{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,2]],"date-time":"2026-01-02T02:45:40Z","timestamp":1767321940445,"version":"3.48.0"},"publisher-location":"Singapore","reference-count":16,"publisher":"Springer Nature Singapore","isbn-type":[{"value":"9789819562053","type":"print"},{"value":"9789819562060","type":"electronic"}],"license":[{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026]]},"DOI":"10.1007\/978-981-95-6206-0_26","type":"book-chapter","created":{"date-parts":[[2026,1,2]],"date-time":"2026-01-02T02:43:54Z","timestamp":1767321834000},"page":"496-511","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Revisit Bitslice Implementation of\u00a0Dummy Shuffling"],"prefix":"10.1007","author":[{"given":"Xujing","family":"Wu","sequence":"first","affiliation":[]},{"given":"Jinliang","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Runhao","family":"Wei","sequence":"additional","affiliation":[]},{"given":"Yunling","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Meiqin","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2026,1,2]]},"reference":[{"key":"26_CR1","doi-asserted-by":"publisher","unstructured":"Biham, E.: A fast new DES implementation in software. In: Biham, E. (ed.) Fast Software Encryption. LNCS, vol.\u00a01267, pp. 260\u2013272. Springer, Heidelberg (1997). https:\/\/doi.org\/10.1007\/BFB0052352","DOI":"10.1007\/BFB0052352"},{"key":"26_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"373","DOI":"10.1007\/978-3-030-03329-3_13","volume-title":"Advances in Cryptology \u2013 ASIACRYPT 2018","author":"A Biryukov","year":"2018","unstructured":"Biryukov, A., Udovenko, A.: Attacks and countermeasures for white-box designs. In: Peyrin, T., Galbraith, S. (eds.) ASIACRYPT 2018, Part II. LNCS, vol. 11273, pp. 373\u2013402. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-030-03329-3_13"},{"key":"26_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"219","DOI":"10.1007\/978-3-030-77886-6_8","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2021","author":"A Biryukov","year":"2021","unstructured":"Biryukov, A., Udovenko, A.: Dummy shuffling against algebraic attacks in white-box implementations. In: Canteaut, A., Standaert, F.-X. (eds.) EUROCRYPT 2021, Part II. LNCS, vol. 12697, pp. 219\u2013248. Springer, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-77886-6_8"},{"key":"26_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"118","DOI":"10.1007\/978-3-030-16350-1_8","volume-title":"Constructive Side-Channel Analysis and Secure Design","author":"A Bogdanov","year":"2019","unstructured":"Bogdanov, A., Rivain, M., Vejre, P.S., Wang, J.: Higher-order DCA against standard side-channel countermeasures. In: Polian, I., St\u00f6ttinger, M. (eds.) COSADE 2019. LNCS, vol. 11421, pp. 118\u2013141. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-16350-1_8"},{"key":"26_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"215","DOI":"10.1007\/978-3-662-53140-2_11","volume-title":"Cryptographic Hardware and Embedded Systems \u2013 CHES 2016","author":"JW Bos","year":"2016","unstructured":"Bos, J.W., Hubain, C., Michiels, W., Teuwen, P.: Differential computation analysis: hiding your white-box designs is not enough. In: Gierlichs, B., Poschmann, A.Y. (eds.) CHES 2016. LNCS, vol. 9813, pp. 215\u2013236. Springer, Heidelberg (2016). https:\/\/doi.org\/10.1007\/978-3-662-53140-2_11"},{"key":"26_CR6","doi-asserted-by":"publisher","unstructured":"Charl\u00e8s, A., Udovenko, A.: LPN-based attacks in the white-box setting. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2023(4), 318\u2013343 (2023). https:\/\/doi.org\/10.46586\/TCHES.V2023.I4.318-343","DOI":"10.46586\/TCHES.V2023.I4.318-343"},{"key":"26_CR7","doi-asserted-by":"publisher","unstructured":"Charl\u00e8s, A., Udovenko, A.: White-box filtering attacks breaking SEL masking: from exponential to polynomial time. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2024(3), 1\u201324 (2024). https:\/\/doi.org\/10.46586\/TCHES.V2024.I3.1-24","DOI":"10.46586\/TCHES.V2024.I3.1-24"},{"key":"26_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"250","DOI":"10.1007\/3-540-36492-7_17","volume-title":"Selected Areas in Cryptography","author":"S Chow","year":"2003","unstructured":"Chow, S., Eisen, P., Johnson, H., Van Oorschot, P.C.: White-box cryptography and an AES implementation. In: Nyberg, K., Heys, H. (eds.) SAC 2002. LNCS, vol. 2595, pp. 250\u2013270. Springer, Heidelberg (2003). https:\/\/doi.org\/10.1007\/3-540-36492-7_17"},{"key":"26_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-540-44993-5_1","volume-title":"Digital Rights Management","author":"S Chow","year":"2003","unstructured":"Chow, S., Eisen, P., Johnson, H., van Oorschot, P.C.: A white-box DES implementation for DRM applications. In: Feigenbaum, J. (ed.) DRM 2002. LNCS, vol. 2696, pp. 1\u201315. Springer, Heidelberg (2003). https:\/\/doi.org\/10.1007\/978-3-540-44993-5_1"},{"issue":"1","key":"26_CR10","doi-asserted-by":"publisher","first-page":"49","DOI":"10.1007\/S13389-019-00207-5","volume":"10","author":"L Goubin","year":"2020","unstructured":"Goubin, L., Paillier, P., Rivain, M., Wang, J.: How to reveal the secrets of an obscure white-box implementation. J. Cryptogr. Eng. 10(1), 49\u201366 (2020). https:\/\/doi.org\/10.1007\/S13389-019-00207-5","journal-title":"J. Cryptogr. Eng."},{"key":"26_CR11","doi-asserted-by":"publisher","unstructured":"Goubin, L., Rivain, M., Wang, J.: Defeating state-of-the-art white-box countermeasures with advanced gray-box attacks. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2020(3), 454\u2013482 (2020). https:\/\/doi.org\/10.13154\/TCHES.V2020.I3.454-482","DOI":"10.13154\/TCHES.V2020.I3.454-482"},{"key":"26_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"463","DOI":"10.1007\/978-3-540-45146-4_27","volume-title":"Advances in Cryptology - CRYPTO 2003","author":"Y Ishai","year":"2003","unstructured":"Ishai, Y., Sahai, A., Wagner, D.: Private circuits: securing hardware against probing attacks. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol. 2729, pp. 463\u2013481. Springer, Heidelberg (2003). https:\/\/doi.org\/10.1007\/978-3-540-45146-4_27"},{"key":"26_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"203","DOI":"10.1007\/11935070_14","volume-title":"Cryptology and Network Security","author":"C Rebeiro","year":"2006","unstructured":"Rebeiro, C., Selvakumar, D., Devi, A.S.L.: Bitslice implementation of AES. In: Pointcheval, D., Mu, Y., Chen, K. (eds.) CANS 2006. LNCS, vol. 4301, pp. 203\u2013212. Springer, Heidelberg (2006). https:\/\/doi.org\/10.1007\/11935070_14"},{"key":"26_CR14","unstructured":"Rivain, M., Udovenko, A.: wboxkit: White-box cryptography design and analysis kit (2022). https:\/\/github.com\/hellman\/wboxkit"},{"key":"26_CR15","doi-asserted-by":"publisher","unstructured":"Rivain, M., Wang, J.: Analysis and improvement of differential computation attacks against internally-encoded white-box implementations. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2019(2), 225\u2013255 (2019). https:\/\/doi.org\/10.13154\/TCHES.V2019.I2.225-255","DOI":"10.13154\/TCHES.V2019.I2.225-255"},{"key":"26_CR16","doi-asserted-by":"publisher","unstructured":"Seker, O., Eisenbarth, T., Liskiewicz, M.: A white-box masking scheme resisting computational and algebraic attacks. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2021(2), 61\u2013105 (2021). https:\/\/doi.org\/10.46586\/TCHES.V2021.I2.61-105","DOI":"10.46586\/TCHES.V2021.I2.61-105"}],"container-title":["Lecture Notes in Computer Science","Information Security and Cryptology"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-95-6206-0_26","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,1,2]],"date-time":"2026-01-02T02:43:55Z","timestamp":1767321835000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-95-6206-0_26"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026]]},"ISBN":["9789819562053","9789819562060"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-981-95-6206-0_26","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026]]},"assertion":[{"value":"2 January 2026","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"Inscrypt","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Information Security and Cryptology","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Xi'an","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19 October 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19 October 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"cisc22025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/inscrypt2025.xidian.edu.cn\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}