[1] Shannon C E. A mathematical theory of communication. ACM SIGMOBILE Mobile Computing and Communications Review, 2001, 5(1):355.
[2] Kocher P C. Timing attacks on implementations of DiffieHellman, RSA, DSS, and other systems. In Proc. the 16th Annual International Cryptology Conference on Advances in Cryptology, August 1996, pp.104113.
[3] Kocher P, Jaffe J, Jun B. Differential power analysis. In Proc. the 19th Annual International Cryptology Conference, August 1999, pp.388397.
[4] Quisquater J J, Samyde D. Electromagnetic analysis (EMA):Measures and countermeasures for smart cards. In Proc. the International Conference on Research in Smart Cards:Smart Card Programming and Security, September 2001, pp.200210.
[5] Wang H. Privacypreserving data sharing in cloud computing. Journal of Computer Science and Technology, 2010, 25(3):401414.
[6] Mi H B, Wang H M, Zhou Y F, Lyu M R, Cai H. Localizing root causes of performance anomalies in cloud computing systems by analyzing request trace logs. Science China Information Sciences, 2012, 55(12):27572773.
[7] Wang X M, He Z B, Zhao X Q, Lin C, Pan Y, Cai Z P. Reactiondiffusion modeling of malware propagation in mobile wireless sensor networks. Science China Information Sciences, 2013, 56(9):118.
[8] Ma X L, Hu H F, Li S F, Xiao H M, Luo Q, Yang D Q, Tang SW. DHC:Distributed, hierarchical clustering in sensor networks. Journal of Computer Science and Technology, 2011, 26(4):643662.
[9] Zhou C, Sun Y Q. SPMH:A solution to the problem of malicious hosts. Journal of Computer Science and Technology, 2002, 17(6):738748.
[10] Chow S, Eisen P, Johnson H, van Oorschot P C. A whitebox DES implementation for DRM applications. In Lecture Notes in Computer Science 2696, Feigenbaum J (ed.), Springer, 2003, pp.115.
[11] Chow S, Eisen P, Johnson H, van Oorschot P C. Whitebox cryptography and an AES implementation. In Lecture Notes in Computer Science 2595, Nyberg K, Heys H (eds.), Springer, 2003, pp.250270.
[12] Jacob M, Boneh D, Felten E. Attacking an obfuscated cipher by injecting faults. In Lecture Notes in Computer Science 2696, Feigenbaum J (ed.), Springer, 2003, pp.1631.
[13] Link H E, Neumann W D. Clarifying obfuscation:Improving the security of whitebox DES. In Proc. International Conference on Information Technology:Coding and Computing, April 2005, pp.679684.
[14] Wyseur B, Michiels W, Gorissen P, Preneel B. Cryptanalysis of whitebox DES implementations with arbitrary external encodings. In Proc. the 14th International Conference on Selected Areas in Cryptography, August 2007, pp.264277.
[15] Goubin L, Masereel J M, Quisquater M. Cryptanalysis of white box DES implementations. In Proc. the 14th International Conference on Selected Areas in Cryptography, August 2007, pp.278295.
[16] Billet O, Gilbert H, EchChatbi C. Cryptanalysis of a white box AES implementation. In Proc. the 11th International Conference on Selected Areas in Cryptography, August 2005, pp.227240.
[17] Michiels W, Gorissen P, Hollmann H D L. Cryptanalysis of a generic class of whitebox implementations. In Lecture Notes in Computer Science 5381, Avanzi R M, Keliher L, Sica F (eds.), Springer, 2009, pp.414428.
[18] Lepoint T, Rivain M, De Mulder Y, Roelse P, Preneel B. Two attacks on a whitebox AES implementation. In Lecture Notes in Computer Science 8282, Lange T, Lauter K, Lisoněk P (eds.), Springer, 2014, pp.265285.
[19] Xiao Y Y, Lai X J. A secure implementation of whitebox AES. In Proc. the 2nd International Conference on Computer Science and its Applications, December 2009, pp.153158.
[20] De Mulder Y, Roelse P, Preneel B. Cryptanalysis of the XiaoLai whitebox AES Implementation. In Lecture Notes in Computer Science 7707, Knudsen L R, Wu H P (eds.), Springer, 2013, pp.3449
[21] Biryukov A, De Cannière C, Braeken A, Preneel B. A toolbox for cryptanalysis:Linear and affine equivalence algorithms. In Lecture Notes in Computer Science 2656, Biham E (ed.), Springer, 2003, pp.3350.
[22] Karroumi M. Protecting whitebox AES with dual ciphers. In Lecture Notes in Computer Science 6829, Rhee K H, Nyang D (eds.), Springer, 2011, pp.278291.
[23] Bringer J, Chabanne H, Dottax E. White box cryptography:Another attempt. IACR Cryptology ePrint Archive, 2006.
[24] De Mulder Y, Wyseur B, Preneel B. Cryptanalysis of a perturbated whitebox AES implementation. In Lecture Notes in Computer Science 6498, Gong G, Gupta K C (eds.), Springer, 2010, pp.292310.
[25] Xiao Y Y.WhiteBox cryptography and implementations of AES SMS4. In Proc. the Chaincrypto, Nov. 2009, pp.2434. (in Chinese)
[26] Lin T T, Lai X J. Efficient attack to whitebox SMS4 implementation. Journal of Software, 2013, 24(9):22382249. (in Chinese)
[27] Biryukov A, Bouillaguet C, Khovratovich D. Cryptographic schemes based on the ASASA structure:Blackbox, whitebox, and publickey (Extended Abstract). In Lecture Notes in Computer Science 8873, Sarkar P, Iwata T (eds.), Springer, 2014, pp.6384.
[28] Minaud B, Derbez P, Fouque P A, Karpman P. Keyrecovery attacks on ASASA. In Lecture Notes in Computer Science 9453, Iwata T, Cheon J H (eds.), Springer, 2015, pp.327.
[29] Dinur I, Dunkelman O, Kranz T, Leander G. Decomposing the ASASA block cipher construction. Cryptology ePrint Archive, Report 2015/507, 2015. http://eprint.iacr.org/2015/507, Jan. 2017.
[30] Biryukov A, Khovratovich D. Decomposition attack on SASASASAS. https://eprint.iacr.org/2015/646.pdf, Jan. 2017.
[31] Bogdanov A, Isobe T. Whitebox cryptography revisited:Spacehard ciphers. In Proc. the 22nd ACM SIGSAC Conference on Computer and Communications Security, October 2015, pp.10581069.
[32] Feistel H. Cryptography and computer privacy. Scientific American, 1973, 228(5):1523.
[33] Data Encryption Standard, Federal Information Processing Standard (FIPS). National Bureau of Standards, U.S. Department of Commerce, Washington D. C., Jan. 1977.
[34] Rivest R L, Robshaw M J B, Sidney R, Yin Y L. The RC6TM block cipher. In Proc. the 1st Advanced Encryption Standard (AES) Conference, August 1998, pp.82104.
[35] Schneier B, Kelsey J, Whiting D, Wagner D, Hall C, Ferguson N. Twofish:A 128bit block cipher. NIST AES Proposal, 1998. https://www.schneier.com/academic/archives/1998/06/twofish a 128bit bl.html, Jan. 2017.
[36] Patarin J, Goubin L. Asymmetric cryptography with Sboxes:Is it easier than expected to design efficient asymmetric cryptosystems? In Lecture Notes in Computer Science 1334, Han Y F, Okamoto T, Qing S H (eds.), Springer, 1997, pp.369380.
[37] Biham E. Cryptanalysis of Patarin's 2round public key system with S boxes (2R). In Lecture Notes in Computer Science 1807, Preneel B (ed), Springer, 2000, pp.408416.
[38] Biryukov A, Shamir A. Structural cryptanalysis of SASAS. Journal of Cryptology, 2010, 23(4):505518.
[39] Biryukov A, Shamir A. Structural cryptanalysis of SASAS. In Lecture Notes in Computer Science 2045, Pfitzmann B (ed.), Springer, 2001, pp.395405.
