{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T14:13:35Z","timestamp":1742912015755,"version":"3.40.3"},"publisher-location":"Cham","reference-count":36,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783031168147"},{"type":"electronic","value":"9783031168154"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-031-16815-4_24","type":"book-chapter","created":{"date-parts":[[2022,9,23]],"date-time":"2022-09-23T20:19:35Z","timestamp":1663964375000},"page":"447-460","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["PEPEC: Precomputed ECC Points Embedded in\u00a0Certificates and\u00a0Verified by\u00a0CT Log Servers"],"prefix":"10.1007","author":[{"given":"Guangshen","family":"Cheng","sequence":"first","affiliation":[]},{"given":"Jiankuo","family":"Dong","sequence":"additional","affiliation":[]},{"given":"Xinyi","family":"Ji","sequence":"additional","affiliation":[]},{"given":"Bingyu","family":"Li","sequence":"additional","affiliation":[]},{"given":"Haoling","family":"Fan","sequence":"additional","affiliation":[]},{"given":"Pinchang","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,9,24]]},"reference":[{"key":"24_CR1","unstructured":"ALIENTEK: 4G Cat1 DTU communication module ATK-IDM751C (2022). https:\/\/detail.tmall.com\/item.htm?id=669018761342"},{"key":"24_CR2","unstructured":"Apple-Inc.: Apple\u2019s Certificate Transparency policy (2019). https:\/\/support.apple.com\/en-us\/HT205280"},{"key":"24_CR3","doi-asserted-by":"publisher","unstructured":"Boeyen, S., Santesson, S., Polk, T., Housley, R., Farrell, S., Cooper, D.: Internet X.509 public key infrastructure certificate and certificate revocation list (CRL) profile. RFC 5280, May 2008. https:\/\/doi.org\/10.17487\/RFC5280. https:\/\/www.rfc-editor.org\/info\/rfc5280","DOI":"10.17487\/RFC5280"},{"key":"24_CR4","unstructured":"Certificate-Transparency-Policy: Certificate Transparency Enforcement in Google Chrome (2018). https:\/\/groups.google.com\/a\/chromium.org\/g\/ct-policy\/c\/wHILiYf31DE\/m\/iMFmpMEkAQAJ"},{"key":"24_CR5","unstructured":"Certificate-Transparency-Policy: Mozilla CT Policy (2019). https:\/\/groups.google.com\/a\/chromium.org\/forum\/m\/#!topic\/ct-policy\/Xx1bv8r33ZE"},{"key":"24_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"698","DOI":"10.1007\/978-3-030-81652-0_27","volume-title":"Selected Areas in Cryptography","author":"H Cheng","year":"2021","unstructured":"Cheng, H., Gro\u00dfsch\u00e4dl, J., Tian, J., R\u00f8nne, P.B., Ryan, P.Y.A.: High-throughput elliptic curve cryptography using AVX2 vector instructions. In: Dunkelman, O., Jacobson, Jr., M.J., O\u2019Flynn, C. (eds.) SAC 2020. LNCS, vol. 12804, pp. 698\u2013719. Springer, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-81652-0_27"},{"key":"24_CR7","unstructured":"Comodo: Comodo report of incident (2011). https:\/\/www.comodo.com\/Comodo-Fraud-Incident-2011-03-23.html"},{"key":"24_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"214","DOI":"10.1007\/978-3-662-48797-6_10","volume-title":"Advances in Cryptology \u2013 ASIACRYPT 2015","author":"C Costello","year":"2015","unstructured":"Costello, C., Longa, P.: Four$$\\mathbb{Q}$$: four-dimensional decompositions on a $$\\mathbb{Q}$$-curve over the Mersenne prime. In: Iwata, T., Cheon, J.H. (eds.) ASIACRYPT 2015. LNCS, vol. 9452, pp. 214\u2013235. Springer, Heidelberg (2015). https:\/\/doi.org\/10.1007\/978-3-662-48797-6_10"},{"issue":"2","key":"24_CR9","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3492734","volume":"21","author":"J Dong","year":"2022","unstructured":"Dong, J., Zheng, F., Lin, J., Liu, Z., Xiao, F., Fan, G.: EC-ECC: accelerating elliptic curve cryptography for edge computing on embedded GPU TX2. ACM Trans. Embedded Comput. Syst. (TECS) 21(2), 1\u201325 (2022)","journal-title":"ACM Trans. Embedded Comput. Syst. (TECS)"},{"key":"24_CR10","doi-asserted-by":"publisher","unstructured":"Evans, C., Palmer, C., Sleevi, R.: Public key pinning extension for HTTP. RFC 7469, April 2015. https:\/\/doi.org\/10.17487\/RFC7469. https:\/\/www.rfc-editor.org\/info\/rfc7469","DOI":"10.17487\/RFC7469"},{"key":"24_CR11","series-title":"Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","doi-asserted-by":"publisher","first-page":"123","DOI":"10.1007\/978-3-319-93797-7_14","volume-title":"Interoperability, Safety and Security in IoT","author":"F Forsby","year":"2018","unstructured":"Forsby, F., Furuhed, M., Papadimitratos, P., Raza, S.: Lightweight X.509 digital certificates for the Internet of Things. In: Fortino, G., et al. (eds.) InterIoT\/SaSeIoT -2017. LNICST, vol. 242, pp. 123\u2013133. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-93797-7_14"},{"key":"24_CR12","unstructured":"OpenSSL Software Foundation: OpenSSL Cryptography and SSL\/TLS Toolkit (2016). http:\/\/www.openssl.org\/"},{"key":"24_CR13","doi-asserted-by":"crossref","unstructured":"Gao, L., Zheng, F., Emmart, N., Dong, J., Lin, J., Weems, C.: DPF-ECC: accelerating elliptic curve cryptography with floating-point computing power of GPUs. In: 2020 IEEE International Parallel and Distributed Processing Symposium (IPDPS), pp. 494\u2013504. IEEE (2020)","DOI":"10.1109\/IPDPS47924.2020.00058"},{"key":"24_CR14","doi-asserted-by":"publisher","unstructured":"Hallam-Baker, P., Stradling, R.: DNS Certification Authority Authorization (CAA) resource record. RFC 6844, January 2013. https:\/\/doi.org\/10.17487\/RFC6844. https:\/\/www.rfc-editor.org\/info\/rfc6844","DOI":"10.17487\/RFC6844"},{"key":"24_CR15","doi-asserted-by":"publisher","DOI":"10.1007\/b97644","volume-title":"Guide to Elliptic Curve Cryptography","author":"D Hankerson","year":"2004","unstructured":"Hankerson, D., Vanstone, S., Menezes, A.J.: Guide to Elliptic Curve Cryptography. Springer, New York (2004). https:\/\/doi.org\/10.1007\/b97644"},{"key":"24_CR16","doi-asserted-by":"crossref","unstructured":"Harkanson, R., Kim, Y.: Applications of elliptic curve cryptography: a light introduction to elliptic curves and a survey of their applications. In: Proceedings of the 12th Annual Conference on Cyber and Information Security Research, p. 6. ACM (2017)","DOI":"10.1145\/3064814.3064818"},{"key":"24_CR17","doi-asserted-by":"publisher","unstructured":"Hoffman, P.E., Schlyter, J.: The DNS-based Authentication of Named Entities (DANE) Transport Layer Security (TLS) protocol: TLSA. RFC 6698, August 2012. https:\/\/doi.org\/10.17487\/RFC6698. https:\/\/www.rfc-editor.org\/info\/rfc6698","DOI":"10.17487\/RFC6698"},{"key":"24_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"517","DOI":"10.1007\/978-3-662-53140-2_25","volume-title":"Cryptographic Hardware and Embedded Systems \u2013 CHES 2016","author":"K J\u00e4rvinen","year":"2016","unstructured":"J\u00e4rvinen, K., Miele, A., Azarderakhsh, R., Longa, P.: Four$$\\mathbb{Q}$$ on FPGA: new hardware speed records for elliptic curve cryptography over large prime characteristic fields. In: Gierlichs, B., Poschmann, A.Y. (eds.) CHES 2016. LNCS, vol. 9813, pp. 517\u2013537. Springer, Heidelberg (2016). https:\/\/doi.org\/10.1007\/978-3-662-53140-2_25"},{"key":"24_CR19","doi-asserted-by":"publisher","unstructured":"Josefsson, S., Liusvaara, I.: Edwards-Curve Digital Signature Algorithm (EdDSA). RFC 8032, January 2017. https:\/\/doi.org\/10.17487\/RFC8032. https:\/\/rfc-editor.org\/rfc\/rfc8032.txt","DOI":"10.17487\/RFC8032"},{"key":"24_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"329","DOI":"10.1007\/978-3-642-39884-1_28","volume-title":"Financial Cryptography and Data Security","author":"J Kasten","year":"2013","unstructured":"Kasten, J., Wustrow, E., Halderman, J.A.: CAge: taming certificate authorities by inferring restricted scopes. In: Sadeghi, A.-R. (ed.) FC 2013. LNCS, vol. 7859, pp. 329\u2013337. Springer, Heidelberg (2013). https:\/\/doi.org\/10.1007\/978-3-642-39884-1_28"},{"issue":"177","key":"24_CR21","doi-asserted-by":"publisher","first-page":"203","DOI":"10.1090\/S0025-5718-1987-0866109-5","volume":"48","author":"N Koblitz","year":"1987","unstructured":"Koblitz, N.: Elliptic curve cryptosystems. Math. Comput. 48(177), 203\u2013209 (1987)","journal-title":"Math. Comput."},{"key":"24_CR22","doi-asserted-by":"publisher","unstructured":"Langley, A., Hamburg, M., Turner, S.: Elliptic Curves for Security. RFC 7748, January 2016. https:\/\/doi.org\/10.17487\/RFC7748. https:\/\/rfc-editor.org\/rfc\/rfc7748.txt","DOI":"10.17487\/RFC7748"},{"key":"24_CR23","doi-asserted-by":"publisher","unstructured":"Larisch, J., Choffnes, D., Levin, D., Maggs, B.M., Mislove, A., Wilson, C.: CRLite: a scalable system for pushing all TLS revocations to all browsers. In: 2017 IEEE Symposium on Security and Privacy (SP), pp. 539\u2013556 (2017). https:\/\/doi.org\/10.1109\/SP.2017.17","DOI":"10.1109\/SP.2017.17"},{"key":"24_CR24","doi-asserted-by":"publisher","unstructured":"Laurie, B., Langley, A., Kasper, E.: Certificate Transparency. RFC 6962, June 2013. https:\/\/doi.org\/10.17487\/RFC6962. https:\/\/www.rfc-editor.org\/info\/rfc6962","DOI":"10.17487\/RFC6962"},{"key":"24_CR25","doi-asserted-by":"crossref","unstructured":"Li, B., et al.: Certificate transparency in the wild: exploring the reliability of monitors. In: Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, pp. 2505\u20132520 (2019)","DOI":"10.1145\/3319535.3345653"},{"issue":"3","key":"24_CR26","first-page":"536","volume":"17","author":"Z Liu","year":"2018","unstructured":"Liu, Z., Longa, P., Pereira, G.C., Reparaz, O., Seo, H.: Four$$\\mathbb{Q} $$ on embedded devices with strong countermeasures against side-channel attacks. IEEE Trans. Dependable Secure Comput. 17(3), 536\u2013549 (2018)","journal-title":"IEEE Trans. Dependable Secure Comput."},{"key":"24_CR27","doi-asserted-by":"crossref","unstructured":"Lochter, M., Merkle, J.: Elliptic curve cryptography (ECC) brainpool standard curves and curve generation. Technical report (2010)","DOI":"10.17487\/rfc5639"},{"key":"24_CR28","unstructured":"Monton, A.L.: History of the Internet (2021). https:\/\/www.globalsign.com\/en-sg\/blog\/history-internet-development-pki"},{"key":"24_CR29","doi-asserted-by":"publisher","unstructured":"National Institute of Standards and Technology: Digital Signature Standard (DSS) (2013). https:\/\/doi.org\/10.6028\/NIST.FIPS.186-4.pdf","DOI":"10.6028\/NIST.FIPS.186-4.pdf"},{"key":"24_CR30","unstructured":"NGINX: NGINX Unit Now Supports TLS (2018). https:\/\/www.nginx.com\/blog\/nginx-unit-1-5-available-now\/"},{"issue":"1","key":"24_CR31","doi-asserted-by":"publisher","first-page":"111","DOI":"10.1109\/TIFS.2016.2603974","volume":"12","author":"W Pan","year":"2017","unstructured":"Pan, W., Zheng, F., Zhu, W., Jing, J.: An efficient elliptic curve cryptography signature server with GPU acceleration. IEEE Trans. Inf. Forensics Secur. 12(1), 111\u2013122 (2017)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"24_CR32","doi-asserted-by":"crossref","unstructured":"Rescorla, E.: The transport layer security (TLS) protocol version 1.3. RFC 8446(1-160), p. 10, 2018.17487\/RFC8446. https:\/\/doi.org\/10.17487\/RFC8446","DOI":"10.17487\/RFC8446"},{"key":"24_CR33","doi-asserted-by":"crossref","unstructured":"Szalachowski, P., Matsumoto, S., Perrig, A.: PoliCert: secure and flexible TLS certificate management. ACM (2014)","DOI":"10.1145\/2660267.2660355"},{"key":"24_CR34","doi-asserted-by":"publisher","unstructured":"Szalachowski, P., Chuat, L., Perrig, A.: PKI safety net (PKISN): addressing the too-big-to-be-revoked problem of the TLS ecosystem. In: 2016 IEEE European Symposium on Security and Privacy (EuroSP), pp. 407\u2013422 (2016). https:\/\/doi.org\/10.1109\/EuroSP.2016.38","DOI":"10.1109\/EuroSP.2016.38"},{"key":"24_CR35","unstructured":"The-OpenSSL-Project-Authors: Certificate transparency in OpenSSL (2018). https:\/\/www.openssl.org\/docs\/man3.0\/man7\/ct.html"},{"key":"24_CR36","unstructured":"Wikipedia: Flame (malware) (2022). https:\/\/en.wikipedia.org\/wiki\/Flame_(malware)"}],"container-title":["Lecture Notes in Computer Science","Applied Cryptography and Network Security Workshops"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-16815-4_24","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,15]],"date-time":"2025-03-15T13:08:43Z","timestamp":1742044123000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-16815-4_24"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783031168147","9783031168154"],"references-count":36,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-16815-4_24","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"24 September 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ACNS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Applied Cryptography and Network Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Rome","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Italy","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20 June 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23 June 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"acns2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/sites.google.com\/di.uniroma1.it\/acns2022\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}