{"id":"https://openalex.org/W2593821117","doi":"https://doi.org/10.1007/s11390-017-1727-x","title":"A New Feistel-Type White-Box Encryption Scheme","display_name":"A New Feistel-Type White-Box Encryption Scheme","publication_year":2017,"publication_date":"2017-03-01","ids":{"openalex":"https://openalex.org/W2593821117","doi":"https://doi.org/10.1007/s11390-017-1727-x","mag":"2593821117"},"language":"en","primary_location":{"id":"doi:10.1007/s11390-017-1727-x","is_oa":false,"landing_page_url":"https://doi.org/10.1007/s11390-017-1727-x","pdf_url":null,"source":{"id":"https://openalex.org/S161516442","display_name":"Journal of Computer Science and Technology","issn_l":"1000-9000","issn":["1000-9000","1860-4749"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Computer Science and Technology","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5064174801","display_name":"Tingting Lin","orcid":"https://orcid.org/0000-0001-5474-4070"},"institutions":[{"id":"https://openalex.org/I1319815248","display_name":"Statistics Canada","ror":"https://ror.org/05k71ja87","country_code":"CA","type":"government","lineage":["https://openalex.org/I1319815248"]},{"id":"https://openalex.org/I4210132990","display_name":"State Key Laboratory of Cryptology","ror":"https://ror.org/02pn5rj08","country_code":"CN","type":"government","lineage":["https://openalex.org/I4210132990"]},{"id":"https://openalex.org/I183067930","display_name":"Shanghai Jiao Tong University","ror":"https://ror.org/0220qvk04","country_code":"CN","type":"education","lineage":["https://openalex.org/I183067930"]}],"countries":["CA","CN"],"is_corresponding":true,"raw_author_name":"Ting-Ting Lin","raw_affiliation_strings":["Cryptography and Information Security Laboratory, Department of Computer Science, Shanghai Jiao Tong University, Shanghai, 200240, China","Irdeto Canada, Ottawa, Ontario, K2K3G5, Canada"],"affiliations":[{"raw_affiliation_string":"Cryptography and Information Security Laboratory, Department of Computer Science, Shanghai Jiao Tong University, Shanghai, 200240, China","institution_ids":["https://openalex.org/I4210132990","https://openalex.org/I183067930"]},{"raw_affiliation_string":"Irdeto Canada, Ottawa, Ontario, K2K3G5, Canada","institution_ids":["https://openalex.org/I1319815248"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5082713075","display_name":"Xuejia Lai","orcid":"https://orcid.org/0000-0001-5917-4783"},"institutions":[{"id":"https://openalex.org/I183067930","display_name":"Shanghai Jiao Tong University","ror":"https://ror.org/0220qvk04","country_code":"CN","type":"education","lineage":["https://openalex.org/I183067930"]},{"id":"https://openalex.org/I4210132990","display_name":"State Key Laboratory of Cryptology","ror":"https://ror.org/02pn5rj08","country_code":"CN","type":"government","lineage":["https://openalex.org/I4210132990"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xue-Jia Lai","raw_affiliation_strings":["Cryptography and Information Security Laboratory, Department of Computer Science, Shanghai Jiao Tong University, Shanghai, 200240, China"],"affiliations":[{"raw_affiliation_string":"Cryptography and Information Security Laboratory, Department of Computer Science, Shanghai Jiao Tong University, Shanghai, 200240, China","institution_ids":["https://openalex.org/I4210132990","https://openalex.org/I183067930"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5074566078","display_name":"Weijia Xue","orcid":"https://orcid.org/0009-0008-5920-5154"},"institutions":[{"id":"https://openalex.org/I183067930","display_name":"Shanghai Jiao Tong University","ror":"https://ror.org/0220qvk04","country_code":"CN","type":"education","lineage":["https://openalex.org/I183067930"]},{"id":"https://openalex.org/I4210132990","display_name":"State Key Laboratory of Cryptology","ror":"https://ror.org/02pn5rj08","country_code":"CN","type":"government","lineage":["https://openalex.org/I4210132990"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Wei-Jia Xue","raw_affiliation_strings":["Cryptography and Information Security Laboratory, Department of Computer Science, Shanghai Jiao Tong University, Shanghai, 200240, China"],"affiliations":[{"raw_affiliation_string":"Cryptography and Information Security Laboratory, Department of Computer Science, Shanghai Jiao Tong University, Shanghai, 200240, China","institution_ids":["https://openalex.org/I4210132990","https://openalex.org/I183067930"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5109430623","display_name":"Yin Jia","orcid":null},"institutions":[{"id":"https://openalex.org/I183067930","display_name":"Shanghai Jiao Tong University","ror":"https://ror.org/0220qvk04","country_code":"CN","type":"education","lineage":["https://openalex.org/I183067930"]},{"id":"https://openalex.org/I4210132990","display_name":"State Key Laboratory of Cryptology","ror":"https://ror.org/02pn5rj08","country_code":"CN","type":"government","lineage":["https://openalex.org/I4210132990"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yin Jia","raw_affiliation_strings":["Cryptography and Information Security Laboratory, Department of Computer Science, Shanghai Jiao Tong University, Shanghai, 200240, China"],"affiliations":[{"raw_affiliation_string":"Cryptography and Information Security Laboratory, Department of Computer Science, Shanghai Jiao Tong University, Shanghai, 200240, China","institution_ids":["https://openalex.org/I4210132990","https://openalex.org/I183067930"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5064174801"],"corresponding_institution_ids":["https://openalex.org/I1319815248","https://openalex.org/I183067930","https://openalex.org/I4210132990"],"apc_list":{"value":2290,"currency":"EUR","value_usd":2890},"apc_paid":null,"fwci":0.4149,"has_fulltext":false,"cited_by_count":8,"citation_normalized_percentile":{"value":0.70336104,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":99},"biblio":{"volume":"32","issue":"2","first_page":"386","last_page":"395"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9975000023841858,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9937999844551086,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/white-box","display_name":"White box","score":0.780691385269165},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7753072381019592},{"id":"https://openalex.org/keywords/block-cipher","display_name":"Block cipher","score":0.7040953636169434},{"id":"https://openalex.org/keywords/s-box","display_name":"S-box","score":0.6759878993034363},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.544951319694519},{"id":"https://openalex.org/keywords/cryptanalysis","display_name":"Cryptanalysis","score":0.5400124192237854},{"id":"https://openalex.org/keywords/linear-cryptanalysis","display_name":"Linear cryptanalysis","score":0.538884162902832},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.4754704535007477},{"id":"https://openalex.org/keywords/key-schedule","display_name":"Key schedule","score":0.47119781374931335},{"id":"https://openalex.org/keywords/context","display_name":"Context (archaeology)","score":0.43900221586227417},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.4375312924385071},{"id":"https://openalex.org/keywords/symmetric-key-algorithm","display_name":"Symmetric-key algorithm","score":0.42934340238571167},{"id":"https://openalex.org/keywords/block-size","display_name":"Block size","score":0.42076995968818665},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.33187592029571533},{"id":"https://openalex.org/keywords/differential-cryptanalysis","display_name":"Differential cryptanalysis","score":0.32102644443511963},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.29269638657569885},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.24763494729995728},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.23274195194244385},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.2040710151195526}],"concepts":[{"id":"https://openalex.org/C180932941","wikidata":"https://www.wikidata.org/wiki/Q997233","display_name":"White box","level":2,"score":0.780691385269165},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7753072381019592},{"id":"https://openalex.org/C106544461","wikidata":"https://www.wikidata.org/wiki/Q543151","display_name":"Block cipher","level":3,"score":0.7040953636169434},{"id":"https://openalex.org/C45737032","wikidata":"https://www.wikidata.org/wiki/Q748364","display_name":"S-box","level":4,"score":0.6759878993034363},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.544951319694519},{"id":"https://openalex.org/C181149355","wikidata":"https://www.wikidata.org/wiki/Q897511","display_name":"Cryptanalysis","level":3,"score":0.5400124192237854},{"id":"https://openalex.org/C82424418","wikidata":"https://www.wikidata.org/wiki/Q1826463","display_name":"Linear cryptanalysis","level":4,"score":0.538884162902832},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.4754704535007477},{"id":"https://openalex.org/C112145980","wikidata":"https://www.wikidata.org/wiki/Q2569509","display_name":"Key schedule","level":5,"score":0.47119781374931335},{"id":"https://openalex.org/C2779343474","wikidata":"https://www.wikidata.org/wiki/Q3109175","display_name":"Context (archaeology)","level":2,"score":0.43900221586227417},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.4375312924385071},{"id":"https://openalex.org/C65302260","wikidata":"https://www.wikidata.org/wiki/Q327675","display_name":"Symmetric-key algorithm","level":4,"score":0.42934340238571167},{"id":"https://openalex.org/C41431624","wikidata":"https://www.wikidata.org/wiki/Q1053357","display_name":"Block size","level":3,"score":0.42076995968818665},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.33187592029571533},{"id":"https://openalex.org/C36123800","wikidata":"https://www.wikidata.org/wiki/Q1224471","display_name":"Differential cryptanalysis","level":4,"score":0.32102644443511963},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.29269638657569885},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.24763494729995728},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.23274195194244385},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.2040710151195526},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.0},{"id":"https://openalex.org/C151730666","wikidata":"https://www.wikidata.org/wiki/Q7205","display_name":"Paleontology","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1007/s11390-017-1727-x","is_oa":false,"landing_page_url":"https://doi.org/10.1007/s11390-017-1727-x","pdf_url":null,"source":{"id":"https://openalex.org/S161516442","display_name":"Journal of Computer Science and Technology","issn_l":"1000-9000","issn":["1000-9000","1860-4749"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Computer Science and Technology","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":41,"referenced_works":["https://openalex.org/W11078255","https://openalex.org/W577444057","https://openalex.org/W1488471373","https://openalex.org/W1489021826","https://openalex.org/W1505973206","https://openalex.org/W1551572898","https://openalex.org/W1555224742","https://openalex.org/W1572375309","https://openalex.org/W1595979964","https://openalex.org/W1613874182","https://openalex.org/W1724890242","https://openalex.org/W1846793529","https://openalex.org/W1917830443","https://openalex.org/W1938099525","https://openalex.org/W1968368707","https://openalex.org/W2011438544","https://openalex.org/W2015388549","https://openalex.org/W2039202832","https://openalex.org/W2041404167","https://openalex.org/W2057423239","https://openalex.org/W2061323203","https://openalex.org/W2074886859","https://openalex.org/W2091895627","https://openalex.org/W2110697240","https://openalex.org/W2116173095","https://openalex.org/W2124167991","https://openalex.org/W2140514778","https://openalex.org/W2154909745","https://openalex.org/W2163114293","https://openalex.org/W2168130438","https://openalex.org/W2184904104","https://openalex.org/W2296754065","https://openalex.org/W2325139309","https://openalex.org/W2396670647","https://openalex.org/W2472524164","https://openalex.org/W2514286655","https://openalex.org/W2725380599","https://openalex.org/W2884742479","https://openalex.org/W2952368650","https://openalex.org/W2978725006","https://openalex.org/W4285719527"],"related_works":["https://openalex.org/W2892391102","https://openalex.org/W4384009156","https://openalex.org/W1539170589","https://openalex.org/W4243188035","https://openalex.org/W2027151447","https://openalex.org/W2156908834","https://openalex.org/W1659081910","https://openalex.org/W3128144131","https://openalex.org/W1956144568","https://openalex.org/W2120706888"],"abstract_inverted_index":null,"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":1},{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":2},{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":1},{"year":2019,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
