{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T18:01:36Z","timestamp":1725904896915},"publisher-location":"Cham","reference-count":19,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319612720"},{"type":"electronic","value":"9783319612737"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-61273-7_13","type":"book-chapter","created":{"date-parts":[[2017,7,13]],"date-time":"2017-07-13T07:22:58Z","timestamp":1499930578000},"page":"252-274","source":"Crossref","is-referenced-by-count":0,"title":["Protecting Electronic Signatures in Case of Key Leakage"],"prefix":"10.1007","author":[{"given":"Miros\u0142aw","family":"Kuty\u0142owski","sequence":"first","affiliation":[]},{"given":"Jacek","family":"Cicho\u0144","sequence":"additional","affiliation":[]},{"given":"Lucjan","family":"Hanzlik","sequence":"additional","affiliation":[]},{"given":"Kamil","family":"Kluczniak","sequence":"additional","affiliation":[]},{"given":"Xiaofeng","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Jianfeng","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,7,14]]},"reference":[{"issue":"1","key":"13_CR1","doi-asserted-by":"crossref","first-page":"19","DOI":"10.1007\/s13389-013-0068-0","volume":"4","author":"GT Becker","year":"2014","unstructured":"Becker, G.T., Regazzoni, F., Paar, C., Burleson, W.P.: Stealthy dopant-level hardware Trojans: extended version. J. Cryptogr. Eng. 4(1), 19\u201331 (2014)","journal-title":"J. Cryptogr. Eng."},{"key":"13_CR2","series-title":"Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","doi-asserted-by":"publisher","first-page":"256","DOI":"10.1007\/978-3-642-23602-0_24","volume-title":"Forensics in Telecommunications, Information, and Multimedia","author":"P B\u0142a\u015bkiewicz","year":"2011","unstructured":"B\u0142a\u015bkiewicz, P., Kubiak, P., Kuty\u0142owski, M.: Digital signatures for e-government - a long-term security architecture. In: Lai, X., Gu, D., Jin, B., Wang, Y., Li, H. (eds.) e-Forensics 2010. LNICSSITE, vol. 56, pp. 256\u2013270. Springer, Heidelberg (2011). doi: 10.1007\/978-3-642-23602-0_24"},{"key":"13_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"173","DOI":"10.1007\/978-3-642-25283-9_12","volume-title":"Trusted Systems","author":"P B\u0142a\u015bkiewicz","year":"2011","unstructured":"B\u0142a\u015bkiewicz, P., Kubiak, P., Kuty\u0142owski, M.: Two-head dragon protocol: preventing cloning of signature keys. In: Chen, L., Yung, M. (eds.) INTRUST 2010. LNCS, vol. 6802, pp. 173\u2013188. Springer, Heidelberg (2011). doi: 10.1007\/978-3-642-25283-9_12"},{"key":"13_CR4","unstructured":"Boneh, D., Ding, X., Tsudik, G., Wong, C.M.: Instantenous revocation of security capabilities. In: USENIX Security Symposium (2001)"},{"key":"13_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"182","DOI":"10.1007\/978-3-642-19571-6_12","volume-title":"Theory of Cryptography","author":"V Goyal","year":"2011","unstructured":"Goyal, V., O\u2019Neill, A., Rao, V.: Correlated-input secure hash functions. In: Ishai, Y. (ed.) TCC 2011. LNCS, vol. 6597, pp. 182\u2013200. Springer, Heidelberg (2011). doi: 10.1007\/978-3-642-19571-6_12"},{"key":"13_CR6","doi-asserted-by":"crossref","unstructured":"Housley, R.: RFC 2630: cryptographic message syntax. ftp:\/\/ftp.rfc-editor.org\/in-notes\/rfc2630.txt (1999)","DOI":"10.17487\/rfc2630"},{"key":"13_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"104","DOI":"10.1007\/3-540-68697-5_9","volume-title":"Advances in Cryptology \u2014 CRYPTO 1996","author":"PC Kocher","year":"1996","unstructured":"Kocher, P.C.: Timing attacks on Implementations of Diffie-Hellman, RSA, DSS, and other systems. In: Koblitz, N. (ed.) CRYPTO 1996. LNCS, vol. 1109, pp. 104\u2013113. Springer, Heidelberg (1996). doi: 10.1007\/3-540-68697-5_9"},{"key":"13_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"132","DOI":"10.1007\/978-3-319-12087-4_9","volume-title":"Information Security and Cryptology","author":"P Kubiak","year":"2014","unstructured":"Kubiak, P., Kuty\u0142owski, M.: Supervised usage of signature creation devices. In: Lin, D., Xu, S., Yung, M. (eds.) Inscrypt 2013. LNCS, vol. 8567, pp. 132\u2013149. Springer, Cham (2014). doi: 10.1007\/978-3-319-12087-4_9"},{"key":"13_CR9","doi-asserted-by":"crossref","unstructured":"Nystrom, M., Kaliski, B.: RFC 2985: PKCS #9: selected object classes and attribute types version 2.0. ftp:\/\/ftp.rfc-editor.org\/in-notes\/rfc2985.txt (2000)","DOI":"10.17487\/rfc2985"},{"key":"13_CR10","unstructured":"Nicolosi, A., Krohn, M.N., Dodis, Y., Mazi\u00e8res, D.: Proactive two-party signatures for user authentication. In: NDSS 2003, The Internet Society (2003)"},{"issue":"2","key":"13_CR11","doi-asserted-by":"crossref","first-page":"291","DOI":"10.1137\/S009753979324557X","volume":"26","author":"TP Pedersen","year":"1997","unstructured":"Pedersen, T.P., Pfitzmann, B.: Fail-stop signatures. SIAM J. Comput. 26(2), 291\u2013330 (1997)","journal-title":"SIAM J. Comput."},{"key":"13_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"55","DOI":"10.1007\/978-3-642-03356-8_4","volume-title":"Advances in Cryptology - CRYPTO 2009","author":"M Stevens","year":"2009","unstructured":"Stevens, M., Sotirov, A., Appelbaum, J., Lenstra, A., Molnar, D., Osvik, D.A., Weger, B.: Short chosen-prefix collisions for MD5 and the creation of a rogue CA certificate. In: Halevi, S. (ed.) CRYPTO 2009. LNCS, vol. 5677, pp. 55\u201369. Springer, Heidelberg (2009). doi: 10.1007\/978-3-642-03356-8_4"},{"issue":"5","key":"13_CR13","doi-asserted-by":"crossref","first-page":"430","DOI":"10.1093\/comjnl\/43.5.430","volume":"43","author":"W Susilo","year":"2000","unstructured":"Susilo, W., Safavi-Naini, R., Gysin, M., Seberry, J.: A new and efficient fail-stop signature scheme. Comput. J. 43(5), 430\u2013437 (2000)","journal-title":"Comput. J."},{"key":"13_CR14","unstructured":"The European Parliament and European Council. Regulation (EU) no 910\/2014 of the European Parliament and of the Council on electronic identification and trust services for electronic transactions in the internal market and repealing directive 1999\/93\/EC. Official Journal of the European Union L 257\/73 (2014)"},{"key":"13_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"309","DOI":"10.1007\/978-3-319-12475-9_22","volume-title":"Provable Security","author":"T Yamakawa","year":"2014","unstructured":"Yamakawa, T., Kitajima, N., Nishide, T., Hanaoka, G., Okamoto, E.: A short fail-stop signature scheme from factoring. In: Chow, S.S.M., Liu, J.K., Hui, L.C.K., Yiu, S.M. (eds.) ProvSec 2014. LNCS, vol. 8782, pp. 309\u2013316. Springer, Cham (2014). doi: 10.1007\/978-3-319-12475-9_22"},{"key":"13_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"271","DOI":"10.1007\/978-3-642-15317-4_18","volume-title":"Security and Cryptography for Networks","author":"A Young","year":"2010","unstructured":"Young, A., Yung, M.: Kleptography from standard assumptions and applications. In: Garay, J.A., Prisco, R. (eds.) SCN 2010. LNCS, vol. 6280, pp. 271\u2013290. Springer, Heidelberg (2010). doi: 10.1007\/978-3-642-15317-4_18"},{"key":"13_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"62","DOI":"10.1007\/3-540-69053-0_6","volume-title":"Advances in Cryptology \u2014 EUROCRYPT 1997","author":"A Young","year":"1997","unstructured":"Young, A., Yung, M.: Kleptography: using cryptography against cryptography. In: Fumy, W. (ed.) EUROCRYPT 1997. LNCS, vol. 1233, pp. 62\u201374. Springer, Heidelberg (1997). doi: 10.1007\/3-540-69053-0_6"},{"key":"13_CR18","first-page":"364","volume-title":"CCS 2015","author":"G Ateniese","year":"2015","unstructured":"Ateniese, G., Magri, B., Venturi, D.: Subversion-resilient signature schemes. In: Ray, I., Li, N., Kruegel, C. (eds.) CCS 2015, pp. 364\u2013375. ACM, New York (2015)"},{"key":"13_CR19","unstructured":"Russell, A., Tang, Q., Yung, M., Zhou, H.-S.: Cliptography: clipping the power of kleptographic attacks. IACR Cryptology ePrint Archive vol. 2015, p. 695 (2015)"}],"container-title":["Lecture Notes in Computer Science","Paradigms in Cryptology \u2013 Mycrypt 2016. Malicious and Exploratory Cryptology"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-61273-7_13","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,29]],"date-time":"2019-09-29T20:58:20Z","timestamp":1569790700000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-61273-7_13"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319612720","9783319612737"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-61273-7_13","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]}}}