{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T18:37:49Z","timestamp":1761676669535,"version":"3.37.3"},"reference-count":36,"publisher":"Oxford University Press (OUP)","issue":"12","license":[{"start":{"date-parts":[[2018,7,18]],"date-time":"2018-07-18T00:00:00Z","timestamp":1531872000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/academic.oup.com\/journals\/pages\/open_access\/funder_policies\/chorus\/standard_publication_model"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61702331","71774111","61472251","U1536101"],"award-info":[{"award-number":["61702331","71774111","61472251","U1536101"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100002858","name":"China Postdoctoral Science Foundation","doi-asserted-by":"publisher","award":["2017M621471"],"award-info":[{"award-number":["2017M621471"]}],"id":[{"id":"10.13039\/501100002858","id-type":"DOI","asserted-by":"publisher"}]},{"name":"National Cryptography Development Fund","award":["MMJJ20170105"],"award-info":[{"award-number":["MMJJ20170105"]}]},{"name":"Science and Technology on Communication Security Laboratory"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,12,1]]},"DOI":"10.1093\/comjnl\/bxy068","type":"journal-article","created":{"date-parts":[[2018,6,19]],"date-time":"2018-06-19T15:14:10Z","timestamp":1529421250000},"page":"1783-1790","source":"Crossref","is-referenced-by-count":8,"title":["Security Evaluation and Improvement of a White-Box SMS4 Implementation Based on Affine Equivalence Algorithm"],"prefix":"10.1093","volume":"61","author":[{"given":"Tingting","family":"Lin","sequence":"first","affiliation":[{"name":"Cryptography and Information Security Laboratory, Department of Computer Science, Shanghai Jiao Tong University, Shanghai, China"}]},{"given":"Hailun","family":"Yan","sequence":"additional","affiliation":[{"name":"Cryptography and Information Security Laboratory, Department of Computer Science, Shanghai Jiao Tong University, Shanghai, China"}]},{"given":"Xuejia","family":"Lai","sequence":"additional","affiliation":[{"name":"Cryptography and Information Security Laboratory, Department of Computer Science, Shanghai Jiao Tong University, Shanghai, China"},{"name":"Westone Cryptologic Research Center, Beijing, China"}]},{"given":"Yixin","family":"Zhong","sequence":"additional","affiliation":[{"name":"Cryptography and Information Security Laboratory, Department of Computer Science, Shanghai Jiao Tong University, Shanghai, China"}]},{"given":"Yin","family":"Jia","sequence":"additional","affiliation":[{"name":"Cryptography and Information Security Laboratory, Department of Computer Science, Shanghai Jiao Tong University, Shanghai, China"}]}],"member":"286","published-online":{"date-parts":[[2018,7,18]]},"reference":[{"key":"key\n\t\t\t\t2018112402024794500_bxy068C1","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s11432-011-4370-0","article-title":"IK-CPA security implies IE-CCA security in the random oracle model","volume":"56","author":"Xue","year":"2013","journal-title":"Sci. China Inf. Sci."},{"key":"key\n\t\t\t\t2018112402024794500_bxy068C2","doi-asserted-by":"crossref","first-page":"2005","DOI":"10.1007\/s11432-010-4076-8","article-title":"Short-ciphertext and BDH-based CCA2 secure certificateless encryption","volume":"53","author":"Sun","year":"2010","journal-title":"Sci China Inf Sci"},{"key":"key\n\t\t\t\t2018112402024794500_bxy068C3","first-page":"1","volume-title":"A White-Box DES Implementation for DRM Applications. Digital Rights Management","author":"Chow","year":"2003"},{"key":"key\n\t\t\t\t2018112402024794500_bxy068C4","doi-asserted-by":"crossref","first-page":"250","DOI":"10.1007\/3-540-36492-7_17","volume-title":"White-Box Cryptography and an AES Implementation. Selected Areas in Cryptography","author":"Chow","year":"2003"},{"key":"key\n\t\t\t\t2018112402024794500_bxy068C5","first-page":"16","volume-title":"Attacking an Obfuscated Cipher by Injecting Faults. Digital Rights Management","author":"Jacob","year":"2003"},{"year":"2005","author":"Link","key":"key\n\t\t\t\t2018112402024794500_bxy068C6"},{"key":"key\n\t\t\t\t2018112402024794500_bxy068C7","first-page":"264","volume-title":"Cryptanalysis of White-Box DES Implementations with Arbitrary External Encodings. Selected Areas in Cryptography","author":"Wyseur","year":"2007"},{"key":"key\n\t\t\t\t2018112402024794500_bxy068C8","doi-asserted-by":"crossref","first-page":"278","DOI":"10.1007\/978-3-540-77360-3_18","volume-title":"Cryptanalysis of White Box DES Implementations. Selected Areas in Cryptography","author":"Goubin","year":"2007"},{"key":"key\n\t\t\t\t2018112402024794500_bxy068C9","first-page":"227","volume-title":"Cryptanalysis of a White Box AES Implementation. Elected Areas in Cryptography","author":"Billet","year":"2005"},{"key":"key\n\t\t\t\t2018112402024794500_bxy068C10","first-page":"414","volume-title":"Cryptanalysis of a Generic Class of White-Box Implementations. Selected Areas in Cryptography","author":"Michiels","year":"2009"},{"key":"key\n\t\t\t\t2018112402024794500_bxy068C11","doi-asserted-by":"crossref","first-page":"33","DOI":"10.1007\/3-540-39200-9_3","volume-title":"A Toolbox for Cryptanalysis: Linear and Affine Equivalence Algorithms. Advances in Cryptology-EUROCRYPT 2003","author":"Biryukov","year":"2003"},{"key":"key\n\t\t\t\t2018112402024794500_bxy068C12","doi-asserted-by":"crossref","first-page":"265","DOI":"10.1007\/978-3-662-43414-7_14","volume-title":"Two Attacks on a White-Box AES Implementation. Selected Areas in Cryptography--SAC 2013","author":"Lepoint","year":"2014"},{"year":"2009","author":"Xiao","key":"key\n\t\t\t\t2018112402024794500_bxy068C13"},{"key":"key\n\t\t\t\t2018112402024794500_bxy068C14","doi-asserted-by":"crossref","first-page":"278","DOI":"10.1007\/978-3-642-24209-0_19","volume-title":"Protecting White-Box AES with Dual Ciphers. Information Security and Cryptology-ICISC 2010","author":"Karroumi","year":"2011"},{"year":"2006","author":"Bringer","key":"key\n\t\t\t\t2018112402024794500_bxy068C15"},{"year":"2009","author":"Xiao","key":"key\n\t\t\t\t2018112402024794500_bxy068C16"},{"key":"key\n\t\t\t\t2018112402024794500_bxy068C17","doi-asserted-by":"crossref","first-page":"507","DOI":"10.1016\/j.future.2018.04.011","article-title":"Towards practical white-box lightweight block cipher implementations for IoTs","volume":"86","author":"Zhou","year":"2018","journal-title":"Future Generation Comput. Syst."},{"key":"key\n\t\t\t\t2018112402024794500_bxy068C18","first-page":"34","volume-title":"Cryptanalysis of the Xiao-Lai White-Box AES Implementation. Selected Areas in Cryptography","author":"De Mulder","year":"2013"},{"key":"key\n\t\t\t\t2018112402024794500_bxy068C19","doi-asserted-by":"crossref","first-page":"292","DOI":"10.1007\/978-3-642-17401-8_21","volume-title":"Cryptanalysis of a Perturbated White-Box AES Implementation. Progress in Cryptology-INDOCRYPT 2010","author":"De Mulder","year":"2010"},{"key":"key\n\t\t\t\t2018112402024794500_bxy068C20","first-page":"2238","article-title":"Efficient attack to white-box SMS4 implementation","volume":"24","author":"Lin","year":"2013","journal-title":"Ruan Jian Xue Bao\/Journal of Software"},{"year":"2018","author":"Minaud","key":"key\n\t\t\t\t2018112402024794500_bxy068C21"},{"year":"2015","author":"Dinur","key":"key\n\t\t\t\t2018112402024794500_bxy068C22"},{"key":"key\n\t\t\t\t2018112402024794500_bxy068C23","first-page":"63","volume-title":"Cryptographic Schemes Based on the ASASA Structure: Black-Box, White-Box, and Public-Key. Advances in Cryptology\u2014ASIACRYPT 2014","author":"Biryukov","year":"2014"},{"year":"2015","author":"Bogdanov","key":"key\n\t\t\t\t2018112402024794500_bxy068C24"},{"year":"2016","author":"Bogdanov","key":"key\n\t\t\t\t2018112402024794500_bxy068C25"},{"year":"2016","author":"Shi","key":"key\n\t\t\t\t2018112402024794500_bxy068C26"},{"key":"key\n\t\t\t\t2018112402024794500_bxy068C27","doi-asserted-by":"crossref","first-page":"44","DOI":"10.1109\/TCE.2017.014722","article-title":"Light-weight white-box encryption scheme with random padding for wearable consumer electronic devices","volume":"63","author":"Shi","year":"2017","journal-title":"IEEE Trans. Consum Electron"},{"issue":"7","key":"key\n\t\t\t\t2018112402024794500_bxy068C28","doi-asserted-by":"crossref","first-page":"1054","DOI":"10.1093\/comjnl\/bxv119","article-title":"An AES-like cipher and its white-box implementation[J]","volume":"59","author":"Bai","year":"2016","journal-title":"Comput. J."},{"key":"key\n\t\t\t\t2018112402024794500_bxy068C29","first-page":"215","volume-title":"CHES 2016, Vol. 9813 of LNCS","author":"Bos","year":"2016"},{"key":"key\n\t\t\t\t2018112402024794500_bxy068C30","first-page":"388","volume-title":"CRYPTO\u201999, Vol. 1666 of LNCS","author":"Kocher","year":"1999"},{"year":"2015","author":"Sanfelix","key":"key\n\t\t\t\t2018112402024794500_bxy068C31"},{"key":"key\n\t\t\t\t2018112402024794500_bxy068C32","doi-asserted-by":"crossref","first-page":"11928","DOI":"10.3390\/s150511928","article-title":"A lightweight white-box symmetric encryption algorithm against node capture for WSNs","volume":"15","author":"Shi","year":"2015","journal-title":"Sensors"},{"year":"2006","author":"Beijing Data Security Technology Co. Ltd","key":"key\n\t\t\t\t2018112402024794500_bxy068C33"},{"key":"key\n\t\t\t\t2018112402024794500_bxy068C34","doi-asserted-by":"crossref","first-page":"160","DOI":"10.1007\/3-540-36178-2_10","volume-title":"In How Many Ways Can You Write Rijndael? Advances in Cryptology-ASIACRYPT 2002","author":"Barkan","year":"2002"},{"key":"key\n\t\t\t\t2018112402024794500_bxy068C35","doi-asserted-by":"crossref","first-page":"142","DOI":"10.1007\/11506447_12","volume-title":"More Dual Rijndaels. Advanced Encryption Standard-AES","author":"Raddum","year":"2005"},{"key":"key\n\t\t\t\t2018112402024794500_bxy068C36","first-page":"34","volume-title":"Cryptanalysis of the Xiao-Lai White-Box AES Implementation. Selected Areas in Cryptography","author":"De Mulder","year":"2013"}],"container-title":["The Computer Journal"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/academic.oup.com\/comjnl\/article-pdf\/61\/12\/1783\/26725004\/bxy068.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,19]],"date-time":"2019-10-19T13:53:45Z","timestamp":1571493225000},"score":1,"resource":{"primary":{"URL":"https:\/\/academic.oup.com\/comjnl\/article\/61\/12\/1783\/5055352"}},"subtitle":[],"editor":[{"given":"Chris","family":"Mitchell","sequence":"additional","affiliation":[]}],"short-title":[],"issued":{"date-parts":[[2018,7,18]]},"references-count":36,"journal-issue":{"issue":"12","published-online":{"date-parts":[[2018,7,18]]},"published-print":{"date-parts":[[2018,12,1]]}},"URL":"https:\/\/doi.org\/10.1093\/comjnl\/bxy068","relation":{},"ISSN":["0010-4620","1460-2067"],"issn-type":[{"type":"print","value":"0010-4620"},{"type":"electronic","value":"1460-2067"}],"subject":[],"published-other":{"date-parts":[[2018,12]]},"published":{"date-parts":[[2018,7,18]]}}}