{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,21]],"date-time":"2025-08-21T18:48:19Z","timestamp":1755802099753,"version":"3.44.0"},"publisher-location":"New York, NY, USA","reference-count":21,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,10,20]],"date-time":"2023-10-20T00:00:00Z","timestamp":1697760000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"The Open Project of Henan Key Laboratory of Network Cryptography Technology","award":["LNCT2021-A09"],"award-info":[{"award-number":["LNCT2021-A09"]}]},{"name":"The Advanced Discipline Construction Project of Beijing Universities","award":["20210101Z0401"],"award-info":[{"award-number":["20210101Z0401"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,10,20]]},"DOI":"10.1145\/3650400.3650612","type":"proceedings-article","created":{"date-parts":[[2024,4,17]],"date-time":"2024-04-17T08:33:18Z","timestamp":1713342798000},"page":"1256-1261","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Improved White-box SM4 Design and Implementation"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-7219-0005","authenticated-orcid":false,"given":"Yanjun","family":"Li","sequence":"first","affiliation":[{"name":"Information Technology &amp; Security Test and Evaluation Center, The 15th Research Institute of China Electronics Technology Group Corporation, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0116-6945","authenticated-orcid":false,"given":"Xinjie","family":"Bi","sequence":"additional","affiliation":[{"name":"Dept.of Cryptology Science &amp; Technology, Beijing Electronic Science &amp; Technology Institute, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0006-5580-2934","authenticated-orcid":false,"given":"Xiaoyu","family":"Jing","sequence":"additional","affiliation":[{"name":"Dept.of Cryptology Science &amp; Technology, Beijing Electronic Science &amp; Technology Institute, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0008-9444-9816","authenticated-orcid":false,"given":"Zexiao","family":"Zou","sequence":"additional","affiliation":[{"name":"Dept. of Cyberspace Security, Beijing Electronic Science &amp; Technology Institute, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0005-0233-8093","authenticated-orcid":false,"given":"Long","family":"Yang","sequence":"additional","affiliation":[{"name":"Information Technology &amp; Security Test and Evaluation Center, The 15th Research Institute of China Electronics Technology Group Corporation, China"}]}],"member":"320","published-online":{"date-parts":[[2024,4,17]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"White-box cryptography and an AES implementation [C]\/\/ International Workshop on Selected Areas in Cryptography","author":"Chow S","year":"2002","unstructured":"Chow S, Eisen P, Johnson H, White-box cryptography and an AES implementation [C]\/\/ International Workshop on Selected Areas in Cryptography. Springer, Berlin, Heidelberg, 2002: 250-270."},{"key":"e_1_3_2_1_2_1","volume-title":"A white-box DES implementation for DRM applications [C]\/\/ ACM Workshop on Digital Rights Management","author":"Chow S","year":"2002","unstructured":"Chow S, Eisen P, Johnson H, A white-box DES implementation for DRM applications [C]\/\/ ACM Workshop on Digital Rights Management. Springer, Berlin, Heidelberg, 2002: 1-15."},{"key":"e_1_3_2_1_3_1","volume-title":"Cryptanalysis of a white box AES implementation [M]\/\/ Selected Areas in Cryptography","author":"Billet O","year":"2004","unstructured":"Billet O, Gilbert H, Echchatbi C. Cryptanalysis of a white box AES implementation [M]\/\/ Selected Areas in Cryptography. Springer Berlin Heidelberg, 2004."},{"key":"e_1_3_2_1_4_1","volume-title":"Hollmann H D L. Cryptanalysis of a generic class of white-box implementations [C]\/\/ International Workshop on Selected Areas in Cryptography","author":"Michiels W","year":"2008","unstructured":"Michiels W, Gorissen P, Hollmann H D L. Cryptanalysis of a generic class of white-box implementations [C]\/\/ International Workshop on Selected Areas in Cryptography. Springer, Berlin, Heidelberg, 2008."},{"key":"e_1_3_2_1_5_1","volume-title":"Selected Areas in Cryptography\u2013SAC","author":"Lepoint T","year":"2013","unstructured":"Lepoint T, Rivain M, De Mulder Y, Roelse P, Preneel B. Two attacks on a white-box AES implementation. In Selected Areas in Cryptography\u2013SAC 2013, vol.8282, Lange T, Lauter K, Lisonek P(eds),Lecture Notes in Computer Science. Springer: Berlin, 2014; 265\u2013285."},{"key":"e_1_3_2_1_6_1","volume-title":"Proceedings of the 33rd WIC Symposium on Information Theory in the Benelux","author":"Tolhuizen","year":"2012","unstructured":"L.Tolhuizen, \u201cImproved cryptanalysis of an AES implementation,\u201d in Proceedings of the 33rd WIC Symposium on Information Theory in the Benelux, Boekelo, The Netherlands, May 24\u201325, 2012."},{"key":"e_1_3_2_1_7_1","volume-title":"A secure implementation of white-box AES[C]\/\/2009 2nd International Conference on Computer Science and its Applications","author":"Xiao Y","year":"2009","unstructured":"Xiao Y, Lai X. A secure implementation of white-box AES[C]\/\/2009 2nd International Conference on Computer Science and its Applications. IEEE, 2009: 1-6."},{"key":"e_1_3_2_1_8_1","volume-title":"Cryptanalysis of the Xiao\u2013Lai white-box AES implementation[C] \/\/International conference on selected areas in cryptography","author":"Mulder Y D","year":"2012","unstructured":"Mulder Y D, Roelse P, Preneel B. Cryptanalysis of the Xiao\u2013Lai white-box AES implementation[C] \/\/International conference on selected areas in cryptography. Springer, Berlin, Heidelberg, 2012: 34-49."},{"key":"e_1_3_2_1_9_1","volume-title":"Proc. of the 2009 CACR Annual Meeting","author":"Xiao Y Y","year":"2009","unstructured":"Xiao Y Y, Lai X J. White-Box cryptography and implementations of SMS4[C]. Proc. of the 2009 CACR Annual Meeting, Guangzhou, China, 2009: 24\u221234."},{"issue":"9","key":"e_1_3_2_1_10_1","first-page":"2238","article-title":"Efficient attack to white-box SMS4 implementation","volume":"24","author":"Lin TT","year":"2013","unstructured":"Lin TT, Lai XJ. Efficient attack to white-box SMS4 implementation. Ruan Jian Xue Bao\/Journal of Software, 2013, 24(9):2238\u22122249.","journal-title":"Ruan Jian Xue Bao\/Journal of Software"},{"key":"e_1_3_2_1_11_1","volume-title":"White-Box, and Public-Key (Extended Abstract). In: Sarkar, P., Iwata, T. (eds) Advances in Cryptology \u2013 ASIACRYPT","author":"Biryukov A.","year":"2014","unstructured":"Biryukov, A., Bouillaguet, C., Khovratovich, D. 2014. Cryptographic Schemes Based on the ASAS A Structure: Black-Box, White-Box, and Public-Key (Extended Abstract). In: Sarkar, P., Iwata, T. (eds) Advances in Cryptology \u2013 ASIACRYPT 2014. Lecture Notes in Computer Science, vol 8873. Springer, Berlin, Heidelberg."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-017-9272-x"},{"key":"e_1_3_2_1_13_1","volume-title":"Key-recovery attack on the ASASA cryptosystem with expanding S-boxes[C]\/\/Annual Cryptology Conference","author":"Gilbert H","year":"2015","unstructured":"Gilbert H, Pl\u00fbt J, Treger J. Key-recovery attack on the ASASA cryptosystem with expanding S-boxes[C]\/\/Annual Cryptology Conference. Springer, Berlin, Heidelberg, 2015: 475-490."},{"key":"e_1_3_2_1_14_1","volume-title":"Decomposing the ASASA block cipher construction[J]. Cryptology ePrint Archive","author":"Dinur I","year":"2015","unstructured":"Dinur I, Dunkelman O, Kranz T, Decomposing the ASASA block cipher construction[J]. Cryptology ePrint Archive, 2015."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1002\/sec.1394"},{"issue":"6","key":"e_1_3_2_1_16_1","first-page":"651","article-title":"Cryptanalysis of two white-box SM4 implementations[J]","volume":"5","year":"2018","unstructured":"PAN W L, QIN T H, JIA Y, Cryptanalysis of two white-box SM4 implementations[J]. Journal of Cryptologic Research, 2018, 5(6): 651\u2013670.","journal-title":"Journal of Cryptologic Research"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2018.2825939"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1587\/transinf.2017EDL8186"},{"issue":"3","key":"e_1_3_2_1_19_1","first-page":"358","article-title":"A new method for white-box implementation of SM4 algorithm[J]","volume":"7","year":"2020","unstructured":"YAO S, CHEN J. A new method for white-box implementation of SM4 algorithm[J]. Journal of Cryptologic Research, 2020, 7(3): 358\u2013374.","journal-title":"Journal of Cryptologic Research"},{"key":"e_1_3_2_1_20_1","first-page":"1","volume":"43","author":"Zhang Y Y","year":"2021","unstructured":"Zhang Y Y, Xu D, Chen J. Analysis and Improvement of White-box SM4 Implementation [J]. Journal of Electronics & Information Technology, 2021, 43: 1-11.","journal-title":"Journal of Electronics & Information Technology"},{"key":"e_1_3_2_1_21_1","first-page":"049","article-title":"Analysis of the mean difference of intermediate-values in a white box SM4 [J]","volume":"001","author":"Zhang Y Y","year":"2022","unstructured":"Zhang Y Y, Xu D, Cai Z Q, Analysis of the mean difference of intermediate-values in a white box SM4 [J]. Journal of Xidian University, 2022, (001):049.","journal-title":"Journal of Xidian University"}],"event":{"name":"EITCE 2023: 2023 7th International Conference on Electronic Information Technology and Computer Engineering","acronym":"EITCE 2023","location":"Xiamen China"},"container-title":["Proceedings of the 2023 7th International Conference on Electronic Information Technology and Computer Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3650400.3650612","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3650400.3650612","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,21]],"date-time":"2025-08-21T05:07:39Z","timestamp":1755752859000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3650400.3650612"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,10,20]]},"references-count":21,"alternative-id":["10.1145\/3650400.3650612","10.1145\/3650400"],"URL":"https:\/\/doi.org\/10.1145\/3650400.3650612","relation":{},"subject":[],"published":{"date-parts":[[2023,10,20]]},"assertion":[{"value":"2024-04-17","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}