{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,6]],"date-time":"2025-05-06T07:46:54Z","timestamp":1746517614513},"publisher-location":"Berlin, Heidelberg","reference-count":24,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540201762"},{"type":"electronic","value":"9783540399810"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2003]]},"DOI":"10.1007\/10958513_13","type":"book-chapter","created":{"date-parts":[[2006,7,6]],"date-time":"2006-07-06T07:00:21Z","timestamp":1152169221000},"page":"165-179","source":"Crossref","is-referenced-by-count":16,"title":["The Design and Implementation of Protocol-Based Hidden Key Recovery"],"prefix":"10.1007","author":[{"given":"Eu-Jin","family":"Goh","sequence":"first","affiliation":[]},{"given":"Dan","family":"Boneh","sequence":"additional","affiliation":[]},{"given":"Benny","family":"Pinkas","sequence":"additional","affiliation":[]},{"given":"Philippe","family":"Golle","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"13_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"26","DOI":"10.1007\/BFb0055718","volume-title":"Advances in Cryptology - CRYPTO \u201998","author":"M. Bellare","year":"1998","unstructured":"Bellare, M., Desai, A., Pointcheval, D., Rogaway, P.: Relations among notions of security for public-key encryption schemes. In: Krawczyk, H. (ed.) CRYPTO 1998. LNCS, vol.\u00a01462, pp. 26\u201345. Springer, Heidelberg (1998)"},{"key":"13_CR2","doi-asserted-by":"publisher","first-page":"59","DOI":"10.1145\/191177.191193","volume-title":"Proceedings of the 2nd ACM Conference on Computer and Communications Security","author":"M. Blaze","year":"1994","unstructured":"Blaze, M.: Protocol failure in the escrowed encryption standard. In: Proceedings of the 2nd ACM Conference on Computer and Communications Security, Nov. 1994, pp. 59\u201367. ACM Press, New York (1994)"},{"key":"13_CR3","first-page":"255","volume-title":"Proceedings of the 31st Symposium on Theory of Computing","author":"R. Canetti","year":"1999","unstructured":"Canetti, R., Ostrovsky, R.: Secure computation with honest-looking parties: What if nobody is truly honest? In: Proceedings of the 31st Symposium on Theory of Computing, May 1999, pp. 255\u2013264. ACM Press, New York (1999)"},{"key":"13_CR4","unstructured":"Denning, D.: Descriptions of key escrow systems. Technical report, Georgetown University (February 1997), \n                    \n                      http:\/\/www.cs.georgetown.edu\/~denning\/"},{"issue":"9","key":"13_CR5","doi-asserted-by":"publisher","first-page":"58","DOI":"10.1109\/35.312844","volume":"32","author":"D. Denning","year":"1994","unstructured":"Denning, D., Smid, M.: Key escrowing today. IEEE Communications\u00a032(9), 58\u201368 (1994)","journal-title":"IEEE Communications"},{"key":"13_CR6","series-title":"Lecture Notes in Computer Science","first-page":"375","volume-title":"Advances in Cryptology - CRYPTO \u201988","author":"Y. Desmedt","year":"1988","unstructured":"Desmedt, Y.: Abuses in cryptography and how to fight them. In: Goldwasser, S. (ed.) CRYPTO 1988. LNCS, vol.\u00a0403, pp. 375\u2013389. Springer, Heidelberg (1988)"},{"key":"13_CR7","series-title":"Lecture Notes in Computer Science","first-page":"21","volume-title":"Advances in Cryptology - CRYPTO \u201987","author":"Y. Desmedt","year":"1987","unstructured":"Desmedt, Y., Goutier, C., Bengio, S.: Special uses and abuses of the Fiat- Shamir passport protocol. In: Pomerance, C. (ed.) CRYPTO 1987. LNCS, vol.\u00a0293, pp. 21\u201339. Springer, Heidelberg (1987)"},{"key":"13_CR8","unstructured":"Dierks, T., Allen, C.: The TLS protocol. RFC 2246 (January 1999)"},{"key":"13_CR9","unstructured":"FBI. Carnivore diagnostic tool. \n                    \n                      http:\/\/www.fbi.gov\/hq\/lab\/carnivore\/carnivore.htm"},{"key":"13_CR10","unstructured":"Freier, A., Karlton, P., Kocher, P.: The SSL protocol version 3.0 (November 1996), \n                    \n                      http:\/\/www.netscape.com\/eng\/ssl3\/draft302.txt"},{"key":"13_CR11","unstructured":"Ito, A.: w3m: text based browser, \n                    \n                      http:\/\/w3m.sourceforge.net\/"},{"key":"13_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"208","DOI":"10.1007\/3-540-44750-4_17","volume-title":"Advances in Cryptology - CRYPTO \u201995","author":"J. Kilian","year":"1995","unstructured":"Kilian, J., Leighton, T.: Fair cryptosystems, revisited: A rigorous approach to key-escrow. In: Coppersmith, D. (ed.) CRYPTO 1995. LNCS, vol.\u00a0963, pp. 208\u2013221. Springer, Heidelberg (1995)"},{"key":"13_CR13","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1145\/191177.191183","volume-title":"Proceedings of the 2nd ACM Conference on Computer and Communications Security","author":"G.H. Kim","year":"1994","unstructured":"Kim, G.H., Spafford, E.H.: The design and implementation of Tripwire: A file system integrity checker. In: Proceedings of the 2nd ACM Conference on Computer and Communications Security, pp. 18\u201329. ACM Press, New York (1994)"},{"issue":"10","key":"13_CR14","doi-asserted-by":"publisher","first-page":"613","DOI":"10.1145\/362375.362389","volume":"16","author":"B. Lampson","year":"1973","unstructured":"Lampson, B.: A note on the confinement problem. Communications of the ACM\u00a016(10), 613\u2013615 (1973)","journal-title":"Communications of the ACM"},{"issue":"4","key":"13_CR15","doi-asserted-by":"publisher","first-page":"209","DOI":"10.1007\/BF00203817","volume":"6","author":"A.J. Menezes","year":"1993","unstructured":"Menezes, A.J., Vanstone, S.A.: Elliptic curve cryptosystems and their implementations. Journal of Cryptology\u00a06(4), 209\u2013224 (1993)","journal-title":"Journal of Cryptology"},{"key":"13_CR16","unstructured":"National Institute of Standards and Technology. Security requirements for cryptographic modules. FIPS 140-2, NIST (June 2001), \n                    \n                      http:\/\/csrc.nist.gov\/publications\/fips\/"},{"key":"13_CR17","unstructured":"OpenSSL Project, \n                    \n                      http:\/\/www.openssl.org\/"},{"key":"13_CR18","unstructured":"Rescorla, E.: ssldump version 0.9b2, \n                    \n                      http:\/\/www.rtfm.com\/ssldump\/"},{"key":"13_CR19","unstructured":"Scott, M.: MIRACL - Multiprecision Integer and Rational Arithmetic C\/C++ Library v. 4.6, \n                    \n                      http:\/\/indigo.ie\/~mscott\/"},{"key":"13_CR20","unstructured":"secsh IETF Working Group, \n                    \n                      http:\/\/www.ietf.org\/html.charters\/secshcharter.html"},{"key":"13_CR21","first-page":"51","volume-title":"Proceedings of Crypto 1983","author":"G.J. Simmons","year":"1983","unstructured":"Simmons, G.J.: The prisoners\u2019 problem and the subliminal channel. In: Chaum, D. (ed.) Proceedings of Crypto 1983, August 1983, pp. 51\u201367. Plenum Press, New York (1983)"},{"key":"13_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"364","DOI":"10.1007\/3-540-39757-4_25","volume-title":"Advances in Cryptology","author":"G.J. Simmons","year":"1984","unstructured":"Simmons, G.J.: The subliminal channel and digital signatures. In: Beth, T., Cot, N., Ingemarsson, I. (eds.) EUROCRYPT 1984. LNCS, vol.\u00a0209, pp. 364\u2013378. Springer, Heidelberg (1984)"},{"key":"13_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"89","DOI":"10.1007\/3-540-68697-5_8","volume-title":"Advances in Cryptology - CRYPTO \u201996","author":"A. Young","year":"1996","unstructured":"Young, A., Yung, M.: The dark side of \u201cblack-box\u201d cryptography, or: Should we trust Capstone. In: Koblitz, N. (ed.) CRYPTO 1996. LNCS, vol.\u00a01109, pp. 89\u2013103. Springer, Heidelberg (1996)"},{"key":"13_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"62","DOI":"10.1007\/3-540-69053-0_6","volume-title":"Advances in Cryptology - EUROCRYPT \u201997","author":"A. Young","year":"1997","unstructured":"Young, A., Yung, M.: Kleptography: Using cryptography against cryptography. In: Fumy, W. (ed.) EUROCRYPT 1997. LNCS, vol.\u00a01233, pp. 62\u201374. Springer, Heidelberg (1997)"}],"container-title":["Lecture Notes in Computer Science","Information Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/10958513_13","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,3,15]],"date-time":"2019-03-15T01:22:34Z","timestamp":1552612954000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/10958513_13"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2003]]},"ISBN":["9783540201762","9783540399810"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/10958513_13","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2003]]}}}