{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T20:21:55Z","timestamp":1740169315835,"version":"3.37.3"},"reference-count":28,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100010880","name":"Science and Technology Project of State Grid Corporation of China","doi-asserted-by":"publisher","award":["5700-202118181A-0-0-00"],"award-info":[{"award-number":["5700-202118181A-0-0-00"]}],"id":[{"id":"10.13039\/501100010880","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2023]]},"DOI":"10.1109\/access.2023.3290211","type":"journal-article","created":{"date-parts":[[2023,6,28]],"date-time":"2023-06-28T17:27:58Z","timestamp":1687973278000},"page":"68717-68727","source":"Crossref","is-referenced-by-count":1,"title":["A Lightweight Nonlinear White-Box SM4 Implementation Applied to Edge IoT Agents"],"prefix":"10.1109","volume":"11","author":[{"given":"Chao","family":"Jin","sequence":"first","affiliation":[{"name":"College of Electrical Engineering, Zhejiang University, Hangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8678-3805","authenticated-orcid":false,"given":"Zhejing","family":"Bao","sequence":"additional","affiliation":[{"name":"College of Electrical Engineering, Zhejiang University, Hangzhou, China"}]},{"given":"Weiwei","family":"Miao","sequence":"additional","affiliation":[{"name":"Information and Telecommunication Branch, State Grid Jiangsu Electric Power Company, Nanjing, China"}]},{"given":"Zeng","family":"Zeng","sequence":"additional","affiliation":[{"name":"Information and Telecommunication Branch, State Grid Jiangsu Electric Power Company, Nanjing, China"}]},{"given":"Xiaogang","family":"Wei","sequence":"additional","affiliation":[{"name":"Nari Group Corporation, State Grid Electric Power Research Institute, Nanjing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9172-7800","authenticated-orcid":false,"given":"Rui","family":"Zhang","sequence":"additional","affiliation":[{"name":"Information and Telecommunication Branch, State Grid Jiangsu Electric Power Company, Nanjing, China"}]}],"member":"263","reference":[{"key":"ref13","first-page":"1334","article-title":"Optimization method for white box AES encryption algorithm based on look-up tables","volume":"50","author":"tao","year":"2022","journal-title":"Digital Computer Engineering"},{"key":"ref12","first-page":"146","article-title":"Self-equivalence encodings and improvements of white-box implementations","volume":"49","author":"luo","year":"2022","journal-title":"J Xidian Univ"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-77360-3_18"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ITCC.2005.100"},{"key":"ref11","first-page":"342","article-title":"A noisyrounds-based white-box AES implementation and corresponding differential fault analysis","volume":"7","author":"sun","year":"2020","journal-title":"Journal of Cryptologic Research"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/SPAC.2014.6982727"},{"key":"ref2","first-page":"1","article-title":"A white-box DES implementation for DRM applications","author":"chow","year":"2002","journal-title":"Digital Rights Management"},{"key":"ref1","first-page":"250","article-title":"White-box cryptography and an AES implementation","author":"chow","year":"2002","journal-title":"Selected Areas in Cryptography"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.3390\/s150511928"},{"key":"ref16","first-page":"24","article-title":"White-box cryptography and a SMS4 implementation","author":"xiao","year":"2009","journal-title":"Proc CACR Annu Meeting"},{"key":"ref19","first-page":"358","article-title":"A new method for white-box implementation of SM4 algorithm","volume":"7","author":"yao","year":"2020","journal-title":"Journal of Cryptologic Research"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1002\/sec.1394"},{"key":"ref24","first-page":"111","article-title":"Analysis of the mean difference of intermediate-values in a white box SM4","volume":"49","author":"zhang","year":"2022","journal-title":"J Xidian Univ"},{"key":"ref23","first-page":"2903","article-title":"Analysis and improvement of white-box SM4 implementation","volume":"44","author":"zhang","year":"2022","journal-title":"J Electron Inf Technol"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/AEEES54426.2022.9759711"},{"key":"ref25","article-title":"Differential computation analysis of white-box SM4 scheme","author":"yuan","year":"0","journal-title":"J Softw"},{"key":"ref20","first-page":"386","article-title":"A white-box SM4 scheme against differential computation analysis","volume":"10","author":"yuan","year":"2023","journal-title":"Journal of Cryptologic Research"},{"key":"ref22","first-page":"651","article-title":"Cryptanalysis of two white-box SM4 implementations","volume":"5","author":"pan","year":"2018","journal-title":"Journal of Cryptologic Research"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.3724\/SP.J.1001.2013.04356"},{"journal-title":"SM4 Block Cipher Algorithm State Cryptography Administration of the People&#x2019;s Republic of China","year":"2012","key":"ref28"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/EI252483.2021.9713048"},{"key":"ref8","first-page":"468","article-title":"White box cryptography: Another attempt","author":"bringer","year":"2006","journal-title":"Proc IACR Cryptol ePrint Arch"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-24209-0_19"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/CSA.2009.5404239"},{"key":"ref4","first-page":"68","article-title":"Improved cryptanalysis of an AES implementation","author":"tolhuizen","year":"2012","journal-title":"Proc 33rd WIC Symp Inf Theory"},{"key":"ref3","first-page":"227","article-title":"Cryptanalysis of a white box AES implementation","author":"billet","year":"2005","journal-title":"Selected Areas in Cryptography"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-04159-4_27"},{"key":"ref5","first-page":"450","article-title":"Revisiting the BGE attack on a white-box AES implementation","author":"mulder","year":"2013","journal-title":"Proc IACR Cryptol ePrint Arch"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/10005208\/10167654.pdf?arnumber=10167654","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,8,7]],"date-time":"2023-08-07T18:29:53Z","timestamp":1691432993000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10167654\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"references-count":28,"URL":"https:\/\/doi.org\/10.1109\/access.2023.3290211","relation":{},"ISSN":["2169-3536"],"issn-type":[{"type":"electronic","value":"2169-3536"}],"subject":[],"published":{"date-parts":[[2023]]}}}