{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,7]],"date-time":"2025-12-07T11:26:19Z","timestamp":1765106779310,"version":"3.46.0"},"publisher-location":"Singapore","reference-count":52,"publisher":"Springer Nature Singapore","isbn-type":[{"value":"9789819550951","type":"print"},{"value":"9789819550968","type":"electronic"}],"license":[{"start":{"date-parts":[[2025,12,8]],"date-time":"2025-12-08T00:00:00Z","timestamp":1765152000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,12,8]],"date-time":"2025-12-08T00:00:00Z","timestamp":1765152000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026]]},"DOI":"10.1007\/978-981-95-5096-8_11","type":"book-chapter","created":{"date-parts":[[2025,12,7]],"date-time":"2025-12-07T11:24:30Z","timestamp":1765106670000},"page":"341-374","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Haystack Ciphers: White-Box Countermeasures as\u00a0Symmetric Encryption"],"prefix":"10.1007","author":[{"given":"Alex","family":"Charl\u00e8s","sequence":"first","affiliation":[]},{"given":"Aleksei","family":"Udovenko","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,12,8]]},"reference":[{"key":"11_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"123","DOI":"10.1007\/978-3-030-68773-1_7","volume-title":"Constructive Side-Channel Analysis and Secure Design","author":"E Alpirez Bock","year":"2021","unstructured":"Alpirez Bock, E., Treff, A.: Security assessment of white-box design submissions of the CHES 2017 CTF challenge. In: Bertoni, G.M., Regazzoni, F. (eds.) COSADE 2020. LNCS, vol. 12244, pp. 123\u2013146. Springer, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-68773-1_7"},{"key":"11_CR2","doi-asserted-by":"publisher","unstructured":"Baksi, A., Bhasin, S., Breier, J., Jap, D., Saha, D.: A survey on fault attacks on symmetric key cryptosystems. ACM Comput. Surv. 55(4), (2022). https:\/\/doi.org\/10.1145\/3530054","DOI":"10.1145\/3530054"},{"key":"11_CR3","doi-asserted-by":"publisher","unstructured":"Barthe, G., et al.: Strong non-interference and type-directed higher-order masking. In: Weippl, E.R., Katzenbeisser, S., Kruegel, C., Myers, A.C., Halevi, S. (eds), ACM CCS 2016, pp. 116\u2013129. ACM Press, October 2016. https:\/\/doi.org\/10.1145\/2976749.2978427","DOI":"10.1145\/2976749.2978427"},{"issue":"2","key":"11_CR4","doi-asserted-by":"publisher","first-page":"370","DOI":"10.1109\/JPROC.2005.862424","volume":"94","author":"H Bar-El","year":"2006","unstructured":"Bar-El, H., Choukri, H., Naccache, D., Tunstall, M., Whelan, C.: The sorcerer\u2019s apprentice guide to fault attacks. Proc. IEEE 94(2), 370\u2013382 (2006). https:\/\/doi.org\/10.1109\/JPROC.2005.862424","journal-title":"Proc. IEEE"},{"key":"11_CR5","doi-asserted-by":"publisher","unstructured":"Bellare, M., Desai, A., Jokipii, E., Rogaway, P.: A concrete security treatment of symmetric encryption. In: 38th FOCS, pp. 394\u2013403. IEEE Computer Society Press, October 1997. https:\/\/doi.org\/10.1109\/SFCS.1997.646128","DOI":"10.1109\/SFCS.1997.646128"},{"key":"11_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"227","DOI":"10.1007\/978-3-540-30564-4_16","volume-title":"Selected Areas in Cryptography","author":"O Billet","year":"2004","unstructured":"Billet, O., Gilbert, H., Ech-Chatbi, C.: Cryptanalysis of a white box AES implementation. In: Handschuh, H., Hasan, M.A. (eds.) SAC 2004. LNCS, vol. 3357, pp. 227\u2013240. Springer, Heidelberg (2004). https:\/\/doi.org\/10.1007\/978-3-540-30564-4_16"},{"key":"11_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"215","DOI":"10.1007\/978-3-662-53140-2_11","volume-title":"Cryptographic Hardware and Embedded Systems \u2013 CHES 2016","author":"JW Bos","year":"2016","unstructured":"Bos, J.W., Hubain, C., Michiels, W., Teuwen, P.: Differential computation analysis: hiding your white-box designs is not enough. In: Gierlichs, B., Poschmann, A.Y. (eds.) CHES 2016. LNCS, vol. 9813, pp. 215\u2013236. Springer, Heidelberg (2016). https:\/\/doi.org\/10.1007\/978-3-662-53140-2_11"},{"key":"11_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1007\/978-3-319-79063-3_2","volume-title":"Post-Quantum Cryptography","author":"L Both","year":"2018","unstructured":"Both, L., May, A.: Decoding linear codes with high error rate and its impact for LPN security. In: Lange, T., Steinwandt, R. (eds.) PQCrypto 2018. LNCS, vol. 10786, pp. 25\u201346. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-79063-3_2"},{"key":"11_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"531","DOI":"10.1007\/3-540-44448-3_41","volume-title":"Advances in Cryptology \u2014 ASIACRYPT 2000","author":"M Bellare","year":"2000","unstructured":"Bellare, M., Namprempre, C.: Authenticated encryption: relations among notions and analysis of the generic composition paradigm. In: Okamoto, T. (ed.) ASIACRYPT 2000. LNCS, vol. 1976, pp. 531\u2013545. Springer, Heidelberg (2000). https:\/\/doi.org\/10.1007\/3-540-44448-3_41"},{"key":"11_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"118","DOI":"10.1007\/978-3-030-16350-1_8","volume-title":"Constructive Side-Channel Analysis and Secure Design","author":"A Bogdanov","year":"2019","unstructured":"Bogdanov, A., Rivain, M., Vejre, P.S., Wang, J.: Higher-order DCA against standard side-channel countermeasures. In: Polian, I., St\u00f6ttinger, M. (eds.) COSADE 2019. LNCS, vol. 11421, pp. 118\u2013141. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-16350-1_8"},{"key":"11_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"513","DOI":"10.1007\/BFb0052259","volume-title":"Advances in Cryptology \u2014 CRYPTO \u201997","author":"E Biham","year":"1997","unstructured":"Biham, E., Shamir, A.: Differential fault analysis of secret key cryptosystems. In: Kaliski, B.S. (ed.) CRYPTO 1997. LNCS, vol. 1294, pp. 513\u2013525. Springer, Heidelberg (1997). https:\/\/doi.org\/10.1007\/BFb0052259"},{"key":"11_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"373","DOI":"10.1007\/978-3-030-03329-3_13","volume-title":"Advances in Cryptology \u2013 ASIACRYPT 2018","author":"A Biryukov","year":"2018","unstructured":"Biryukov, A., Udovenko, A.: Attacks and countermeasures for white-box designs. In: Peyrin, T., Galbraith, S. (eds.) ASIACRYPT 2018. LNCS, vol. 11273, pp. 373\u2013402. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-030-03329-3_13"},{"key":"11_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"219","DOI":"10.1007\/978-3-030-77886-6_8","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2021","author":"A Biryukov","year":"2021","unstructured":"Biryukov, A., Udovenko, A.: Dummy shuffling against algebraic attacks in white-box implementations. In: Canteaut, A., Standaert, F.-X. (eds.) EUROCRYPT 2021. LNCS, vol. 12697, pp. 219\u2013248. Springer, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-77886-6_8"},{"key":"11_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-540-44993-5_1","volume-title":"Digital Rights Management","author":"S Chow","year":"2003","unstructured":"Chow, S., Eisen, P., Johnson, H., van Oorschot, P.C.: A white-box DES implementation for DRM applications. In: Feigenbaum, J. (ed.) DRM 2002. LNCS, vol. 2696, pp. 1\u201315. Springer, Heidelberg (2003). https:\/\/doi.org\/10.1007\/978-3-540-44993-5_1"},{"key":"11_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"250","DOI":"10.1007\/3-540-36492-7_17","volume-title":"Selected Areas in Cryptography","author":"S Chow","year":"2003","unstructured":"Chow, S., Eisen, P., Johnson, H., Van Oorschot, P.C.: White-box cryptography and an AES implementation. In: Nyberg, K., Heys, H. (eds.) SAC 2002. LNCS, vol. 2595, pp. 250\u2013270. Springer, Heidelberg (2003). https:\/\/doi.org\/10.1007\/3-540-36492-7_17"},{"key":"11_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"181","DOI":"10.1007\/978-3-540-74735-2_13","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2007","author":"C Clavier","year":"2007","unstructured":"Clavier, C.: Secret external encodings do not prevent transient fault analysis. In: Paillier, P., Verbauwhede, I. (eds.) CHES 2007. LNCS, vol. 4727, pp. 181\u2013194. Springer, Heidelberg (2007). https:\/\/doi.org\/10.1007\/978-3-540-74735-2_13"},{"key":"11_CR17","doi-asserted-by":"publisher","unstructured":"Coron, J.-S., Prouff, E., Rivain, M., Roche, T.: Higher-order side channel security and mask refreshing. In: Moriai, S. (ed.) FSE 2013. LNCS, vol. 8424, pp. 410\u2013424. Springer, Heidelberg (2014). https:\/\/doi.org\/10.1007\/978-3-662-43933-3_21","DOI":"10.1007\/978-3-662-43933-3_21"},{"key":"11_CR18","unstructured":"Chen, X., Shu, W., Zhou, Z.: Algorithms for sparse lpn and lspn against low-noise (extended abstract). In: Haghtalab, N., Moitra, A. (eds.), Proceedings of Thirty Eighth Conference on Learning Theory, volume 291 of Proceedings of Machine Learning Research, pp. 1091\u20131093. PMLR, 30 Jun\u201304 Jul 2025. https:\/\/proceedings.mlr.press\/v291\/chen25f.html"},{"key":"11_CR19","doi-asserted-by":"publisher","unstructured":"Charl\u00e8s, A., Udovenko, A.: LPN-based attacks in the white-box setting. IACR TCHES 2023(4), 318\u2013343 (2023). https:\/\/doi.org\/10.46586\/tches.v2023.i4.318-343","DOI":"10.46586\/tches.v2023.i4.318-343"},{"key":"11_CR20","doi-asserted-by":"publisher","unstructured":"Charl\u00e8s, A., Udovenko, A.: White-box filtering attacks breaking SEL masking: from exponential to polynomial time. IACR Tches 2024(3), 1\u201324 (2024). https:\/\/doi.org\/10.46586\/tches.v2024.i3.1-24","DOI":"10.46586\/tches.v2024.i3.1-24"},{"key":"11_CR21","unstructured":"Charl\u00e8s, A., Udovenko, A.: A light white-box masking scheme using dummy shuffled secure multiplication. Cryptology ePrint Archive, Report 2025\/171 (2025). https:\/\/eprint.iacr.org\/2025\/171"},{"key":"11_CR22","doi-asserted-by":"publisher","unstructured":"Charls, A., Udovenko, A.: HaystackCiphers - supporting code, September 2025. https:\/\/doi.org\/10.5281\/zenodo.17078398","DOI":"10.5281\/zenodo.17078398"},{"key":"11_CR23","doi-asserted-by":"publisher","unstructured":"Dobraunig, C., Eichlseder, M., Korak, T., Mangard, S., Mendel, F., Primas, R.: SIFA: exploiting ineffective fault inductions on symmetric cryptography. IACR Tches 2018(3), 547\u2013572 (2018). https:\/\/tches.iacr.org\/index.php\/TCHES\/article\/view\/7286, https:\/\/doi.org\/10.13154\/tches.v2018.i3.547-572","DOI":"10.13154\/tches.v2018.i3.547-572"},{"key":"11_CR24","unstructured":"Data encryption standard. National Bureau of Standards, NBS FIPS PUB 46, U.S. Department of Commerce, January 1977"},{"key":"11_CR25","unstructured":"Daemen, J., Rijmen, V.: AES proposal: Rijndael. AES submission. http:\/\/csrc.nist.gov\/archive\/aes\/rijndael\/ (1998)"},{"key":"11_CR26","doi-asserted-by":"publisher","unstructured":"Daemen, J., Rijmen, V.: The design of Rijndael: AES-the advanced encryption standard. Information Security and Cryptography. Springer, Berlin, Heidelberg (2002). https:\/\/doi.org\/10.1007\/978-3-662-04722-4","DOI":"10.1007\/978-3-662-04722-4"},{"key":"11_CR27","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"34","DOI":"10.1007\/978-3-642-35999-6_3","volume-title":"Selected Areas in Cryptography","author":"Y De Mulder","year":"2013","unstructured":"De Mulder, Y., Roelse, P., Preneel, B.: Cryptanalysis of the xiao \u2013 Lai white-box AES implementation. In: Knudsen, L.R., Wu, H. (eds.) SAC 2012. LNCS, vol. 7707, pp. 34\u201349. Springer, Heidelberg (2013). https:\/\/doi.org\/10.1007\/978-3-642-35999-6_3"},{"key":"11_CR28","unstructured":"Emmanuel, P., Guenael, R., Matthieu, R., Colin, O.: Embedded Cryptography, chapter\u00a03. Wiley (2025). https:\/\/www.wiley.com\/en-us\/Embedded+Cryptography+3-p-9781394351923"},{"key":"11_CR29","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"486","DOI":"10.1007\/978-3-319-63715-0_17","volume-title":"Advances in Cryptology \u2013 CRYPTO 2017","author":"A Esser","year":"2017","unstructured":"Esser, A., K\u00fcbler, R., May, A.: LPN decoded. In: Katz, J., Shacham, H. (eds.) CRYPTO 2017. LNCS, vol. 10402, pp. 486\u2013514. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-63715-0_17"},{"key":"11_CR30","doi-asserted-by":"publisher","unstructured":"Fuhr, T., Jaulmes, \u00c9., Lomn\u00e9, V., Thillard, A.: Fault attacks on AES with faulty ciphertexts only. In: Fischer, W., Schmidt, J.-M. (eds.), 2013 Workshop on Fault Diagnosis and Tolerance in Cryptography, Los Alamitos, CA, USA, August 20, 2013, pp. 108\u2013118. IEEE Computer Society (2013). https:\/\/doi.org\/10.1109\/FDTC.2013.18","DOI":"10.1109\/FDTC.2013.18"},{"issue":"1","key":"11_CR31","doi-asserted-by":"publisher","first-page":"49","DOI":"10.1007\/s13389-019-00207-5","volume":"10","author":"L Goubin","year":"2019","unstructured":"Goubin, L., Paillier, P., Rivain, M., Wang, J.: How to reveal the secrets of an obscure white-box implementation. J. Cryptogr. Eng. 10(1), 49\u201366 (2019). https:\/\/doi.org\/10.1007\/s13389-019-00207-5","journal-title":"J. Cryptogr. Eng."},{"key":"11_CR32","series-title":"Lecture Notes in Computer Science (Lecture Notes in Artificial Intelligence)","doi-asserted-by":"publisher","first-page":"413","DOI":"10.1007\/978-3-642-24412-4_32","volume-title":"Algorithmic Learning Theory","author":"E Grigorescu","year":"2011","unstructured":"Grigorescu, E., Reyzin, L., Vempala, S.: On noise-tolerant learning of sparse parities and related problems. In: Kivinen, J., Szepesv\u00e1ri, C., Ukkonen, E., Zeugmann, T. (eds.) ALT 2011. LNCS (LNAI), vol. 6925, pp. 413\u2013424. Springer, Heidelberg (2011). https:\/\/doi.org\/10.1007\/978-3-642-24412-4_32"},{"key":"11_CR33","doi-asserted-by":"publisher","unstructured":"Goubin, L., Rivain, M., Wang, J.: Defeating state-of-the-art white-box countermeasures. IACR Tches 2020(3), 454\u2013482 (2020). https:\/\/tches.iacr.org\/index.php\/TCHES\/article\/view\/8597, https:\/\/doi.org\/10.13154\/tches.v2020.i3.454-482","DOI":"10.13154\/tches.v2020.i3.454-482"},{"key":"11_CR34","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"463","DOI":"10.1007\/978-3-540-45146-4_27","volume-title":"Advances in Cryptology - CRYPTO 2003","author":"Y Ishai","year":"2003","unstructured":"Ishai, Y., Sahai, A., Wagner, D.: Private circuits: securing hardware against probing attacks. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol. 2729, pp. 463\u2013481. Springer, Heidelberg (2003). https:\/\/doi.org\/10.1007\/978-3-540-45146-4_27"},{"key":"11_CR35","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"388","DOI":"10.1007\/3-540-48405-1_25","volume-title":"Advances in Cryptology \u2014 CRYPTO\u2019 99","author":"P Kocher","year":"1999","unstructured":"Kocher, P., Jaffe, J., Jun, B.: Differential power analysis. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol. 1666, pp. 388\u2013397. Springer, Heidelberg (1999). https:\/\/doi.org\/10.1007\/3-540-48405-1_25"},{"key":"11_CR36","doi-asserted-by":"publisher","unstructured":"Karppa, M., Kaski, P., Kohonen, J.: A faster subquadratic algorithm for finding outlier correlations. In: Krauthgamer, R. (ed.) 27th SODA, pp. 1288\u20131305. ACM-SIAM, January 2016. https:\/\/doi.org\/10.1137\/1.9781611974331.ch90","DOI":"10.1137\/1.9781611974331.ch90"},{"key":"11_CR37","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"104","DOI":"10.1007\/3-540-68697-5_9","volume-title":"Advances in Cryptology \u2014 CRYPTO \u201996","author":"PC Kocher","year":"1996","unstructured":"Kocher, P.C.: Timing attacks on implementations of diffie-hellman, RSA, DSS, and other systems. In: Koblitz, N. (ed.) CRYPTO 1996. LNCS, vol. 1109, pp. 104\u2013113. Springer, Heidelberg (1996). https:\/\/doi.org\/10.1007\/3-540-68697-5_9"},{"key":"11_CR38","doi-asserted-by":"publisher","unstructured":"Lashermes, R., Reymond, G., Dutertre, J.-M., Jacques, J.A., Fournier, B.R., Tria, A.: A DFA on AES based on the entropy of error distributions. In: Bertoni, G., Gierlichs, B. (eds.), 2012 Workshop on Fault Diagnosis and Tolerance in Cryptography, Leuven, Belgium, September 9, 2012, pp. 34\u201343. IEEE Computer Society (2012). https:\/\/doi.org\/10.1109\/FDTC.2012.18","DOI":"10.1109\/FDTC.2012.18"},{"key":"11_CR39","doi-asserted-by":"publisher","unstructured":"Lepoint, T., Rivain, M., De Mulder, Y., Roelse, P., Preneel, B.: Two Attacks on a White-Box AES Implementation. In: Lange, T., Lauter, K., Lison\u011bk, P. (eds.) SAC 2013. LNCS, vol. 8282, pp. 265\u2013285. Springer, Heidelberg (2014). https:\/\/doi.org\/10.1007\/978-3-662-43414-7_14","DOI":"10.1007\/978-3-662-43414-7_14"},{"key":"11_CR40","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"320","DOI":"10.1007\/978-3-642-15031-9_22","volume-title":"Cryptographic Hardware and Embedded Systems, CHES 2010","author":"Y Li","year":"2010","unstructured":"Li, Y., Sakiyama, K., Gomisawa, S., Fukunaga, T., Takahashi, J., Ohta, K.: Fault sensitivity analysis. In: Mangard, S., Standaert, F.-X. (eds.) CHES 2010. LNCS, vol. 6225, pp. 320\u2013334. Springer, Heidelberg (2010). https:\/\/doi.org\/10.1007\/978-3-642-15031-9_22"},{"key":"11_CR41","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1007\/978-3-540-45238-6_7","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2003","author":"G Piret","year":"2003","unstructured":"Piret, G., Quisquater, J.-J.: A differential fault attack technique against SPN structures, with application to the AES and Khazad. In: Walter, C.D., Ko\u00e7, \u00c7.K., Paar, C. (eds.) CHES 2003. LNCS, vol. 2779, pp. 77\u201388. Springer, Heidelberg (2003). https:\/\/doi.org\/10.1007\/978-3-540-45238-6_7"},{"key":"11_CR42","doi-asserted-by":"publisher","unstructured":"Rivain, M., Wang, J.: Analysis and improvement of differential computation attacks against internally-encoded white-box implementations. IACR Tches 2019(2), 225\u2013255 (2019). https:\/\/tches.iacr.org\/index.php\/TCHES\/article\/view\/7391, https:\/\/doi.org\/10.13154\/tches.v2019.i2.225-255","DOI":"10.13154\/tches.v2019.i2.225-255"},{"key":"11_CR43","unstructured":"The Sage\u00a0Developers. SageMath, the Sage Mathematics Software System (Version 10.6) (2025). https:\/\/www.sagemath.org"},{"key":"11_CR44","doi-asserted-by":"publisher","unstructured":"Seker, O., Eisenbarth, T., Liskiewicz, M.: A white-box masking scheme resisting computational and algebraic attacks. IACR Tches 2021(2), 61\u2013105 (2021). https:\/\/tches.iacr.org\/index.php\/TCHES\/article\/view\/8788, https:\/\/doi.org\/10.46586\/tches.v2021.i2.61-105","DOI":"10.46586\/tches.v2021.i2.61-105"},{"key":"11_CR45","unstructured":"Shrimpton, T.: A characterization of authenticated-encryption as a form of chosen-ciphertext security. Cryptology ePrint Archive, Report 2004\/272 (2004). https:\/\/eprint.iacr.org\/2004\/272"},{"key":"11_CR46","unstructured":"Sanfelix, E., Mune, C., de\u00a0Haas, J.: Unboxing the white-box. Practical attacks against obfuscated ciphers. Black Hat Europe 2015 (2015)"},{"issue":"4","key":"11_CR47","doi-asserted-by":"publisher","first-page":"354","DOI":"10.1007\/BF02165411","volume":"13","author":"V Strassen","year":"1969","unstructured":"Strassen, V.: Gaussian elimination is not optimal. Numer. Math. 13(4), 354\u2013356 (1969). https:\/\/doi.org\/10.1007\/BF02165411","journal-title":"Numer. Math."},{"key":"11_CR48","doi-asserted-by":"crossref","unstructured":"Teuwen, P.: Tools for white-box cryptanalysis. Embedded Cryptography 3, 53 (2025)","DOI":"10.1002\/9781394351930.ch3"},{"key":"11_CR49","doi-asserted-by":"publisher","unstructured":"Tang, Y., Gong, Z., Chen, J., Xie, N.: Higher-order DCA attacks on white-box implementations with masking and shuffling countermeasures. IACR Tches 2023(1), 369\u2013400 (2023). https:\/\/doi.org\/10.46586\/tches.v2023.i1.369-400","DOI":"10.46586\/tches.v2023.i1.369-400"},{"key":"11_CR50","doi-asserted-by":"publisher","unstructured":"Tang, Y., Gong, Z., Li, B., Zhao, L.: Revisiting the computation analysis against internal encodings in white-box implementations. IACR Tches 2023(4), 493\u2013522 (2023). https:\/\/doi.org\/10.46586\/tches.v2023.i4.493-522","DOI":"10.46586\/tches.v2023.i4.493-522"},{"key":"11_CR51","doi-asserted-by":"publisher","unstructured":"Wang, W., M\u00e9aux, P., Cassiers, G., Standaert, F.-X :. Efficient and private computations with code-based masking. IACR Tches 2020(2), 128\u2013171 (2020). https:\/\/tches.iacr.org\/index.php\/TCHES\/article\/view\/8547, https:\/\/doi.org\/10.13154\/tches.v2020.i2.128-171","DOI":"10.13154\/tches.v2020.i2.128-171"},{"key":"11_CR52","doi-asserted-by":"publisher","unstructured":"Wiggers, T., Samardjiska, S.: Practically solving LPN. In: 2021 IEEE International Symposium on Information Theory (ISIT), pp. 2399\u20132404, July 2021. https:\/\/doi.org\/10.1109\/ISIT45174.2021.9518109","DOI":"10.1109\/ISIT45174.2021.9518109"}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2013 ASIACRYPT 2025"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-95-5096-8_11","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,7]],"date-time":"2025-12-07T11:24:33Z","timestamp":1765106673000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-95-5096-8_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,12,8]]},"ISBN":["9789819550951","9789819550968"],"references-count":52,"URL":"https:\/\/doi.org\/10.1007\/978-981-95-5096-8_11","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,12,8]]},"assertion":[{"value":"8 December 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ASIACRYPT","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on the Theory and Application of Cryptology and Information Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Melbourne, VIC","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Australia","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8 December 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12 December 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"31","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"asiacrypt2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/asiacrypt.iacr.org\/2025\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}