{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:40:30Z","timestamp":1750308030884,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":21,"publisher":"ACM","license":[{"start":{"date-parts":[[2007,10,29]],"date-time":"2007-10-29T00:00:00Z","timestamp":1193616000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2007,10,29]]},"DOI":"10.1145\/1314276.1314291","type":"proceedings-article","created":{"date-parts":[[2007,11,15]],"date-time":"2007-11-15T14:30:20Z","timestamp":1195137020000},"page":"82-89","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":17,"title":["Mechanism for software tamper resistance"],"prefix":"10.1145","author":[{"given":"W.","family":"Michiels","sequence":"first","affiliation":[{"name":"Philips Research, Eindhoven, Netherlands"}]},{"given":"P.","family":"Gorissen","sequence":"additional","affiliation":[{"name":"Philips Research, Eindhoven, Netherlands"}]}],"member":"320","published-online":{"date-parts":[[2007,10,29]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.5555\/647594.731528"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.5555\/646766.704152"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-30564-4_16"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1007\/11787952_12"},{"key":"e_1_3_2_1_5_1","first-page":"160","volume-title":"Proceedings of the 1st ACM Workshop on Digital Rights Management","author":"Chang H.","year":"2001"},{"key":"e_1_3_2_1_6_1","first-page":"400","volume-title":"Proceedings of the 5th International Workshop on Information Hiding","author":"Chen Y.","year":"2002"},{"key":"e_1_3_2_1_7_1","first-page":"250","volume-title":"Proceedings of the 9th Annual Workshop on Selected Areas in Cryptography","author":"Chow S.","year":"2002"},{"key":"e_1_3_2_1_8_1","first-page":"1","volume-title":"Proceedings of the 2nd ACM Workshop on Digital Rights Management","author":"Chow S.","year":"2002"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1016\/0167-4048(93)90054-9"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.5555\/560131"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSAC.2005.53"},{"key":"e_1_3_2_1_13_1","unstructured":"L. Goubin J. Masereel and M. Quisquater. Cryptanalysis of white box DES implementations. To appear in Proceedings of the 14th Annual Workshop on Selected Areas in Cryptography 2007.   L. Goubin J. Masereel and M. Quisquater. Cryptanalysis of white box DES implementations. To appear in Proceedings of the 14th Annual Workshop on Selected Areas in Cryptography 2007."},{"key":"e_1_3_2_1_14_1","first-page":"141","volume-title":"Proceedings of the 1st ACM Workshop on Digital Rights Management","author":"Horne B.","year":"2001"},{"key":"e_1_3_2_1_15_1","first-page":"16","volume-title":"Proceedings of the 2nd ACM Workshop on Digital Rights Management","author":"Jacob M.","year":"2002"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/ITCC.2005.100"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-24676-3_2"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2005.24"},{"volume-title":"Proceedings of the 2005 Symposium on Cryptography and Information Security","year":"2005","author":"Wang P.","key":"e_1_3_2_1_20_1"},{"volume-title":"Wroclaw University of Technology","year":"2002","author":"Wroblewski G.","key":"e_1_3_2_1_21_1"},{"key":"e_1_3_2_1_22_1","unstructured":"B. Wyseur W. Michiels P. Gorissen and B. Preneel. Cryptanalysis of white-box DES implementations with arbitrary external encodings. To appear in Proceedings of the 14th Annual Workshop on Selected Areas in Cryptography 2007.   B. Wyseur W. Michiels P. Gorissen and B. Preneel. Cryptanalysis of white-box DES implementations with arbitrary external encodings. To appear in Proceedings of the 14th Annual Workshop on Selected Areas in Cryptography 2007."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.5555\/647932.760955"}],"event":{"name":"CCS07: 14th ACM Conference on Computer and Communications Security 2007","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control","ACM Association for Computing Machinery"],"location":"Alexandria Virginia USA","acronym":"CCS07"},"container-title":["Proceedings of the 2007 ACM workshop on Digital Rights Management"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1314276.1314291","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1314276.1314291","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T15:14:06Z","timestamp":1750259646000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1314276.1314291"}},"subtitle":["an application of white-box cryptography"],"short-title":[],"issued":{"date-parts":[[2007,10,29]]},"references-count":21,"alternative-id":["10.1145\/1314276.1314291","10.1145\/1314276"],"URL":"https:\/\/doi.org\/10.1145\/1314276.1314291","relation":{},"subject":[],"published":{"date-parts":[[2007,10,29]]},"assertion":[{"value":"2007-10-29","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}