{"id":"https://openalex.org/W4379746224","doi":"https://doi.org/10.1093/comjnl/bxad044","title":"A White-box Implementation of SM4 with Self-equivalence Encoding","display_name":"A White-box Implementation of SM4 with Self-equivalence Encoding","publication_year":2023,"publication_date":"2023-06-06","ids":{"openalex":"https://openalex.org/W4379746224","doi":"https://doi.org/10.1093/comjnl/bxad044"},"language":"en","primary_location":{"id":"doi:10.1093/comjnl/bxad044","is_oa":false,"landing_page_url":"https://doi.org/10.1093/comjnl/bxad044","pdf_url":null,"source":{"id":"https://openalex.org/S44643521","display_name":"The Computer Journal","issn_l":"0010-4620","issn":["0010-4620","1460-2067"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310311648","host_organization_name":"Oxford University Press","host_organization_lineage":["https://openalex.org/P4310311648","https://openalex.org/P4310311647"],"host_organization_lineage_names":["Oxford University Press","University of Oxford"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"The Computer Journal","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5088989322","display_name":"Jie Chen","orcid":"https://orcid.org/0000-0002-4152-8923"},"institutions":[{"id":"https://openalex.org/I149594827","display_name":"Xidian University","ror":"https://ror.org/05s92vm98","country_code":"CN","type":"education","lineage":["https://openalex.org/I149594827"]},{"id":"https://openalex.org/I4210132990","display_name":"State Key Laboratory of Cryptology","ror":"https://ror.org/02pn5rj08","country_code":"CN","type":"government","lineage":["https://openalex.org/I4210132990"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Jie Chen","raw_affiliation_strings":["Henan Key Laboratory of Network Cryptography Technology , Zhengzhou 450001, China","School of Telecommunication Engineering , Xidian University, Xi\u2019an 710071, China"],"affiliations":[{"raw_affiliation_string":"Henan Key Laboratory of Network Cryptography Technology , Zhengzhou 450001, China","institution_ids":["https://openalex.org/I4210132990"]},{"raw_affiliation_string":"School of Telecommunication Engineering , Xidian University, Xi\u2019an 710071, China","institution_ids":["https://openalex.org/I149594827"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101422744","display_name":"Yinuo Luo","orcid":"https://orcid.org/0000-0002-7027-6489"},"institutions":[{"id":"https://openalex.org/I149594827","display_name":"Xidian University","ror":"https://ror.org/05s92vm98","country_code":"CN","type":"education","lineage":["https://openalex.org/I149594827"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yinuo Luo","raw_affiliation_strings":["School of Telecommunication Engineering, Xidian University , Xi\u2019an 710071, China"],"affiliations":[{"raw_affiliation_string":"School of Telecommunication Engineering, Xidian University , Xi\u2019an 710071, China","institution_ids":["https://openalex.org/I149594827"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100361916","display_name":"Jun Liu","orcid":"https://orcid.org/0000-0002-7091-9616"},"institutions":[{"id":"https://openalex.org/I88830068","display_name":"Shaanxi Normal University","ror":"https://ror.org/0170z8493","country_code":"CN","type":"education","lineage":["https://openalex.org/I88830068"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jun Liu","raw_affiliation_strings":["School of Computer Science, Shaanxi Normal University , Xi\u2019an 710119, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science, Shaanxi Normal University , Xi\u2019an 710119, China","institution_ids":["https://openalex.org/I88830068"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100407081","display_name":"Chao Wang","orcid":"https://orcid.org/0000-0003-0187-6453"},"institutions":[{"id":"https://openalex.org/I149594827","display_name":"Xidian University","ror":"https://ror.org/05s92vm98","country_code":"CN","type":"education","lineage":["https://openalex.org/I149594827"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Chao Wang","raw_affiliation_strings":["School of Telecommunication Engineering, Xidian University , Xi\u2019an 710071, China"],"affiliations":[{"raw_affiliation_string":"School of Telecommunication Engineering, Xidian University , Xi\u2019an 710071, China","institution_ids":["https://openalex.org/I149594827"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5014182016","display_name":"Yueyu Zhang","orcid":"https://orcid.org/0000-0002-6837-1794"},"institutions":[{"id":"https://openalex.org/I149594827","display_name":"Xidian University","ror":"https://ror.org/05s92vm98","country_code":"CN","type":"education","lineage":["https://openalex.org/I149594827"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yueyu Zhang","raw_affiliation_strings":["School of Cyber Engineering, Xidian University , Xi\u2019an 710068, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Engineering, Xidian University , Xi\u2019an 710068, China","institution_ids":["https://openalex.org/I149594827"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5059203487","display_name":"Xiaoli Dong","orcid":"https://orcid.org/0000-0002-3267-7548"},"institutions":[{"id":"https://openalex.org/I4210136859","display_name":"Xi\u2019an University of Posts and Telecommunications","ror":"https://ror.org/04jn0td46","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210136859"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xiaoli Dong","raw_affiliation_strings":["School of Cyberspace Security, Xi\u2019an University of Posts and Telecommunications , Xi\u2019an 710121, China"],"affiliations":[{"raw_affiliation_string":"School of Cyberspace Security, Xi\u2019an University of Posts and Telecommunications , Xi\u2019an 710121, China","institution_ids":["https://openalex.org/I4210136859"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5088989322"],"corresponding_institution_ids":["https://openalex.org/I149594827","https://openalex.org/I4210132990"],"apc_list":{"value":2635,"currency":"GBP","value_usd":3232},"apc_paid":null,"fwci":0.6993,"has_fulltext":false,"cited_by_count":4,"citation_normalized_percentile":{"value":0.74658464,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":"67","issue":"3","first_page":"1087","last_page":"1098"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11130","display_name":"Coding theory and cryptography","score":0.9940999746322632,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/white-box","display_name":"White box","score":0.7565301060676575},{"id":"https://openalex.org/keywords/s-box","display_name":"S-box","score":0.7543060779571533},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7201933860778809},{"id":"https://openalex.org/keywords/lookup-table","display_name":"Lookup table","score":0.55446857213974},{"id":"https://openalex.org/keywords/affine-transformation","display_name":"Affine transformation","score":0.522561252117157},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.4748047888278961},{"id":"https://openalex.org/keywords/equivalence","display_name":"Equivalence (formal languages)","score":0.44494959712028503},{"id":"https://openalex.org/keywords/block-cipher","display_name":"Block cipher","score":0.43312567472457886},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.42040950059890747},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.41081929206848145},{"id":"https://openalex.org/keywords/parallel-computing","display_name":"Parallel computing","score":0.34706324338912964},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.16474047303199768},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.1105102002620697},{"id":"https://openalex.org/keywords/discrete-mathematics","display_name":"Discrete mathematics","score":0.08376827836036682}],"concepts":[{"id":"https://openalex.org/C180932941","wikidata":"https://www.wikidata.org/wiki/Q997233","display_name":"White box","level":2,"score":0.7565301060676575},{"id":"https://openalex.org/C45737032","wikidata":"https://www.wikidata.org/wiki/Q748364","display_name":"S-box","level":4,"score":0.7543060779571533},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7201933860778809},{"id":"https://openalex.org/C134835016","wikidata":"https://www.wikidata.org/wiki/Q690265","display_name":"Lookup table","level":2,"score":0.55446857213974},{"id":"https://openalex.org/C92757383","wikidata":"https://www.wikidata.org/wiki/Q382497","display_name":"Affine transformation","level":2,"score":0.522561252117157},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.4748047888278961},{"id":"https://openalex.org/C2780069185","wikidata":"https://www.wikidata.org/wiki/Q7977945","display_name":"Equivalence (formal languages)","level":2,"score":0.44494959712028503},{"id":"https://openalex.org/C106544461","wikidata":"https://www.wikidata.org/wiki/Q543151","display_name":"Block cipher","level":3,"score":0.43312567472457886},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.42040950059890747},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.41081929206848145},{"id":"https://openalex.org/C173608175","wikidata":"https://www.wikidata.org/wiki/Q232661","display_name":"Parallel computing","level":1,"score":0.34706324338912964},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.16474047303199768},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.1105102002620697},{"id":"https://openalex.org/C118615104","wikidata":"https://www.wikidata.org/wiki/Q121416","display_name":"Discrete mathematics","level":1,"score":0.08376827836036682},{"id":"https://openalex.org/C202444582","wikidata":"https://www.wikidata.org/wiki/Q837863","display_name":"Pure mathematics","level":1,"score":0.0},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1093/comjnl/bxad044","is_oa":false,"landing_page_url":"https://doi.org/10.1093/comjnl/bxad044","pdf_url":null,"source":{"id":"https://openalex.org/S44643521","display_name":"The Computer Journal","issn_l":"0010-4620","issn":["0010-4620","1460-2067"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310311648","host_organization_name":"Oxford University Press","host_organization_lineage":["https://openalex.org/P4310311648","https://openalex.org/P4310311647"],"host_organization_lineage_names":["Oxford University Press","University of Oxford"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"The Computer Journal","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G536722494","display_name":null,"funder_award_id":"2023-YBGY-015","funder_id":"https://openalex.org/F4320336350","funder_display_name":"Key Research and Development Projects of Shaanxi Province"}],"funders":[{"id":"https://openalex.org/F4320336350","display_name":"Key Research and Development Projects of Shaanxi Province","ror":null}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":36,"referenced_works":["https://openalex.org/W157778443","https://openalex.org/W1488118723","https://openalex.org/W1572375309","https://openalex.org/W1595979964","https://openalex.org/W2110697240","https://openalex.org/W2184904104","https://openalex.org/W2286232968","https://openalex.org/W2325139309","https://openalex.org/W2401935517","https://openalex.org/W2408220704","https://openalex.org/W2505158011","https://openalex.org/W2523955279","https://openalex.org/W2621588932","https://openalex.org/W2768348791","https://openalex.org/W2882974552","https://openalex.org/W3200423606","https://openalex.org/W4236403289","https://openalex.org/W6600448055","https://openalex.org/W6606018928","https://openalex.org/W6629153992","https://openalex.org/W6630318109","https://openalex.org/W6638737612","https://openalex.org/W6640536031","https://openalex.org/W6665570824","https://openalex.org/W6668049680","https://openalex.org/W6676380704","https://openalex.org/W6678555169","https://openalex.org/W6684903307","https://openalex.org/W6689364805","https://openalex.org/W6696129371","https://openalex.org/W6713591569","https://openalex.org/W6728920396","https://openalex.org/W6749402716","https://openalex.org/W6799107804","https://openalex.org/W6803173450","https://openalex.org/W6803690187"],"related_works":["https://openalex.org/W1985115047","https://openalex.org/W2986543571","https://openalex.org/W2919954404","https://openalex.org/W2968276623","https://openalex.org/W2955579865","https://openalex.org/W2534971686","https://openalex.org/W1846793529","https://openalex.org/W3214586009","https://openalex.org/W2802166783","https://openalex.org/W4380083395"],"abstract_inverted_index":{"Abstract":[0],"White-box":[1],"implementation":[2,61,80,111],"can":[3,112],"ensure":[4],"the":[5,16,21,36,40,76,97,100,116,123,126],"security":[6],"of":[7,20,31,42,62,75,84,99,139],"cryptographic":[8],"algorithm":[9],"in":[10],"white-box":[11,26,43,47,60],"attack":[12,44,117,128],"environment":[13],"without":[14],"changing":[15],"inputs":[17],"and":[18,88,102,129],"outputs":[19],"original":[22],"algorithm.":[23,78],"Most":[24],"existing":[25],"implementations":[27,48],"construct":[28],"a":[29,58],"series":[30],"lookup":[32,86],"tables":[33],"to":[34,52],"protect":[35],"key.":[37],"However,":[38],"with":[39,96],"development":[41],"techniques,":[45],"many":[46],"have":[49],"been":[50],"proved":[51],"be":[53],"insecure.":[54],"In":[55],"this":[56],"paper,":[57],"new":[59],"SM4":[63,77],"is":[64,67],"proposed,":[65],"which":[66],"based":[68,118],"on":[69,119],"an":[70],"equivalent":[71],"partial":[72],"SPN":[73],"structure":[74,124],"Our":[79],"includes":[81],"three":[82],"types":[83],"table":[85],"operations":[87],"XOR":[89],"operations.":[90],"The":[91],"round":[92],"keys":[93],"are":[94],"obfuscated":[95],"self-equivalences":[98],"S-box":[101],"random":[103],"affine":[104,120],"encodings.":[105],"Security":[106],"analysis":[107],"shows":[108],"that":[109],"our":[110,134],"resist":[113],"BGE-type":[114],"attack,":[115,125],"equivalence":[121],"algorithm,":[122],"collision":[127],"differential":[130],"computational":[131],"analysis.":[132],"Furthermore,":[133],"scheme":[135],"requires":[136],"8.125":[137],"MB":[138],"memory.":[140]},"counts_by_year":[{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
