptography","author":"A. Klimov","year":"2004","unstructured":"Klimov, A., Shamir, A.: Cryptographic Applications of T-functions. In: Matsui, M., Zuccherato, R.J. (eds.) SAC 2003. LNCS, vol.\u00a03006, pp. 248\u2013261. Springer, Heidelberg (2004)"},{"key":"5_CR12","doi-asserted-by":"crossref","unstructured":"Klimov, A.: Applications of T-functions in Cryptography, PhD Thesis, Weizmann Institute of Science (2004)","DOI":"10.1007\/978-3-540-24654-1_18"},{"issue":"3-4","key":"5_CR13","doi-asserted-by":"publisher","first-page":"287","DOI":"10.1007\/BF01950276","volume":"44","author":"G. Mullen","year":"1984","unstructured":"Mullen, G., Stevens, H.: Polynomial functions (mod m). Acta Mathematica Hungarica\u00a044(3-4), 287\u2013292 (1984)","journal-title":"Acta Mathematica Hungarica"},{"key":"5_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/10958513_1","volume-title":"Information Security","author":"P.C. Oorschot van","year":"2003","unstructured":"van Oorschot, P.C.: Revisiting Software Protection. In: Boyd, C., Mao, W. (eds.) ISC 2003. LNCS, vol.\u00a02851, pp. 1\u201313. Springer, Heidelberg (2003)"},{"key":"5_CR15","doi-asserted-by":"publisher","first-page":"287","DOI":"10.1006\/ffta.2000.0282","volume":"7","author":"R.L. Rivest","year":"2001","unstructured":"Rivest, R.L.: Permutation Polynomials Modulo 2 w . Finite Fields and their Applications\u00a07, 287\u2013292 (2001)","journal-title":"Finite Fields and their Applications"},{"key":"5_CR16","doi-asserted-by":"crossref","unstructured":"Sander, T., Tschudin, C.F.: Towards Mobile Cryptography. In: Proceedings of the 1998 IEEE Symposium on Security and Privacy, pp. 215\u2013224 (1998)","DOI":"10.1109\/SECPRI.1998.674837"},{"key":"5_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"44","DOI":"10.1007\/3-540-68671-1_4","volume-title":"Mobile Agents and Security","author":"T. Sander","year":"1998","unstructured":"Sander, T., Tschudin, C.F.: Protecting Mobile Agents Against Malicious Hosts. In: Vigna, G. (ed.) Mobile Agents and Security. LNCS, vol.\u00a01419, pp. 44\u201360. Springer, Heidelberg (1998)"},{"key":"5_CR18","unstructured":"Ogiso, T., Sakabe, Y., Soshi, M., Miyaji, A.: Software Tamper Resistance Based on the Difficulty of Interprocedural Analysis. In: Proceedings of WISA 2002 (2002)"},{"key":"5_CR19","series-title":"Lecture Notes in Computer Science","volume-title":"Verification: Theory and Practice","author":"J. Vuillemin","year":"2004","unstructured":"Vuillemin, J.: Digital algebra and Circuits. In: Dershowitz, N. (ed.) Verification: Theory and Practice. LNCS, vol.\u00a02772, Springer, Heidelberg (2004)"},{"key":"5_CR20","volume-title":"Hacker\u2019s Delight","author":"H.S. Warren Jr.","year":"2002","unstructured":"Warren Jr., H.S.: Hacker\u2019s Delight. Addison-Wesley, Boston (2002), www.hackersdelight.org"},{"key":"5_CR21","unstructured":"Zhou, Y., Main, A.: Diversity via Code Transformations: A Solution for NGNA Renewable Security, The NCTA Technical PapersTM 2006, The National Cable and Telecommunications Association Show, Atlanta, pp. 173\u2013182 (2006)"},{"key":"5_CR22","unstructured":"http:\/\/www.aacsla.com"}],"container-title":["Lecture Notes in Computer Science","Information Security Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-77535-5_5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,6]],"date-time":"2019-05-06T17:20:32Z","timestamp":1557163232000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-77535-5_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007]]},"ISBN":["9783540775348","9783540775355"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-77535-5_5","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2007]]}}}