{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T00:36:29Z","timestamp":1775003789850,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":11,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540629757","type":"print"},{"value":"9783540690535","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1997]]},"DOI":"10.1007\/3-540-69053-0_6","type":"book-chapter","created":{"date-parts":[[2007,8,5]],"date-time":"2007-08-05T21:24:05Z","timestamp":1186349045000},"page":"62-74","source":"Crossref","is-referenced-by-count":143,"title":["Kleptography: Using Cryptography Against Cryptography"],"prefix":"10.1007","author":[{"given":"Adam","family":"Young","sequence":"first","affiliation":[]},{"given":"Moti","family":"Yung","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2001,7,13]]},"reference":[{"key":"6_CR1","doi-asserted-by":"crossref","unstructured":"Yvo Desmedt. Abuses in Cryptography and How to Fight Them. In Advances in Cryptology\u2014CRYPTO\u2019 88, pages 375\u2013389, Berlin, 1990. Springer-Verlag.","DOI":"10.1007\/0-387-34799-2_29"},{"issue":"6","key":"6_CR2","doi-asserted-by":"publisher","first-page":"644","DOI":"10.1109\/TIT.1976.1055638","volume":"22","author":"W. Diffie","year":"1976","unstructured":"W. Diffie, M. Hellman. New Directions in Cryptography. In IEEE Trans. on Information Theory, 22(6), pages 644\u2013654, 1976.","journal-title":"IEEE Trans. on Information Theory"},{"key":"6_CR3","doi-asserted-by":"crossref","unstructured":"T. ElGamal. A Public-Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms. In Advances in Cryptology\u2014CRYPTO\u2019 84, pages 10\u201318, Berlin, 1985. Springer-Verlag.","DOI":"10.1007\/3-540-39568-7_2"},{"issue":"4","key":"6_CR4","doi-asserted-by":"publisher","first-page":"210","DOI":"10.1145\/6490.6503","volume":"33","author":"O. Goldreich","year":"1986","unstructured":"O. Goldreich, S. Goldwasser, and S. Micali, How to Construct Random Functions. J. of the ACM, 33(4), pp 210\u2013217, 1986.","journal-title":"J. of the ACM"},{"key":"6_CR5","doi-asserted-by":"publisher","first-page":"270","DOI":"10.1016\/0022-0000(84)90070-9","volume":"28","author":"S. Goldwasser","year":"1984","unstructured":"S. Goldwasser and S. Micali, Probabilistic Encryption. J. Comp. Sys. Sci. 28, pp 270\u2013299, 1984.","journal-title":"J. Comp. Sys. Sci."},{"key":"6_CR6","doi-asserted-by":"crossref","unstructured":"J. Kilian and F.T. Leighton. Fair Cryptosystems Revisited. In Advances in Cryptology\u2014CRYPTO\u2019 95, pages 208\u2013221, Berlin, 1995. Springer-Verlag.","DOI":"10.1007\/3-540-44750-4_17"},{"issue":"2","key":"6_CR7","doi-asserted-by":"publisher","first-page":"120","DOI":"10.1145\/359340.359342","volume":"21","author":"R. Rivest","year":"1978","unstructured":"R. Rivest, A. Shamir, L. Adleman. A method for obtaining Digital Signatures and Public-Key Cryptosystems. In Communications of the ACM, volume 21, n. 2, pages 120\u2013126, 1978.","journal-title":"Communications of the ACM"},{"key":"6_CR8","unstructured":"Jo Schueth, public communication (sci.crypt)."},{"key":"6_CR9","doi-asserted-by":"crossref","unstructured":"G. J. Simmons. The Subliminal Channel and Digital Signatures. In Advances in Cryptology\u2014EUROCRYPT\u2019 84, pages 51\u201357, Berlin, 1985. Springer-Verlag.","DOI":"10.1007\/3-540-39757-4_25"},{"issue":"4","key":"6_CR10","doi-asserted-by":"publisher","first-page":"459","DOI":"10.1002\/ett.4460050408","volume":"5","author":"G. J. Simmons","year":"1994","unstructured":"G. J. Simmons. Subliminal Channels: Past and Present. In European Trans. on Telecommunication, 5(4), 1994, pages 459\u2013473.","journal-title":"European Trans. on Telecommunication"},{"key":"6_CR11","unstructured":"A. Young, M. Yung. The Dark Side of Black-Box Cryptography. In Advances in Cryptology\u2014CRYPTO\u2019 96, pages 89\u2013103, Springer-Verlag."}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2014 EUROCRYPT \u201997"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-69053-0_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,2,20]],"date-time":"2019-02-20T18:10:47Z","timestamp":1550686247000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-69053-0_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1997]]},"ISBN":["9783540629757","9783540690535"],"references-count":11,"URL":"https:\/\/doi.org\/10.1007\/3-540-69053-0_6","relation":{},"ISSN":["0302-9743"],"issn-type":[{"value":"0302-9743","type":"print"}],"subject":[],"published":{"date-parts":[[1997]]}}}