{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T16:39:51Z","timestamp":1725899991602},"publisher-location":"Berlin, Heidelberg","reference-count":14,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642138683"},{"type":"electronic","value":"9783642138690"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-13869-0_20","type":"book-chapter","created":{"date-parts":[[2010,6,29]],"date-time":"2010-06-29T07:24:20Z","timestamp":1277796260000},"page":"282-289","source":"Crossref","is-referenced-by-count":2,"title":["Robust Combiners for Software Hardening"],"prefix":"10.1007","author":[{"given":"Amir","family":"Herzberg","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Haya","family":"Shulman","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"key":"20_CR1","volume-title":"SP 2001: Proceedings of the 2001 IEEE Symposium on Security and Privacy","author":"J. Algesheimer","year":"2001","unstructured":"Algesheimer, J., Cachin, C., Camenisch, J., Karjoth, G.: Cryptographic security for mobile code. In: SP 2001: Proceedings of the 2001 IEEE Symposium on Security and Privacy, Washington, DC, USA, vol.\u00a02. IEEE Computer Society, Los Alamitos (2001)"},{"key":"20_CR2","unstructured":"Boneh, D., Boyen, X.: On the impossibility of efficiently combining collision resistant hash functions"},{"key":"20_CR3","doi-asserted-by":"crossref","unstructured":"Cachin, C., Camenisch, J., Kilian, J., Muller, J.: One-round secure computation and secure autonomous mobile agents. In: Automata, Languages and Programming, pp. 512\u2013523 (2000), http:\/\/citeseer.ist.psu.edu\/article\/cachin00oneround.html","DOI":"10.1007\/3-540-45022-X_43"},{"key":"20_CR4","unstructured":"Collberg, C., Thomborson, C., Low, D.: A taxonomy of obfuscating transformations. University of Auckland Technical Report, 170 (1997)"},{"issue":"8","key":"20_CR5","doi-asserted-by":"publisher","first-page":"735","DOI":"10.1109\/TSE.2002.1027797","volume":"28","author":"C.S. Collberg","year":"2002","unstructured":"Collberg, C.S., Thomborson, C.: Watermarking, tamper-proofing, and obfuscation-tools for software protection. IEEE Transactions on Software Engineering\u00a028(8), 735\u2013746 (2002)","journal-title":"IEEE Transactions on Software Engineering"},{"key":"20_CR6","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-662-04722-4","volume-title":"The Design of Rijndael: AES\u2013the Advanced Encryption Standard","author":"J. Daemen","year":"2002","unstructured":"Daemen, J., Rijmen, V.: The Design of Rijndael: AES\u2013the Advanced Encryption Standard. Springer, Heidelberg (2002)"},{"key":"20_CR7","first-page":"43","volume-title":"Proc. CRYPTO 1983","author":"S. Even","year":"1984","unstructured":"Even, S., Goldreich, O.: On the power of cascade ciphers. In: Chaum, D. (ed.) Proc. CRYPTO 1983, pp. 43\u201350. Plenum Press, New York (1984)"},{"key":"20_CR8","unstructured":"Fischlin, M., Lehmann, A.: Multi-Property Preserving Combiners for Hash Functions"},{"key":"20_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"96","DOI":"10.1007\/11426639_6","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2005","author":"D. Harnik","year":"2005","unstructured":"Harnik, D., Kilian, J., Naor, M., Reingold, O., Rosen, A.: On robust combiners for oblivious transfer and other primitives. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol.\u00a03494, pp. 96\u2013113. Springer, Heidelberg (2005)"},{"key":"20_CR10","doi-asserted-by":"crossref","first-page":"342","DOI":"10.1007\/978-3-642-01244-0_30","volume-title":"Proceedings of Emerging Challenges for Security, Privacy and Trust: 24th Ifip Tc 11 International Information Security Conference, SEC 2009, Pafos, Cyprus","author":"A. Herzberg","year":"2009","unstructured":"Herzberg, A., Shulman, H., Saxena, A., Crispo, B.: Towards a theory of white-box security. In: Proceedings of Emerging Challenges for Security, Privacy and Trust: 24th Ifip Tc 11 International Information Security Conference, SEC 2009, Pafos, Cyprus, May 18-20, p. 342. Springer, Heidelberg (2009)"},{"key":"20_CR11","unstructured":"Herzberg, A.: Folklore, practice and theory of robust combiners. Cryptology ePrint Archive, Report 2002\/135 (2002), http:\/\/eprint.iacr.org\/"},{"key":"20_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"555","DOI":"10.1007\/11818175_33","volume-title":"Advances in Cryptology - CRYPTO 2006","author":"R. Meier","year":"2006","unstructured":"Meier, R., Przydatek, B.: On robust combiners for private information retrieval and other primitives. In: Dwork, C. (ed.) CRYPTO 2006. LNCS, vol.\u00a04117, pp. 555\u2013569. Springer, Heidelberg (2006)"},{"key":"20_CR13","doi-asserted-by":"crossref","unstructured":"Mitchell, C., et al.: Trusted Computing. Trusted computing, p. 1 (2005)","DOI":"10.1049\/PBPC006E"},{"key":"20_CR14","doi-asserted-by":"crossref","unstructured":"Spalka, A., Cremers, A.B., Langweg, H.: Protecting the creation of digital signatures with trusted computing platform technology against attacks by Trojan Horse programs. In: Proceedings of the 16th International Conference on Information Security: Trusted Information: The New Decade Challenge, pp. 403\u2013419 (2001)","DOI":"10.1007\/0-306-46998-7_28"}],"container-title":["Lecture Notes in Computer Science","Trust and Trustworthy Computing"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-13869-0_20.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,23]],"date-time":"2020-11-23T21:44:43Z","timestamp":1606167883000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-13869-0_20"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642138683","9783642138690"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-13869-0_20","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2010]]}}}