{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,29]],"date-time":"2026-01-29T20:58:18Z","timestamp":1769720298699,"version":"3.49.0"},"publisher-location":"Berlin, Heidelberg","reference-count":13,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783662434130","type":"print"},{"value":"9783662434147","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-662-43414-7_14","type":"book-chapter","created":{"date-parts":[[2014,5,20]],"date-time":"2014-05-20T10:57:06Z","timestamp":1400583426000},"page":"265-285","source":"Crossref","is-referenced-by-count":62,"title":["Two Attacks on a White-Box AES Implementation"],"prefix":"10.1007","author":[{"given":"Tancr\u00e8de","family":"Lepoint","sequence":"first","affiliation":[]},{"given":"Matthieu","family":"Rivain","sequence":"additional","affiliation":[]},{"given":"Yoni","family":"De Mulder","sequence":"additional","affiliation":[]},{"given":"Peter","family":"Roelse","sequence":"additional","affiliation":[]},{"given":"Bart","family":"Preneel","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,5,21]]},"reference":[{"key":"14_CR1","series-title":"LNCS","doi-asserted-by":"crossref","first-page":"160","DOI":"10.1007\/3-540-36178-2_10","volume-title":"ASIACRYPT 2002","author":"E Barkan","year":"2002","unstructured":"Barkan, E., Biham, E.: In how many ways can you write Rijndael? In: Zheng, Y. (ed.) ASIACRYPT 2002. LNCS, vol. 2501, pp. 160\u2013175. Springer, Heidelberg (2002)"},{"key":"14_CR2","unstructured":"Barkan, E., Biham, E.: The book of Rijndaels. IACR Cryptology ePrint Archive, 2002:158. \n                      http:\/\/eprint.iacr.org\/2002\/158\n                      \n                     (2002)"},{"key":"14_CR3","series-title":"LNCS","first-page":"227","volume-title":"SAC 2004","author":"O Billet","year":"2004","unstructured":"Billet, O., Gilbert, H., Ech-Chatbi, C.: Cryptanalysis of a white box AES implementation. In: Handschuh, H., Hasan, M.A. (eds.) SAC 2004. LNCS, vol. 3357, pp. 227\u2013240. Springer, Heidelberg (2004)"},{"key":"14_CR4","series-title":"LNCS","doi-asserted-by":"crossref","first-page":"33","DOI":"10.1007\/3-540-39200-9_3","volume-title":"EUROCRYPT 2003","author":"A Biryukov","year":"2003","unstructured":"Biryukov, A., De Canni\u00e8re, C., Braeken, A., Preneel, B.: A toolbox for cryptanalysis: linear and affine equivalence algorithms. In: Biham, E. (ed.) EUROCRYPT 2003. LNCS, vol. 2656, pp. 33\u201350. Springer, Heidelberg (2003)"},{"key":"14_CR5","series-title":"LNCS","first-page":"250","volume-title":"SAC 2002","author":"S Chow","year":"2003","unstructured":"Chow, S., Eisen, P., Johnson, H., Van Oorschot, P.C.: White-box cryptography and an AES implementation. In: Nyberg, K., Heys, H. (eds.) SAC 2002. LNCS, vol. 2595, pp. 250\u2013270. Springer, Heidelberg (2003)"},{"key":"14_CR6","series-title":"LNCS","first-page":"278","volume-title":"ICISC 2010","author":"M Karroumi","year":"2011","unstructured":"Karroumi, M.: Protecting white-box AES with dual ciphers. In: Rhee, K.-H., Nyang, D. (eds.) ICISC 2010. LNCS, vol. 6829, pp. 278\u2013291. Springer, Heidelberg (2011)"},{"key":"14_CR7","unstructured":"Lepoint, T., Rivain, M.: Another nail in the coffin of white-box AES implementations. Cryptology ePrint Archive, Report 2013\/455. \n                      http:\/\/eprint.iacr.org\/2013\/455.pdf\n                      \n                     (2013)"},{"key":"14_CR8","unstructured":"National Institute of Standards and Technology: Advanced encryption standard. In: Federal Information Processing Standard (FIPS), Publication 197, U.S. Department of Commerce, Washington, DC (November 2001). \n                      http:\/\/csrc.nist.gov\/publications\/fips\/fips197\/fips-197.pdf"},{"key":"14_CR9","series-title":"Mathematics in Industry","first-page":"209","volume-title":"Advances in Network Analysis and its Applications","author":"JA Muir","year":"2013","unstructured":"Muir, J.A.: A tutorial on white-box AES. In: Kranakis, E. (ed.) Advances in Network Analysis and its Applications. Mathematics in Industry, pp. 209\u2013229. Springer, Heidelberg (2013). http:\/\/www.ccsl.carleton.ca\/\u00a0jamuir\/papers\/wb-aes-tutorial.pdf"},{"key":"14_CR10","series-title":"LNCS","first-page":"34","volume-title":"SAC 2012","author":"Y Mulder De","year":"2013","unstructured":"De Mulder, Y., Roelse, P., Preneel, B.: Cryptanalysis of the Xiao - Lai white-box AES implementation. In: Knudsen, L.R., Wu, H. (eds.) SAC 2012. LNCS, vol. 7707, pp. 34\u201349. Springer, Heidelberg (2013)"},{"key":"14_CR11","unstructured":"De Mulder, Y., Roelse, P., Preneel, B.: Revisiting the BGE attack on a white-box AES implementation. Cryptology ePrint Archive, Report 2013\/450. \n                      http:\/\/eprint.iacr.org\/2013\/450.pdf\n                      \n                     (2013)"},{"key":"14_CR12","unstructured":"Tolhuizen, L.: Improved cryptanalysis of an AES implementation. In: 33rd WIC Symposium on Information Theory in the Benelux (2012)"},{"key":"14_CR13","doi-asserted-by":"crossref","unstructured":"Xiao, Y., Lai, X.: A secure implementation of white-box AES. In: 2nd International Conference on Computer Science and its Applications (CSA 2009), pp. 1\u20136. IEEE (2009)","DOI":"10.1109\/CSA.2009.5404239"}],"container-title":["Lecture Notes in Computer Science","Selected Areas in Cryptography -- SAC 2013"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-662-43414-7_14","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,26]],"date-time":"2019-05-26T17:45:32Z","timestamp":1558892732000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-662-43414-7_14"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783662434130","9783662434147"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/978-3-662-43414-7_14","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014]]}}}