{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T15:29:27Z","timestamp":1729610967910,"version":"3.28.0"},"reference-count":15,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,7]]},"DOI":"10.1109\/cits.2016.7546449","type":"proceedings-article","created":{"date-parts":[[2016,8,18]],"date-time":"2016-08-18T16:28:51Z","timestamp":1471537731000},"page":"1-5","source":"Crossref","is-referenced-by-count":2,"title":["A generic attack against white box implementation of block ciphers"],"prefix":"10.1109","author":[{"given":"Yin","family":"Jia","sequence":"first","affiliation":[]},{"given":"TingTing","family":"Lin","sequence":"additional","affiliation":[]},{"given":"Xuejia","family":"Lai","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-36178-2_10"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/CSA.2009.5404239"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-35999-6_3"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-39200-9_3"},{"key":"ref14","first-page":"261","article-title":"Markov chain models- rarity and exponentiality","volume":"48","author":"keilson","year":"1974","journal-title":"Applied Mathematical Sciences"},{"key":"ref15","article-title":"On the design and security of block ciphers","author":"lai","year":"1992","journal-title":"Series in Information Processing"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/11761679_3"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-68339-9_4"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-04159-4_27"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-30564-4_16"},{"key":"ref8","first-page":"265","article-title":"Two attacks on a white-box AES implementation","author":"lepoint","year":"2013","journal-title":"Lecture Notes in Computer Science"},{"key":"ref7","article-title":"Improved cryptanalysis of an AES implementation","author":"tolhuizen","year":"2012","journal-title":"WIC (Werkgemeenschap voor Inform - en Communicatietheorie)"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-40061-5_21"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-36492-7_17"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-24209-0_19"}],"event":{"name":"2016 International Conference on Computer, Information and Telecommunication Systems (CITS)","start":{"date-parts":[[2016,7,6]]},"location":"Kunming, China","end":{"date-parts":[[2016,7,8]]}},"container-title":["2016 International Conference on Computer, Information and Telecommunication Systems (CITS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7536293\/7546377\/07546449.pdf?arnumber=7546449","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2016,9,27]],"date-time":"2016-09-27T14:55:33Z","timestamp":1474988133000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7546449\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,7]]},"references-count":15,"URL":"https:\/\/doi.org\/10.1109\/cits.2016.7546449","relation":{},"subject":[],"published":{"date-parts":[[2016,7]]}}}