{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,7]],"date-time":"2025-12-07T13:09:19Z","timestamp":1765112959964},"reference-count":43,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"am","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"funder":[{"name":"National Key RD Program of China","award":["2020AAA0107703"],"award-info":[{"award-number":["2020AAA0107703"]}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62072192","62132008"],"award-info":[{"award-number":["62072192","62132008"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"National Cryptography Development Fund","award":["MMJJ20180206"],"award-info":[{"award-number":["MMJJ20180206"]}]},{"name":"CCF-Tencent Open Fund"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Comput."],"published-print":{"date-parts":[[2022]]},"DOI":"10.1109\/tc.2022.3152449","type":"journal-article","created":{"date-parts":[[2022,2,18]],"date-time":"2022-02-18T20:30:34Z","timestamp":1645216234000},"page":"1-1","source":"Crossref","is-referenced-by-count":4,"title":["WBMatrix: An Optimized Matrix Library for White-Box Block Cipher Implementations"],"prefix":"10.1109","author":[{"given":"Yufeng","family":"Tang","sequence":"first","affiliation":[]},{"given":"Zheng","family":"Gong","sequence":"additional","affiliation":[]},{"given":"Tao","family":"Sun","sequence":"additional","affiliation":[]},{"given":"Jinhai","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Zhe","family":"Liu","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-93387-0_6"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1007\/11935070_14"},{"key":"ref33","article-title":"Whitebox-crypto-AES: Whitebox AES implementation in C++. chow, karroumi","author":"klinec","year":"0"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1002\/rsa.3240040108"},{"key":"ref31","author":"lay","year":"2016","journal-title":"Linear Algebra and its Applications"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-53887-6_5"},{"key":"ref37","article-title":"The Intel intrinsics guide","year":"0"},{"key":"ref36","article-title":"Efficient multiplication of dense matrices over GF (2)","author":"albrecht","year":"2008"},{"key":"ref35","article-title":"WBAES: Whitebox AES","author":"saremi","year":"0"},{"key":"ref34","article-title":"WhiteBoxAES: An implementation for white box AES","author":"qi","year":"0"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-17401-8_21"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2980594"},{"key":"ref11","first-page":"34","article-title":"Cryptanalysis of the Xiao&#x2013;Lai white-box AES implementation","author":"de mulder","year":"2012","journal-title":"Int Conf Sel Areas Cryptogr"},{"key":"ref12","article-title":"Revisiting the BGE attack on a white-box AES implementation","volume":"2013","author":"de mulder","year":"2013","journal-title":"IACR Cryptol ePrint Arch"},{"key":"ref13","doi-asserted-by":"crossref","first-page":"2238","DOI":"10.3724\/SP.J.1001.2013.04356","article-title":"Efficient attack to white-box SMS4 implementation","volume":"24","author":"lin","year":"2013","journal-title":"J Softw"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1093\/comjnl\/bxv119"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-53140-2_11"},{"key":"ref16","article-title":"Differential fault analysis on white-box AES implementations","author":"teuwen","year":"0"},{"key":"ref17","article-title":"CHES 2017 capture the flag challenge - the WhibOx contest, an ecrypt white-box cryptography competition","author":"prouff","year":"0"},{"key":"ref18","article-title":"CHES 2019 capture the flag challenge - the WhibOx contest edition 2","author":"fei","year":"2019"},{"key":"ref19","first-page":"591","article-title":"A DFA attack on white-box implementations of AES with external encodings","author":"amadori","year":"2019","journal-title":"Proc Int Conf Sel Areas Cryptogr"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-56877-1_9"},{"key":"ref4","article-title":"White box cryptography: Another attempt","volume":"2006","author":"bringer","year":"2006","journal-title":"IACR Cryptol ePrint Arch"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-46800-5_17"},{"key":"ref3","first-page":"250","article-title":"White-box cryptography and an AES implementation","author":"chow","year":"2002","journal-title":"Proc Int Workshop Sel Areas Cryptogr"},{"key":"ref6","first-page":"278","article-title":"Protecting white-box AES with dual ciphers","author":"karroumi","year":"2010","journal-title":"Proc Int Conf Informat Secur Cryptol"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813699"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/CSA.2009.5404239"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2018.04.011"},{"key":"ref7","first-page":"24","article-title":"White-box cryptography and implementations of SMS4","author":"xiao","year":"2009","journal-title":"Proc CACR Annu Meeting"},{"key":"ref2","first-page":"1","article-title":"A white-box DES implementation for DRM applications","author":"chow","year":"2002","journal-title":"Proc 4th ACM Workshop Digital Rights Management"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-30564-4_16"},{"key":"ref1","first-page":"5","article-title":"La cryptographie militaire","volume":"ix","author":"kerckhoffs","year":"1883","journal-title":"J Sci Milit"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/1314276.1314291"},{"key":"ref22","article-title":"NTL: A library for doing number theory","author":"shoup","year":"0"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.46586\/tches.v2021.i4.587-617"},{"key":"ref42","article-title":"SP 800&#x2013;22 Rev. 1a, A Statistical Test Suite for RNGs and PRNGs for Crypto Apps | CSRC","year":"0"},{"key":"ref24","first-page":"33","article-title":"Random non-singular matrices over GF(2)","author":"maurer","year":"2018","journal-title":"Proc Int Conf Model Simul Vis Methods"},{"key":"ref41","article-title":"NIST statistical test suite","year":"0"},{"key":"ref23","article-title":"M4RI: A library for fast arithmetic with dense matrices over F2","author":"abbott","year":"0"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2993651"},{"key":"ref43","article-title":"LowMC: An implementation of the LowMC block cipher family","year":"0"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3092314"}],"container-title":["IEEE Transactions on Computers"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/12\/4358213\/09716870.pdf?arnumber=9716870","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,11,17]],"date-time":"2022-11-17T16:50:55Z","timestamp":1668703855000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9716870\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"references-count":43,"URL":"https:\/\/doi.org\/10.1109\/tc.2022.3152449","relation":{},"ISSN":["0018-9340","1557-9956","2326-3814"],"issn-type":[{"value":"0018-9340","type":"print"},{"value":"1557-9956","type":"electronic"},{"value":"2326-3814","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022]]}}}