{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T10:40:49Z","timestamp":1725878449871},"publisher-location":"Cham","reference-count":23,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319521527"},{"type":"electronic","value":"9783319521534"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-52153-4_9","type":"book-chapter","created":{"date-parts":[[2017,1,9]],"date-time":"2017-01-09T03:11:15Z","timestamp":1483931475000},"page":"149-164","source":"Crossref","is-referenced-by-count":5,"title":["Surnaming Schemes, Fast Verification, and Applications to SGX Technology"],"prefix":"10.1007","author":[{"given":"Dan","family":"Boneh","sequence":"first","affiliation":[]},{"given":"Shay","family":"Gueron","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,1,10]]},"reference":[{"key":"9_CR1","unstructured":"An attack on RSA digital signature. A NIST document (2006). http:\/\/csrc.nist.gov\/groups\/ST\/toolkit\/documents\/dss\/RSAstatement_10-12-06.pdf"},{"key":"9_CR2","unstructured":"Intel $$^{\\textregistered }$$ Software Guard Extensions Programming Reference (2014). https:\/\/software.intel.com\/en-us\/isa-extensions\/intel-sgx"},{"key":"9_CR3","unstructured":"Anati, I., Gueron, S., Johnson, S., Scarlata, V.: Innovative technology for CPU based attestation and sealing. In: Proceedings of the 2nd International Workshop on Hardware and Architectural Support for Security and Privacy, vol. 13 (2013)"},{"key":"9_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"399","DOI":"10.1007\/3-540-68339-9_34","volume-title":"Advances in Cryptology \u2014 EUROCRYPT \u201996","author":"M Bellare","year":"1996","unstructured":"Bellare, M., Rogaway, P.: The exact security of digital signatures-how to sign with RSA and Rabin. In: Maurer, U. (ed.) EUROCRYPT 1996. LNCS, vol. 1070, pp. 399\u2013416. Springer, Heidelberg (1996). doi: 10.1007\/3-540-68339-9_34"},{"key":"9_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"368","DOI":"10.1007\/978-3-662-46800-5_15","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2015","author":"DJ Bernstein","year":"2015","unstructured":"Bernstein, D.J., Hopwood, D., H\u00fclsing, A., Lange, T., Niederhagen, R., Papachristodoulou, L., Schneider, M., Schwabe, P., Wilcox-O\u2019Hearn, Z.: SPHINCS: practical stateless hash-based signatures. In: Oswald, E., Fischlin, M. (eds.) EUROCRYPT 2015. LNCS, vol. 9056, pp. 368\u2013397. Springer, Heidelberg (2015). doi: 10.1007\/978-3-662-46800-5_15"},{"key":"9_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"145","DOI":"10.1007\/BFb0034843","volume-title":"Advances in Cryptology \u2014 ASIACRYPT \u201996","author":"D Bleichenbacher","year":"1996","unstructured":"Bleichenbacher, D., Maurer, U.: On the efficiency of one-time digital signatures. In: Kim, K., Matsumoto, T. (eds.) ASIACRYPT 1996. LNCS, vol. 1163, pp. 145\u2013158. Springer, Heidelberg (1996). doi: 10.1007\/BFb0034843"},{"key":"9_CR7","unstructured":"Boneh, D., Gueron, S.: Surnaming schemes, fast verification, and applications to SGX technology (2016). http:\/\/crypto.stanford.edu\/~dabo\/pubs\/abstracts\/surnaming.html"},{"issue":"4","key":"9_CR8","doi-asserted-by":"crossref","first-page":"297","DOI":"10.1007\/s00145-004-0314-9","volume":"17","author":"D Boneh","year":"2004","unstructured":"Boneh, D., Lynn, B., Shacham, H.: Short signatures from the Weil pairing. J. Cryptol. 17(4), 297\u2013319 (2004)","journal-title":"J. Cryptol."},{"key":"9_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"363","DOI":"10.1007\/978-3-642-21969-6_23","volume-title":"Progress in Cryptology \u2013 AFRICACRYPT 2011","author":"J Buchmann","year":"2011","unstructured":"Buchmann, J., Dahmen, E., Ereth, S., H\u00fclsing, A., R\u00fcckert, M.: On the security of the Winternitz one-time signature scheme. In: Nitaj, A., Pointcheval, D. (eds.) AFRICACRYPT 2011. LNCS, vol. 6737, pp. 363\u2013378. Springer, Heidelberg (2011). doi: 10.1007\/978-3-642-21969-6_23"},{"key":"9_CR10","doi-asserted-by":"crossref","unstructured":"Gueron, S.: Quick verification of RSA signatures. In: 2011 Eighth International Conference on Information Technology: New Generations (ITNG), pp. 382\u2013386, April 2011","DOI":"10.1109\/ITNG.2011.74"},{"key":"9_CR11","unstructured":"Gueron, S.: A memory encryption engine suitable for general purpose processors. Cryptology ePrint Archive, Report 2016\/204 (2016). http:\/\/eprint.iacr.org\/"},{"key":"9_CR12","unstructured":"Gueron, S., Krasnov, V.: Improved P256 ECC performance by means of a dedicated function for modular inversion modulo the P256 group order. OpenSSL patch (2015). https:\/\/mta.openssl.org\/pipermail\/openssl-dev\/2015-December\/003821.html"},{"key":"9_CR13","doi-asserted-by":"crossref","unstructured":"Gueron, S., Mouha, N.: Simpira v2: a family of efficient permutations using the AES round function. Cryptology ePrint Archive, Report 2016\/122 (2016)","DOI":"10.1007\/978-3-662-53887-6_4"},{"key":"9_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1007\/11818175_3","volume-title":"Advances in Cryptology - CRYPTO 2006","author":"S Halevi","year":"2006","unstructured":"Halevi, S., Krawczyk, H.: Strengthening digital signatures via randomized hashing. In: Dwork, C. (ed.) CRYPTO 2006. LNCS, vol. 4117, pp. 41\u201359. Springer, Heidelberg (2006). doi: 10.1007\/11818175_3"},{"key":"9_CR15","doi-asserted-by":"crossref","unstructured":"Hoekstra, M., Lal, R., Pappachan, P., Phegade, V., Del Cuvillo, J.: Using innovative instructions to create trustworthy software solutions. In: Proceedings of the 2nd International Workshop on Hardware and Architectural Support for Security and Privacy, HASP 2013, p. 11:1. ACM, New York (2013)","DOI":"10.1145\/2487726.2488370"},{"key":"9_CR16","unstructured":"Johnson, S., Scarlata, V., Rozas, C., Brickell, E., Mckeen, F.: Extensions, Intel $$^{\\textregistered }$$ Software Guard: EPID provisioning and attestation services. White Paper (2016)"},{"key":"9_CR17","doi-asserted-by":"crossref","unstructured":"Kaliski, B.S.: Public-Key Cryptography Standards (PKCS) #1: RSA CryptographySpecifications Version 2.1. RFC 3447, October 2015","DOI":"10.17487\/RFC8017"},{"key":"9_CR18","doi-asserted-by":"crossref","unstructured":"McKeen, F., Alexandrovich, I., Berenzon, A., Rozas, C.V., Shafi, H., Shanbhogue, V., Savagaonkar, U.R.: Innovative instructions and software model for isolated execution. In: Proceedings of the 2nd International Workshop on Hardware and Architectural Support for Security and Privacy, HASP 2013, p. 10:1. ACM, New York (2013)","DOI":"10.1145\/2487726.2488368"},{"key":"9_CR19","unstructured":"Menezes, A.: Another look at HMQV. Cryptology ePrint Archive, Report 2005\/205 (2005). http:\/\/eprint.iacr.org\/"},{"key":"9_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"218","DOI":"10.1007\/0-387-34805-0_21","volume-title":"Advances in Cryptology \u2014 CRYPTO \u201989 Proceedings","author":"RC Merkle","year":"1990","unstructured":"Merkle, R.C.: A certified digital signature. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol. 435, pp. 218\u2013238. Springer, Heidelberg (1990). doi: 10.1007\/0-387-34805-0_21"},{"key":"9_CR21","doi-asserted-by":"crossref","unstructured":"Nyberg, K., Rueppel, A.: A new signature scheme based on the DSA giving message recovery. In: Proceedings of the 1st ACM Conference on Computer and Communications Security, CCS 1993 (1993)","DOI":"10.1145\/168588.168595"},{"key":"9_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"144","DOI":"10.1007\/3-540-45450-0_11","volume-title":"Information Security and Privacy","author":"L Reyzin","year":"2002","unstructured":"Reyzin, L., Reyzin, N.: Better than BiBa: short one-time signatures with fast signing and verifying. In: Batten, L., Seberry, J. (eds.) ACISP 2002. LNCS, vol. 2384, pp. 144\u2013153. Springer, Heidelberg (2002). doi: 10.1007\/3-540-45450-0_11"},{"issue":"7","key":"9_CR23","doi-asserted-by":"crossref","first-page":"41","DOI":"10.1145\/129902.129905","volume":"35","author":"RL Rivest","year":"1992","unstructured":"Rivest, R.L., Hellman, M.E., Anderson, J.C., Lyons, J.W.: Responses to NIST\u2019s proposal. Commun. ACM 35(7), 41\u201354 (1992)","journal-title":"Commun. ACM"}],"container-title":["Lecture Notes in Computer Science","Topics in Cryptology \u2013 CT-RSA 2017"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-52153-4_9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,17]],"date-time":"2019-09-17T04:34:46Z","timestamp":1568694886000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-52153-4_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319521527","9783319521534"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-52153-4_9","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]}}}