{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,3]],"date-time":"2022-04-03T14:53:11Z","timestamp":1648997591562},"reference-count":42,"publisher":"Springer Science and Business Media LLC","issue":"11","license":[{"start":{"date-parts":[[2016,5,24]],"date-time":"2016-05-24T00:00:00Z","timestamp":1464048000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Sci. China Inf. Sci."],"published-print":{"date-parts":[[2016,11]]},"DOI":"10.1007\/s11432-015-5474-8","type":"journal-article","created":{"date-parts":[[2016,5,25]],"date-time":"2016-05-25T12:19:17Z","timestamp":1464178757000},"update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Discussion on the theoretical results of white-box cryptography"],"prefix":"10.1007","volume":"59","author":[{"given":"Tingting","family":"Lin","sequence":"first","affiliation":[]},{"given":"Xuejia","family":"Lai","sequence":"additional","affiliation":[]},{"given":"Weijia","family":"Xue","sequence":"additional","affiliation":[]},{"given":"Geshi","family":"Huang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,5,24]]},"reference":[{"key":"5474_CR1","first-page":"49","volume-title":"In: Advances in Cryptology\u2013ASIACRYPT","author":"J Borghoff","year":"2012","unstructured":"Borghoff J, Canteaut A, Gneysu T, et al. Prince\u2013a low-latency block cipher for pervasive computing applications. In: Advances in Cryptology\u2013ASIACRYPT. Berlin: Springer, 2012. 49\u201358"},{"key":"5474_CR2","first-page":"112111","volume":"57","author":"S B Wang","year":"2014","unstructured":"Wang S B, Zhu Y, Ma D, et al. Lattice-based key exchange on small integer solution problem. Sci China Inf Sci, 2014, 57: 112111","journal-title":"Sci China Inf Sci"},{"key":"5474_CR3","first-page":"112109","volume":"57","author":"Z X Chen","year":"2014","unstructured":"Chen Z X. Trace representation and linear complexity of binary sequences derived from Fermat quotients. Sci China Inf Sci, 2014, 57: 112109","journal-title":"Sci China Inf Sci"},{"key":"5474_CR4","doi-asserted-by":"crossref","first-page":"250","DOI":"10.1007\/3-540-36492-7_17","volume-title":"In: Selected Areas in Cryptography","author":"S Chow","year":"2003","unstructured":"Chow S, Eisen P, Johnson H, et al. White-box cryptography and an AES implementation. In: Selected Areas in Cryptography. Berlin: Springer, 2003. 250\u2013270"},{"key":"5474_CR5","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/978-3-540-44993-5_1","volume-title":"In: Digital Rights Management","author":"S Chow","year":"2003","unstructured":"Chow S, Eisen P, Johnson H, et al. A white-box DES implementation for DRM applications. In: Digital Rights Management. Berlin: Springer, 2003. 1\u201315"},{"key":"5474_CR6","first-page":"1","volume-title":"In: Proceedings of the 2nd International Conference on Computer Science and its Applications, Jeju","author":"Y Y Xiao","year":"2009","unstructured":"Xiao Y Y, Lai X J. A secure implementation of white-box AES. In: Proceedings of the 2nd International Conference on Computer Science and its Applications, Jeju, 2009. 1\u20136"},{"key":"5474_CR7","first-page":"278","volume-title":"In: Information Security and Cryptology-ICISC","author":"M Karroumi","year":"2011","unstructured":"Karroumi M. Protecting white-box AES with dual ciphers. In: Information Security and Cryptology-ICISC. Berlin: Springer, 2011. 278\u2013291"},{"key":"5474_CR8","first-page":"468","volume":"2011","author":"J Bringer","year":"2006","unstructured":"Bringer J, Chabanne H, Dottax E. White box cryptography: another attempt. IACR Cryptology ePrint Archive, 2006, 2011: 468","journal-title":"IACR Cryptology ePrint Archive"},{"key":"5474_CR9","first-page":"24","volume-title":"In: ChinaCrypt, Guangzhou","author":"Y Y Xiao","year":"2009","unstructured":"Xiao Y Y, Lai X J. White-box cryptography and a white-box implementation of the SMS4 algorithm. In: ChinaCrypt, Guangzhou, 2009. 24\u201334"},{"key":"5474_CR10","doi-asserted-by":"crossref","first-page":"11928","DOI":"10.3390\/s150511928","volume":"15","author":"Y Shi","year":"2015","unstructured":"Shi Y, Wei W, He Z. A lightweight white-box symmetric encryption algorithm against node capture forWSNs. Sensors, 2015, 15: 11928\u201311952","journal-title":"Sensors"},{"key":"5474_CR11","first-page":"679","volume":"1","author":"H E Link","year":"2005","unstructured":"Link H E, Neumann W D. Clarifying obfuscation: improving the security of white-box DES. In: Proceedings of IEEE International Conference on Information Technology: Coding and Computing, Las Vegas, 2005, 1: 679\u2013684","journal-title":"In: Proceedings of IEEE International Conference on Information Technology: Coding and Computing, Las Vegas"},{"key":"5474_CR12","doi-asserted-by":"crossref","first-page":"264","DOI":"10.1007\/978-3-540-77360-3_17","volume-title":"In: Selected Areas in Cryptography","author":"B Wyseur","year":"2007","unstructured":"Wyseur B, Michiels W, Gorissen P, et al. Cryptanalysis of white-box DES implementations with arbitrary external encodings. In: Selected Areas in Cryptography. Berlin: Springer, 2007. 264\u2013277"},{"key":"5474_CR13","doi-asserted-by":"crossref","first-page":"278","DOI":"10.1007\/978-3-540-77360-3_18","volume-title":"In: Selected Areas in Cryptography","author":"L Goubin","year":"2007","unstructured":"Goubin L, Masereel J M, Quisquater M. Cryptanalysis of white box DES implementations. In: Selected Areas in Cryptography. Berlin: Springer, 2007. 278\u2013295"},{"key":"5474_CR14","first-page":"227","volume-title":"In: Selected Areas in Cryptography","author":"O Billet","year":"2005","unstructured":"Billet O, Gilbert H, Ech-Chatbi C. Cryptanalysis of a white box AES implementation. In: Selected Areas in Cryptography. Berlin: Springer, 2005. 227\u2013240"},{"key":"5474_CR15","doi-asserted-by":"crossref","first-page":"414","DOI":"10.1007\/978-3-642-04159-4_27","volume-title":"In: Selected Areas in Cryptography","author":"W Michiels","year":"2009","unstructured":"Michiels W, Gorissen P, Hollmann H D L. Cryptanalysis of a generic class of white-box implementations. In: Selected Areas in Cryptography. Berlin: Springer, 2009. 414\u2013428"},{"key":"5474_CR16","doi-asserted-by":"crossref","first-page":"34","DOI":"10.1007\/978-3-642-35999-6_3","volume-title":"In: Selected Areas in Cryptography","author":"Y De Mulder","year":"2013","unstructured":"De Mulder Y, Roelse P, Preneel B. Cryptanalysis of the Xiao-Lai white-box AES Implementation. In: Selected Areas in Cryptography. Berlin: Springer, 2013. 34\u201349"},{"key":"5474_CR17","doi-asserted-by":"crossref","first-page":"265","DOI":"10.1007\/978-3-662-43414-7_14","volume-title":"In: Selected Areas in Cryptography\u2013SAC 2013","author":"T Lepoint","year":"2014","unstructured":"Lepoint T, Rivain M, De Mulder Y, et al. Two attacks on a white-box AES implementation. In: Selected Areas in Cryptography\u2013SAC 2013. Berlin: Springer, 2014. 265\u2013285"},{"key":"5474_CR18","first-page":"292","volume-title":"In: Progress in Cryptology-INDOCRYPT","author":"Y De Mulder","year":"2010","unstructured":"De Mulder Y, Wyseur B, Preneel B. Cryptanalysis of a perturbated white-box AES implementation. In: Progress in Cryptology-INDOCRYPT. Berlin: Springer, 2010. 292\u2013310"},{"key":"5474_CR19","doi-asserted-by":"crossref","first-page":"2238","DOI":"10.3724\/SP.J.1001.2013.04356","volume":"24","author":"T T Lin","year":"2013","unstructured":"Lin T T, Lai X J. Efficient attack to white-box SMS4 implementation. J Softw, 2013, 24: 2238\u20132249","journal-title":"J Softw"},{"key":"5474_CR20","doi-asserted-by":"crossref","first-page":"475","DOI":"10.1007\/978-3-662-47989-6_23","volume-title":"In: Advances in Cryptology\u2013CRYPTO 2015","author":"H Gilbert","year":"2015","unstructured":"Gilbert H, Plt J, Treger J. Key-recovery attack on the ASASA cryptosystem with expanding S-boxes. In: Advances in Cryptology\u2013CRYPTO 2015. Berlin: Springer, 2015. 475\u2013490"},{"key":"5474_CR21","doi-asserted-by":"crossref","first-page":"342","DOI":"10.1007\/978-3-642-01244-0_30","volume-title":"In: Emerging Challenges for Security, Privacy and Trust","author":"A Herzberg","year":"2009","unstructured":"Herzberg A, Shulman H, Saxena A, et al. Towards a theory of white-box security. In: Emerging Challenges for Security, Privacy and Trust. Berlin: Springer, 2009. 342\u2013352"},{"key":"5474_CR22","doi-asserted-by":"crossref","first-page":"49","DOI":"10.1007\/978-3-642-04474-8_4","volume-title":"In: Information Security","author":"A Saxena","year":"2009","unstructured":"Saxena A, Wyseur B, Preneel B. Towards security notions for white-box cryptography. In: Information Security. Berlin: Springer, 2009. 49\u201358"},{"key":"5474_CR23","first-page":"273","volume":"2008","author":"A Saxena","year":"2008","unstructured":"Saxena A, Wyseur B, Preneel B. White-box cryptography: formal notions and (im) possibility results. IACR Cryptology ePrint Archive, 2008, 2008: 273","journal-title":"IACR Cryptology ePrint Archive"},{"key":"5474_CR24","doi-asserted-by":"crossref","first-page":"1134","DOI":"10.1145\/1968.1972","volume":"27","author":"L G Valiant","year":"1984","unstructured":"Valiant L G. A theory of the learnable. Commun ACM, 1984, 27: 1134\u20131142","journal-title":"Commun ACM"},{"key":"5474_CR25","doi-asserted-by":"crossref","first-page":"607","DOI":"10.1145\/174130.174138","volume":"40","author":"N Linial","year":"1993","unstructured":"Linial N, Mansour Y, Nisan N. Constant depth circuits, fourier transform, and learnability. J ACM (JACM), 1993, 40: 607\u2013620","journal-title":"J ACM (JACM)"},{"key":"5474_CR26","first-page":"20","volume-title":"In: Advances in Cryptology- EUROCRYPT","author":"B Lynn","year":"2004","unstructured":"Lynn B, Prabhakaran M, Sahai A. Positive results and techniques for obfuscation. In: Advances in Cryptology- EUROCRYPT. Berlin: Springer, 2004. 20\u201339"},{"key":"5474_CR27","first-page":"523","volume-title":"In: Proceedings of the 37th Annual ACM Symposium on Theory of Computing","author":"H Wee","year":"2005","unstructured":"Wee H. On obfuscating point functions. In: Proceedings of the 37th Annual ACM Symposium on Theory of Computing. New York: ACM, 2005. 523\u2013532"},{"key":"5474_CR28","first-page":"443","volume-title":"In: Advances in Cryptology A SIACRYPT","author":"S Hada","year":"2000","unstructured":"Hada S. Zero-knowledge and code obfuscation. In: Advances in Cryptology A SIACRYPT. Berlin: Springer, 2000. 443\u2013457"},{"key":"5474_CR29","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/3-540-44647-8_1","volume-title":"In: Advances in cryptology CRYPTO 2001","author":"B Barak","year":"2001","unstructured":"Barak B, Goldreich O, Impagliazzo R, et al. On the (im) possibility of obfuscating programs. In: Advances in cryptology CRYPTO 2001. Berlin: Springer, 2001. 1\u201318"},{"key":"5474_CR30","doi-asserted-by":"crossref","first-page":"449","DOI":"10.1007\/978-3-540-70583-3_37","volume-title":"In: Automata, Languages and Programming","author":"R Canetti","year":"2008","unstructured":"Canetti R, Dakdouk R R. Extractable perfectly one-way functions. In: Automata, Languages and Programming. Berlin: Springer, 2008. 449\u2013460"},{"key":"5474_CR31","doi-asserted-by":"crossref","first-page":"72","DOI":"10.1007\/978-3-642-11799-2_5","volume":"10","author":"R Canetti","year":"2010","unstructured":"Canetti R, Rothblum G N, Varia M. Obfuscation of hyperplane membership. In: Theory of Cryptography. Berlin: Springer, 2010, 10: 72\u201389","journal-title":"In: Theory of Cryptography. Berlin: Springer"},{"key":"5474_CR32","doi-asserted-by":"crossref","first-page":"26","DOI":"10.1007\/978-3-642-54242-8_2","volume-title":"In: Theory of Cryptography","author":"B Barak","year":"2014","unstructured":"Barak B, Bitansky N, Canetti R, et al. Obfuscation for evasive functions. In: Theory of Cryptography. Berlin: Springer, 2014. 26\u201351"},{"key":"5474_CR33","first-page":"553","volume-title":"In: Proceedings of IEEE 46th Annual Symposium on Foundations of Computer Science, Los Alamitos","author":"S Goldwasser","year":"2005","unstructured":"Goldwasser S, Kalai Y T. On the impossibility of obfuscation with auxiliary input. In: Proceedings of IEEE 46th Annual Symposium on Foundations of Computer Science, Los Alamitos, 2005. 553\u2013562"},{"key":"5474_CR34","first-page":"40","volume-title":"In: Proceedings of IEEE 54th Annual Symposium on Foundations of Computer Science (FOCS), Berkeley","author":"S Garg","year":"2013","unstructured":"Garg S, Gentry C, Halevi S, et al. Candidate indistinguishability obfuscation and functional encryption for all circuits. In: Proceedings of IEEE 54th Annual Symposium on Foundations of Computer Science (FOCS), Berkeley, 2013. 40\u201349"},{"key":"5474_CR35","first-page":"475","volume-title":"In: Proceedings of the 46th Annual ACM Symposium on Theory of Computing","author":"A Sahai","year":"2014","unstructured":"Sahai A, Waters B. How to use indistinguishability obfuscation: deniable encryption, and more. In: Proceedings of the 46th Annual ACM Symposium on Theory of Computing. New York: ACM, 2014. 475\u2013484"},{"key":"5474_CR36","first-page":"201","volume-title":"In: Advances in Cryptology-EUROCRYPT","author":"S Hohenberger","year":"2014","unstructured":"Hohenberger S, Sahai A, Waters B. Replacing a random oracle: full domain hash from indistinguishability obfuscation. In: Advances in Cryptology-EUROCRYPT. Berlin: Springer, 2014. 201\u2013220"},{"key":"5474_CR37","doi-asserted-by":"crossref","first-page":"638","DOI":"10.1007\/978-3-662-46497-7_25","volume-title":"In: Theory of Cryptography","author":"O Pandey","year":"2015","unstructured":"Pandey O, Prabhakaran M, Sahai A. Obfuscation-based non-black-box simulation and four message concurrent zero knowledge for np. In: Theory of Cryptography. Berlin: Springer, 2015. 638\u2013667"},{"key":"5474_CR38","doi-asserted-by":"crossref","first-page":"194","DOI":"10.1007\/978-3-540-70936-7_11","volume-title":"In: Theory of Cryptography","author":"S Goldwasser","year":"2007","unstructured":"Goldwasser S, Rothblum G N. On best-possible obfuscation. In: Theory of Cryptography. Berlin: Springer, 2007. 194\u2013213"},{"key":"5474_CR39","doi-asserted-by":"crossref","first-page":"6","DOI":"10.1145\/2160158.2160159","volume":"59","author":"B Barak","year":"2012","unstructured":"Barak B, Goldreich O, Impagliazzo R, et al. On the (im) possibility of obfuscating programs. J ACM (JACM), 2012, 59: 6","journal-title":"J ACM (JACM)"},{"key":"5474_CR40","first-page":"71","volume-title":"In: Advances in Cryptology CRYPTO","author":"N Bitansky","year":"2014","unstructured":"Bitansky N, Canetti R, Cohn H, et al. The impossibility of obfuscation with auxiliary input or a universal simulator. In: Advances in Cryptology CRYPTO. Berlin: Springer, 2014. 71\u201389"},{"key":"5474_CR41","first-page":"689","volume":"2013","author":"P Ananth","year":"2013","unstructured":"Ananth P, Boneh D, Garg S, et al. Differing-inputs obfuscation and applications. IACR Cryptology ePrint Archive, 2013, 2013: 689","journal-title":"IACR Cryptology ePrint Archive"},{"key":"5474_CR42","doi-asserted-by":"crossref","first-page":"52","DOI":"10.1007\/978-3-642-54242-8_3","volume-title":"In: Theory of Cryptography","author":"E Boyle","year":"2014","unstructured":"Boyle E, Chung K M, Pass R. On extractability obfuscation. In: Theory of Cryptography. Berlin: Springer, 2014. 52\u201373"}],"container-title":["Science China Information Sciences"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11432-015-5474-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11432-015-5474-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11432-015-5474-8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,8]],"date-time":"2019-09-08T21:03:30Z","timestamp":1567976610000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11432-015-5474-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,5,24]]},"references-count":42,"journal-issue":{"issue":"11","published-print":{"date-parts":[[2016,11]]}},"alternative-id":["5474"],"URL":"https:\/\/doi.org\/10.1007\/s11432-015-5474-8","relation":{},"ISSN":["1674-733X","1869-1919"],"issn-type":[{"value":"1674-733X","type":"print"},{"value":"1869-1919","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,5,24]]},"article-number":"112101"}}