{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,2]],"date-time":"2026-01-02T07:34:10Z","timestamp":1767339250980,"version":"3.37.3"},"reference-count":42,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2019,4,2]],"date-time":"2019-04-02T00:00:00Z","timestamp":1554163200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"name":"EU H2020 research and innovation programme","award":["ECRYPT-NET (No. 643161)"],"award-info":[{"award-number":["ECRYPT-NET (No. 643161)"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Cryptogr Eng"],"published-print":{"date-parts":[[2020,4]]},"DOI":"10.1007\/s13389-019-00207-5","type":"journal-article","created":{"date-parts":[[2019,4,2]],"date-time":"2019-04-02T11:05:34Z","timestamp":1554203134000},"page":"49-66","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":17,"title":["How to reveal the secrets of an obscure white-box implementation"],"prefix":"10.1007","volume":"10","author":[{"given":"Louis","family":"Goubin","sequence":"first","affiliation":[]},{"given":"Pascal","family":"Paillier","sequence":"additional","affiliation":[]},{"given":"Matthieu","family":"Rivain","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8478-5065","authenticated-orcid":false,"given":"Junwei","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,4,2]]},"reference":[{"key":"207_CR1","unstructured":"CHES 2017 Capture the Flag Challenge\u2014The WhibOx Contest, an ECRYPT white-box cryptography competition. \nhttps:\/\/whibox.cr.yp.to\/\n\n. Accessed Oct 2017"},{"key":"207_CR2","unstructured":"ISO\/IEC 8859-1:1998: Information technology\u20148-bit single-byte coded graphic character sets\u2014Part 1: Latin Alphabet No. 1. \nhttps:\/\/www.iso.org\/standard\/28245.html\n\n. Accessed Oct 2017"},{"key":"207_CR3","unstructured":"WhibOx 2016: White-box cryptography and obfuscation. \nhttps:\/\/www.cryptoexperts.com\/whibox2016\/\n\n. Accessed Oct 2017"},{"key":"207_CR4","doi-asserted-by":"crossref","unstructured":"Barak, B., Goldreich, O., Impagliazzo, R., Rudich, S., Sahai, A., Vadhan, S.P., Yang, K.: On the (im)possibility of obfuscating programs. In: Kilian, J. (ed.) CRYPTO 2001, LNCS, vol. 2139, pp. 1\u201318. Springer, Heidelberg (2001)","DOI":"10.1007\/3-540-44647-8_1"},{"key":"207_CR5","unstructured":"Beimel, A.: Secret-sharing schemes: a survey. In: Chee, Y.M., Guo, Z., Ling, S., Shao, F., Tang, Y., Wang, H., Xing, C. (eds.) Coding and Cryptology\u2014Third International Workshop, IWCC 2011, Qingdao, China, May 30\u2013June 3, 2011. Proceedings, Lecture Notes in Computer Science, vol. 6639, pp. 11\u201346. Springer (2011)"},{"key":"207_CR6","doi-asserted-by":"crossref","unstructured":"Billet, O., Gilbert, H., Ech-Chatbi, C.: Cryptanalysis of a white box AES implementation. In: Handschuh, H., Hasan, A. (eds.) SAC 2004, LNCS, vol. 3357, pp. 227\u2013240. Springer, Heidelberg (2004)","DOI":"10.1007\/978-3-540-30564-4_16"},{"key":"207_CR7","doi-asserted-by":"publisher","unstructured":"Biryukov, A., Udovenko, A.: Attacks and countermeasures for white-box designs. In: Peyrin, T., Galbraith, S. (eds.) Advances in Cryptology\u2014ASIACRYPT 2018. Lecture Notes in Computer Science, vol. 11273, pp. 373\u2013402. Springer, Cham (2018). \nhttps:\/\/doi.org\/10.1007\/978-3-030-03329-3_13","DOI":"10.1007\/978-3-030-03329-3_13"},{"key":"207_CR8","doi-asserted-by":"publisher","unstructured":"Bogdanov, A., Rivain, M., Vejre, P.S., Wang, J.: Higher-order DCA against standard side-channel countermeasures. In: Polian, I., St\u00f6ttinger, M. (eds.) Constructive Side-Channel Analysis and Secure Design. Lecture Notes in Computer Science, vol. 11421, pp. 118\u2013141. Springer, Cham (2019). \nhttps:\/\/doi.org\/10.1007\/978-3-030-16350-1_8","DOI":"10.1007\/978-3-030-16350-1_8"},{"key":"207_CR9","doi-asserted-by":"crossref","unstructured":"Bos, J.W., Hubain, C., Michiels, W., Teuwen, P.: Differential computation analysis: hiding your white-box designs is not enough. In: Gierlichs, B., Poschmann, A.Y. (eds.) CHES\u00a02016, LNCS, vol. 9813, pp. 215\u2013236. Springer, Heidelberg (2016)","DOI":"10.1007\/978-3-662-53140-2_11"},{"key":"207_CR10","unstructured":"Bringer, J., Chabanne, H., Dottax, E.: White box cryptography: another attempt. Cryptology ePrint Archive, Report 2006\/468. \nhttps:\/\/eprint.iacr.org\/2006\/468\/20061220:083203\n\n (2006)"},{"key":"207_CR11","doi-asserted-by":"crossref","unstructured":"Chow, S., Eisen, P., Johnson, H., Van\u00a0Oorschot, P.C.: A white-box des implementation for DRM applications. In: Digital Rights Management Workshop, vol.\u00a02696, pp.\u00a01\u201315. Springer (2002)","DOI":"10.1007\/978-3-540-44993-5_1"},{"key":"207_CR12","doi-asserted-by":"crossref","unstructured":"Chow, S., Eisen, P.A., Johnson, H., van Oorschot, P.C.: White-box cryptography and an AES implementation. In: Nyberg, K., Heys, H.M. (eds.) SAC 2002, LNCS, vol.\u00a02595, pp.\u00a0250\u2013270. Springer, Heidelberg (2003)","DOI":"10.1007\/3-540-36492-7_17"},{"key":"207_CR13","unstructured":"Collberg, C., Thomborson, C., Low, D.: A taxonomy of obfuscating transformations. Department of Computer Science, The University of Auckland, New Zealand, Technical report (1997)"},{"key":"207_CR14","volume-title":"AES\u2014The Advanced Encryption Standard: The Design of Rijndael","author":"J Daemen","year":"2013","unstructured":"Daemen, J., Rijmen, V.: AES\u2014The Advanced Encryption Standard: The Design of Rijndael. Springer, Berlin (2013)"},{"key":"207_CR15","doi-asserted-by":"crossref","unstructured":"Delerabl\u00e9e, C., Lepoint, T., Paillier, P., Rivain, M.: White-box security notions for symmetric encryption schemes. In: Lange, T., Lauter, K., Lisonek, P. (eds.) SAC 2013, LNCS, vol.\u00a08282, pp.\u00a0247\u2013264. Springer, Heidelberg (2014)","DOI":"10.1007\/978-3-662-43414-7_13"},{"key":"207_CR16","doi-asserted-by":"crossref","unstructured":"Garg, S., Gentry, C., Halevi, S.: Candidate multilinear maps from ideal lattices. In: Johansson, T., Nguyen, P.Q. (eds.) EUROCRYPT 2013, LNCS, vol.\u00a07881, pp.\u00a01\u201317. Springer, Heidelberg (2013)","DOI":"10.1007\/978-3-642-38348-9_1"},{"key":"207_CR17","doi-asserted-by":"crossref","unstructured":"Garg, S., Gentry, C., Halevi, S., Raykova, M., Sahai, A., Waters, B.: Candidate indistinguishability obfuscation and functional encryption for all circuits. In: 54th FOCS, pp.\u00a040\u201349. IEEE Computer Society Press (2013)","DOI":"10.1109\/FOCS.2013.13"},{"key":"207_CR18","volume-title":"Matrix Computations. Johns Hopkins Studies in the Mathematical Sciences","author":"G Golub","year":"1996","unstructured":"Golub, G., Van Loan, C.: Matrix Computations. Johns Hopkins Studies in the Mathematical Sciences. Johns Hopkins University Press, Baltimore (1996)"},{"key":"207_CR19","doi-asserted-by":"crossref","unstructured":"Goubin, L., Masereel, J.-M., Quisquater, M.: Cryptanalysis of white box DES implementations. In: Adams, C.M., Miri, A., Wiener, M.J. (eds.) SAC 2007, LNCS, vol.\u00a04876, pp.\u00a0278\u2013295. Springer, Heidelberg (2007)","DOI":"10.1007\/978-3-540-77360-3_18"},{"key":"207_CR20","doi-asserted-by":"crossref","unstructured":"Ishai, Y., Sahai, A., Wagner, D.: Private circuits: securing hardware against probing attacks. In: Boneh, D. (ed.) CRYPTO 2003, LNCS, vol.\u00a02729, pp.\u00a0463\u2013481. Springer, Heidelberg (2003)","DOI":"10.1007\/978-3-540-45146-4_27"},{"key":"207_CR21","doi-asserted-by":"crossref","unstructured":"Jacob, M., Boneh, D., Felten, E.: Attacking an obfuscated cipher by injecting faults. In: Digital Rights Management Workshop, vol.\u00a02696, pp.\u00a016\u201331. Springer (2002)","DOI":"10.1007\/978-3-540-44993-5_2"},{"key":"207_CR22","doi-asserted-by":"crossref","unstructured":"Karroumi, M.: Protecting white-box AES with dual ciphers. In: Rhee, K.H., Nyang, D. (eds.) ICISC 10, LNCS, vol.\u00a06829, pp.\u00a0278\u2013291. Springer, Heidelberg (2011)","DOI":"10.1007\/978-3-642-24209-0_19"},{"key":"207_CR23","doi-asserted-by":"crossref","unstructured":"Kocher, P.C., Jaffe, J., Jun, B.: Differential power analysis. In: Wiener, M.J. (ed.) CRYPTO\u201999, LNCS, vol.\u00a01666, pp.\u00a0388\u2013397, Springer, Heidelberg (1999)","DOI":"10.1007\/3-540-48405-1_25"},{"key":"207_CR24","unstructured":"Lepoint, T., Rivain, M.: Another nail in the coffin of white-box AES implementations. Cryptology ePrint Archive, Report 2013\/455. \nhttps:\/\/eprint.iacr.org\/2013\/455\/20130723:130134\n\n (2013)"},{"key":"207_CR25","doi-asserted-by":"crossref","unstructured":"Lepoint, T., Rivain, M., Mulder, Y.D., Roelse, P., Preneel, B.: Two attacks on a white-box AES implementation. In: Lange, T., Lauter, K., Lisonek, P. (eds.) SAC 2013, LNCS, vol.\u00a08282, pp.\u00a0265\u2013285. Springer, Heidelberg (2014)","DOI":"10.1007\/978-3-662-43414-7_14"},{"key":"207_CR26","doi-asserted-by":"crossref","unstructured":"Lin, H.: Indistinguishability obfuscation from constant-degree graded encoding schemes. In: Fischlin, M., Coron, J.-S. (eds.) EUROCRYPT\u00a02016, Part\u00a0I, LNCS, vol.\u00a09665, pp.\u00a028\u201357. Springer, Heidelberg (2016)","DOI":"10.1007\/978-3-662-49890-3_2"},{"key":"207_CR27","doi-asserted-by":"crossref","unstructured":"Lin, H.: Indistinguishability obfuscation from SXDH on 5-linear maps and locality-5 PRGs. In: Katz, J., Shacham, H. (eds.) CRYPTO\u00a02017, Part\u00a0I, LNCS, vol.\u00a010401. Springer, Heidelberg, pp.\u00a0599\u2013629 (2017)","DOI":"10.1007\/978-3-319-63688-7_20"},{"key":"207_CR28","doi-asserted-by":"crossref","unstructured":"Lin, H., Tessaro, S.: Indistinguishability obfuscation from trilinear maps and block-wise local PRGs. In: Katz, J., Shacham, H. (eds.) CRYPTO\u00a02017, Part\u00a0I, LNCS, vol.\u00a010401, pp.\u00a0630\u2013660. Springer, Heidelberg (2017)","DOI":"10.1007\/978-3-319-63688-7_21"},{"key":"207_CR29","doi-asserted-by":"crossref","unstructured":"Link, H.E., Neumann, W.D.: Clarifying obfuscation: improving the security of white-box des. In: International Conference on Information Technology: Coding and Computing (ITCC\u201905)\u2014Volume II, vol.\u00a01, pp.\u00a0679\u2013684 (2005)","DOI":"10.1109\/ITCC.2005.100"},{"key":"207_CR30","doi-asserted-by":"crossref","unstructured":"Mulder, Y.D., Roelse, P., Preneel, B.: Cryptanalysis of the Xiao-Lai white-box AES implementation. In: Knudsen, L.R., Wu, H. (eds.) SAC 2012, LNCS, vol.\u00a07707, pp.\u00a034\u201349. Springer, Heidelberg (2013)","DOI":"10.1007\/978-3-642-35999-6_3"},{"key":"207_CR31","unstructured":"Mulder, Y.D., Roelse, P., Preneel, B.: Revisiting the BGE attack on a white-box AES implementation. Cryptology ePrint Archive, Report 2013\/450. \nhttp:\/\/eprint.iacr.org\/2013\/450\n\n (2013)"},{"key":"207_CR32","doi-asserted-by":"crossref","unstructured":"Mulder, Y.D., Wyseur, B., Preneel, B.: Cryptanalysis of a perturbated white-box AES implementation. In: Gong, G., Gupta, K.C. (eds.) INDOCRYPT\u00a02010, LNCS, vol.\u00a06498, pp.\u00a0292\u2013310. Springer, Heidelberg (2010)","DOI":"10.1007\/978-3-642-17401-8_21"},{"key":"207_CR33","doi-asserted-by":"publisher","first-page":"066133","DOI":"10.1103\/PhysRevE.69.066133","volume":"69","author":"MEJ Newman","year":"2004","unstructured":"Newman, M.E.J.: Fast algorithm for detecting community structure in networks. Phys. Rev. E 69, 066133 (2004)","journal-title":"Phys. Rev. E"},{"key":"207_CR34","doi-asserted-by":"crossref","unstructured":"Rivain, M., Prouff, E.: Provably secure higher-order masking of AES. In: Mangard, S., Standaert, F.-X. (eds.) CHES\u00a02010, LNCS, vol.\u00a06225, , pp.\u00a0413\u2013427. Springer, Heidelberg (2010)","DOI":"10.1007\/978-3-642-15031-9_28"},{"key":"207_CR35","unstructured":"Rolles, R.: Unpacking virtualization obfuscators. In: Proceedings of the 3rd USENIX conference on offensive technologies (Berkeley, CA, USA), WOOT\u201909, p.\u00a01. USENIX Association (2009)"},{"key":"207_CR36","doi-asserted-by":"crossref","unstructured":"Sahai, A., Waters, B.: How to use indistinguishability obfuscation: deniable encryption, and more. In: Shmoys, D.B. (ed.) 46th ACM STOC, pp.\u00a0475\u2013484. ACM Press (2014)","DOI":"10.1145\/2591796.2591825"},{"key":"207_CR37","unstructured":"Sanfelix, E., Mune, C., Haas, J.D.: Unboxing the white-box\u2014practical attacks against obfuscated ciphers. \nhttps:\/\/www.blackhat.com\/docs\/eu-15\/materials\/eu-15-Sanfelix-Unboxing-The-White-Box-Practical-Attacks-Against-Obfuscated-Ciphers-wp.pdf\n\n (2015). Accessed Oct 2017"},{"key":"207_CR38","doi-asserted-by":"crossref","unstructured":"Saxena, A., Wyseur, B., Preneel, B.: Towards security notions for white-box cryptography. In: Samarati, P., Yung, M., Martinelli, F., Ardagna, C.A. (eds.) ISC\u00a02009, LNCS, vol.\u00a05735, pp.\u00a049\u201358. Springer, Heidelberg (2009)","DOI":"10.1007\/978-3-642-04474-8_4"},{"issue":"4","key":"207_CR39","doi-asserted-by":"publisher","first-page":"354","DOI":"10.1007\/BF02165411","volume":"13","author":"V Strassen","year":"1969","unstructured":"Strassen, V.: Gaussian elimination is not optimal. Numer. Math. 13(4), 354\u2013356 (1969)","journal-title":"Numer. Math."},{"key":"207_CR40","doi-asserted-by":"crossref","unstructured":"Wyseur, B., Michiels, W., Gorissen, P., Preneel, B.: Cryptanalysis of white-box DES implementations with arbitrary external encodings. In: Adams, C.M., Miri, A., Wiener, M.J. (eds.) SAC 2007, LNCS, vol.\u00a04876, pp.\u00a0264\u2013277. Springer, Heidelberg (2007)","DOI":"10.1007\/978-3-540-77360-3_17"},{"key":"207_CR41","unstructured":"Xiao, Y., Lai, X.: A secure implementation of white-box aes. In: 2nd International Conference on Computer Science and its Applications, 2009. CSA\u201909. IEEE, pp.\u00a01\u20136 (2009)"},{"key":"207_CR42","doi-asserted-by":"crossref","unstructured":"Yadegari, B., Johannesmeyer, B., Whitely, B., Debray, S.: A generic approach to automatic deobfuscation of executable code. In: 2015 IEEE Symposium on Security and Privacy, pp.\u00a0674\u2013691. IEEE Computer Society Press (2015)","DOI":"10.1109\/SP.2015.47"}],"container-title":["Journal of Cryptographic Engineering"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s13389-019-00207-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s13389-019-00207-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s13389-019-00207-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,4,2]],"date-time":"2020-04-02T09:52:27Z","timestamp":1585821147000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s13389-019-00207-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,4,2]]},"references-count":42,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2020,4]]}},"alternative-id":["207"],"URL":"https:\/\/doi.org\/10.1007\/s13389-019-00207-5","relation":{},"ISSN":["2190-8508","2190-8516"],"issn-type":[{"type":"print","value":"2190-8508"},{"type":"electronic","value":"2190-8516"}],"subject":[],"published":{"date-parts":[[2019,4,2]]},"assertion":[{"value":"14 May 2018","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"13 March 2019","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"2 April 2019","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}