{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,8]],"date-time":"2025-09-08T06:48:44Z","timestamp":1757314124625},"reference-count":39,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2017,3,1]],"date-time":"2017-03-01T00:00:00Z","timestamp":1488326400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J. Comput. Sci. Technol."],"published-print":{"date-parts":[[2017,3]]},"DOI":"10.1007\/s11390-017-1727-x","type":"journal-article","created":{"date-parts":[[2017,3,9]],"date-time":"2017-03-09T09:52:04Z","timestamp":1489053124000},"page":"386-395","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["A New Feistel-Type White-Box Encryption Scheme"],"prefix":"10.1007","volume":"32","author":[{"given":"Ting-Ting","family":"Lin","sequence":"first","affiliation":[]},{"given":"Xue-Jia","family":"Lai","sequence":"additional","affiliation":[]},{"given":"Wei-Jia","family":"Xue","sequence":"additional","affiliation":[]},{"given":"Yin","family":"Jia","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,3,13]]},"reference":[{"issue":"1","key":"1727_CR1","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1145\/584091.584093","volume":"5","author":"CE Shannon","year":"2001","unstructured":"Shannon C E. A mathematical theory of communication. ACM SIGMOBILE Mobile Computing and Communications Review, 2001, 5(1): 3-55.","journal-title":"ACM SIGMOBILE Mobile Computing and Communications Review"},{"key":"1727_CR2","doi-asserted-by":"crossref","unstructured":"Kocher P C. Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems. In Proc. the 16th Annual International Cryptology Conference on Advances in Cryptology, August 1996, pp.104-113.","DOI":"10.1007\/3-540-68697-5_9"},{"key":"1727_CR3","doi-asserted-by":"crossref","unstructured":"Kocher P, Jaffe J, Jun B. Differential power analysis. In Proc. the 19th Annual International Cryptology Conference, August 1999, pp.388-397.","DOI":"10.1007\/3-540-48405-1_25"},{"key":"1727_CR4","doi-asserted-by":"crossref","unstructured":"Quisquater J J, Samyde D. Electromagnetic analysis (EMA): Measures and counter-measures for smart cards. In Proc. the International Conference on Research in Smart Cards: Smart Card Programming and Security, September 2001, pp.200-210.","DOI":"10.1007\/3-540-45418-7_17"},{"issue":"3","key":"1727_CR5","doi-asserted-by":"crossref","first-page":"401","DOI":"10.1007\/s11390-010-9333-1","volume":"25","author":"H Wang","year":"2010","unstructured":"Wang H. Privacy-preserving data sharing in cloud computing. Journal of Computer Science and Technology, 2010, 25(3): 401-414.","journal-title":"Journal of Computer Science and Technology"},{"issue":"12","key":"1727_CR6","doi-asserted-by":"crossref","first-page":"2757","DOI":"10.1007\/s11432-012-4747-8","volume":"55","author":"HB Mi","year":"2012","unstructured":"Mi H B, Wang H M, Zhou Y F, Lyu M R, Cai H. Localizing root causes of performance anomalies in cloud computing systems by analyzing request trace logs. Science China Information Sciences, 2012, 55(12): 2757-2773.","journal-title":"Science China Information Sciences"},{"issue":"9","key":"1727_CR7","first-page":"1","volume":"56","author":"XM Wang","year":"2013","unstructured":"Wang X M, He Z B, Zhao X Q, Lin C, Pan Y, Cai Z P. Reaction-diffusion modeling of malware propagation in mobile wireless sensor networks. Science China Information Sciences, 2013, 56(9): 1-18.","journal-title":"Science China Information Sciences"},{"issue":"4","key":"1727_CR8","doi-asserted-by":"crossref","first-page":"643","DOI":"10.1007\/s11390-011-1165-0","volume":"26","author":"XL Ma","year":"2011","unstructured":"Ma X L, Hu H F, Li S F, Xiao H M, Luo Q, Yang D Q, Tang SW. DHC: Distributed, hierarchical clustering in sensor networks. Journal of Computer Science and Technology, 2011, 26(4): 643-662.","journal-title":"Journal of Computer Science and Technology"},{"issue":"6","key":"1727_CR9","doi-asserted-by":"crossref","first-page":"738","DOI":"10.1007\/BF02960764","volume":"17","author":"C Zhou","year":"2002","unstructured":"Zhou C, Sun Y Q. SPMH: A solution to the problem of malicious hosts. Journal of Computer Science and Technology, 2002, 17(6): 738-748.","journal-title":"Journal of Computer Science and Technology"},{"key":"1727_CR10","doi-asserted-by":"crossref","unstructured":"Chow S, Eisen P, Johnson H, van Oorschot P C. A whitebox DES implementation for DRM applications. In Lecture Notes in Computer Science 2696, Feigenbaum J (ed.), Springer, 2003, pp.1-15.","DOI":"10.1007\/978-3-540-44993-5_1"},{"key":"1727_CR11","doi-asserted-by":"crossref","unstructured":"Chow S, Eisen P, Johnson H, van Oorschot P C. Whitebox cryptography and an AES implementation. In Lecture Notes in Computer Science 2595, Nyberg K, Heys H (eds.), Springer, 2003, pp.250-270.","DOI":"10.1007\/3-540-36492-7_17"},{"key":"1727_CR12","doi-asserted-by":"crossref","unstructured":"Jacob M, Boneh D, Felten E. Attacking an obfuscated cipher by injecting faults. In Lecture Notes in Computer Science 2696, Feigenbaum J (ed.), Springer, 2003, pp.16-31.","DOI":"10.1007\/978-3-540-44993-5_2"},{"key":"1727_CR13","doi-asserted-by":"crossref","unstructured":"Link H E, Neumann W D. Clarifying obfuscation: Improving the security of whitebox DES. In Proc. International Conference on Information Technology: Coding and Computing, April 2005, pp.679-684.","DOI":"10.1109\/ITCC.2005.100"},{"key":"1727_CR14","doi-asserted-by":"crossref","unstructured":"Wyseur B, Michiels W, Gorissen P, Preneel B. Cryptanalysis of white-box DES implementations with arbitrary external encodings. In Proc. the 14th International Conference on Selected Areas in Cryptography, August 2007, pp.264-277.","DOI":"10.1007\/978-3-540-77360-3_17"},{"key":"1727_CR15","doi-asserted-by":"crossref","unstructured":"Goubin L, Masereel J M, Quisquater M. Cryptanalysis of white box DES implementations. In Proc. the 14th International Conference on Selected Areas in Cryptography, August 2007, pp.278-295.","DOI":"10.1007\/978-3-540-77360-3_18"},{"key":"1727_CR16","doi-asserted-by":"crossref","unstructured":"Billet O, Gilbert H, Ech-Chatbi C. Cryptanalysis of a white box AES implementation. In Proc. the 11th International Conference on Selected Areas in Cryptography, August 2005, pp.227-240.","DOI":"10.1007\/978-3-540-30564-4_16"},{"key":"1727_CR17","doi-asserted-by":"crossref","unstructured":"Michiels W, Gorissen P, Hollmann H D L. Cryptanalysis of a generic class of white-box implementations. In Lecture Notes in Computer Science 5381, Avanzi R M, Keliher L, Sica F (eds.), Springer, 2009, pp.414-428.","DOI":"10.1007\/978-3-642-04159-4_27"},{"key":"1727_CR18","doi-asserted-by":"crossref","unstructured":"Lepoint T, Rivain M, De Mulder Y, Roelse P, Preneel B. Two attacks on a white-box AES implementation. In Lecture Notes in Computer Science 8282, Lange T, Lauter K, Lison\u0103k P (eds.), Springer, 2014, pp.265-285.","DOI":"10.1007\/978-3-662-43414-7_14"},{"key":"1727_CR19","doi-asserted-by":"crossref","unstructured":"Xiao Y Y, Lai X J. A secure implementation of white-box AES. In Proc. the 2nd International Conference on Computer Science and its Applications, December 2009, pp.153-158.","DOI":"10.1109\/CSA.2009.5404239"},{"key":"1727_CR20","doi-asserted-by":"crossref","unstructured":"De Mulder Y, Roelse P, Preneel B. Cryptanalysis of the Xiao-Lai white-box AES Implementation. In Lecture Notes in Computer Science 7707, Knudsen L R, Wu H P (eds.), Springer, 2013, pp.34-49","DOI":"10.1007\/978-3-642-35999-6_3"},{"key":"1727_CR21","doi-asserted-by":"crossref","unstructured":"Biryukov A, De Canni`ere C, Braeken A, Preneel B. A toolbox for cryptanalysis: Linear and affine equivalence algorithms. In Lecture Notes in Computer Science 2656, Biham E (ed.), Springer, 2003, pp.33-50.","DOI":"10.1007\/3-540-39200-9_3"},{"key":"1727_CR22","doi-asserted-by":"crossref","unstructured":"Karroumi M. Protecting white-box AES with dual ciphers. In Lecture Notes in Computer Science 6829, Rhee K H, Nyang D (eds.), Springer, 2011, pp.278-291.","DOI":"10.1007\/978-3-642-24209-0_19"},{"key":"1727_CR23","unstructured":"Bringer J, Chabanne H, Dottax E. White box cryptography: Another attempt. IACR Cryptology ePrint Archive, 2006."},{"key":"1727_CR24","doi-asserted-by":"crossref","unstructured":"De Mulder Y, Wyseur B, Preneel B. Cryptanalysis of a perturbated white-box AES implementation. In Lecture Notes in Computer Science 6498, Gong G, Gupta K C (eds.), Springer, 2010, pp.292-310.","DOI":"10.1007\/978-3-642-17401-8_21"},{"key":"1727_CR25","unstructured":"Xiao Y Y.White-Box cryptography and implementations of AES SMS4. In Proc. the Chaincrypto, Nov. 2009, pp.24-34. (in Chinese)"},{"key":"1727_CR26","doi-asserted-by":"crossref","unstructured":"Lin T T, Lai X J. Efficient attack to white-box SMS4 implementation. Journal of Software, 2013, 24(9): 2238-2249. (in Chinese)","DOI":"10.3724\/SP.J.1001.2013.04356"},{"key":"1727_CR27","doi-asserted-by":"crossref","unstructured":"Biryukov A, Bouillaguet C, Khovratovich D. Cryptographic schemes based on the ASASA structure: Black-box, whitebox, and public-key (Extended Abstract). In Lecture Notes in Computer Science 8873, Sarkar P, Iwata T (eds.), Springer, 2014, pp.63-84.","DOI":"10.1007\/978-3-662-45611-8_4"},{"key":"1727_CR28","doi-asserted-by":"crossref","unstructured":"Minaud B, Derbez P, Fouque P A, Karpman P. Keyrecovery attacks on ASASA. In Lecture Notes in Computer Science 9453, Iwata T, Cheon J H (eds.), Springer, 2015, pp.3-27.","DOI":"10.1007\/978-3-662-48800-3_1"},{"key":"1727_CR29","unstructured":"Dinur I, Dunkelman O, Kranz T, Leander G. Decomposing the ASASA block cipher construction. Cryptology ePrint Archive, Report 2015\/507, 2015. http:\/\/eprint.iacr.org\/2015\/507 , Jan. 2017."},{"key":"1727_CR30","unstructured":"Biryukov A, Khovratovich D. Decomposition attack on SASASASAS. https:\/\/eprint.iacr.org\/2015\/646.pdf , Jan. 2017."},{"key":"1727_CR31","doi-asserted-by":"crossref","unstructured":"Bogdanov A, Isobe T. White-box cryptography revisited: Space-hard ciphers. In Proc. the 22nd ACM SIGSAC Conference on Computer and Communications Security, October 2015, pp.1058-1069.","DOI":"10.1145\/2810103.2813699"},{"issue":"5","key":"1727_CR32","doi-asserted-by":"crossref","first-page":"15","DOI":"10.1038\/scientificamerican0573-15","volume":"228","author":"H Feistel","year":"1973","unstructured":"Feistel H. Cryptography and computer privacy. Scientific American, 1973, 228(5): 15-23.","journal-title":"Scientific American"},{"key":"1727_CR33","unstructured":"Data Encryption Standard, Federal Information Processing Standard (FIPS). National Bureau of Standards, U.S. Department of Commerce, Washington D. C., Jan. 1977."},{"key":"1727_CR34","unstructured":"Rivest R L, Robshaw M J B, Sidney R, Yin Y L. The RC6TM block cipher. In Proc. the 1st Advanced Encryption Standard (AES) Conference, August 1998, pp.82-104."},{"key":"1727_CR35","unstructured":"Schneier B, Kelsey J, Whiting D, Wagner D, Hall C, Ferguson N. Twofish: A 128-bit block cipher. NIST AES Proposal, 1998. https:\/\/www.schneier.com\/academic\/archives\/1998\/06\/twofish a 128-bit bl.html, Jan. 2017."},{"key":"1727_CR36","doi-asserted-by":"crossref","unstructured":"Patarin J, Goubin L. Asymmetric cryptography with Sboxes: Is it easier than expected to design efficient asymmetric cryptosystems? In Lecture Notes in Computer Science 1334, Han Y F, Okamoto T, Qing S H (eds.), Springer, 1997, pp.369-380.","DOI":"10.1007\/BFb0028492"},{"key":"1727_CR37","doi-asserted-by":"crossref","unstructured":"Biham E. Cryptanalysis of Patarin\u2019s 2-round public key system with S boxes (2R). In Lecture Notes in Computer Science 1807, Preneel B (ed), Springer, 2000, pp.408-416.","DOI":"10.1007\/3-540-45539-6_28"},{"issue":"4","key":"1727_CR38","doi-asserted-by":"crossref","first-page":"505","DOI":"10.1007\/s00145-010-9062-1","volume":"23","author":"A Biryukov","year":"2010","unstructured":"Biryukov A, Shamir A. Structural cryptanalysis of SASAS. Journal of Cryptology, 2010, 23(4): 505-518.","journal-title":"Journal of Cryptology"},{"key":"1727_CR39","doi-asserted-by":"crossref","unstructured":"Biryukov A, Shamir A. Structural cryptanalysis of SASAS. In Lecture Notes in Computer Science 2045, Pfitzmann B (ed.), Springer, 2001, pp.395-405.","DOI":"10.1007\/3-540-44987-6_24"}],"container-title":["Journal of Computer Science and Technology"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11390-017-1727-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11390-017-1727-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11390-017-1727-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,19]],"date-time":"2019-09-19T14:18:16Z","timestamp":1568902696000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11390-017-1727-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,3]]},"references-count":39,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2017,3]]}},"alternative-id":["1727"],"URL":"https:\/\/doi.org\/10.1007\/s11390-017-1727-x","relation":{},"ISSN":["1000-9000","1860-4749"],"issn-type":[{"value":"1000-9000","type":"print"},{"value":"1860-4749","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,3]]}}}