{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T18:01:29Z","timestamp":1725904889147},"publisher-location":"Cham","reference-count":16,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319612720"},{"type":"electronic","value":"9783319612737"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-61273-7_2","type":"book-chapter","created":{"date-parts":[[2017,7,13]],"date-time":"2017-07-13T07:22:58Z","timestamp":1499930578000},"page":"11-18","source":"Crossref","is-referenced-by-count":0,"title":["Time for a Paradigm Shift in Our Disciplinary Culture?"],"prefix":"10.1007","author":[{"given":"Neal","family":"Koblitz","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,7,14]]},"reference":[{"key":"2_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"28","DOI":"10.1007\/3-540-58691-1_39","volume-title":"Algorithmic Number Theory","author":"LM Adleman","year":"1994","unstructured":"Adleman, L.M., DeMarrais, J., Huang, M.-D.: A subexponential algorithm for discrete logarithms over the rational subgroup of the Jacobians of large genus hyperelliptic curves over finite fields. In: Adleman, L.M., Huang, M.-D. (eds.) ANTS 1994. LNCS, vol. 877, pp. 28\u201340. Springer, Heidelberg (1994). doi: 10.1007\/3-540-58691-1_39"},{"key":"2_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"602","DOI":"10.1007\/11818175_36","volume-title":"Advances in Cryptology - CRYPTO 2006","author":"M Bellare","year":"2006","unstructured":"Bellare, M.: New proofs for NMAC and HMAC: security without collision-resistance. In: Dwork, C. (ed.) CRYPTO 2006. LNCS, vol. 4117, pp. 602\u2013619. Springer, Heidelberg (2006). doi: 10.1007\/11818175_36"},{"key":"2_CR3","unstructured":"Bellare, M.: Email to Koblitz, N., 24 February 2012"},{"key":"2_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"154","DOI":"10.1007\/3-540-49162-7_12","volume-title":"Public Key Cryptography","author":"S Blake-Wilson","year":"1999","unstructured":"Blake-Wilson, S., Menezes, A.: Unknown key-share attacks on the station-to-station (STS) protocol. In: Imai, H., Zheng, Y. (eds.) PKC 1999. LNCS, vol. 1560, pp. 154\u2013170. Springer, Heidelberg (1999). doi: 10.1007\/3-540-49162-7_12"},{"key":"2_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"21","DOI":"10.1007\/978-3-319-61273-7_3","volume-title":"Paradigms in Cryptology \u2013 Mycrypt 2016. Malicious and Exploratory Cryptology","author":"S Chatterjee","year":"2017","unstructured":"Chatterjee, S., Koblitz, N., Menezes, A., Sarkar, P.: Another look at tightness II. In: Phan, R.C.-W., Yung, M. (eds.) Mycrypt 2016. LNCS, vol. 10311, pp. 21\u201355. Springer, Cham (2017)"},{"key":"2_CR6","doi-asserted-by":"crossref","unstructured":"Goldwasser, S., Micali, S., Rivest, R.: A \u201cparadoxical\u201d solution to the signature problem. In: Proceedings of the 25th Annual IEEE Symposium on the Foundations of Computer Science, pp. 441\u2013448 (1984)","DOI":"10.1109\/SFCS.1984.715946"},{"key":"2_CR7","doi-asserted-by":"crossref","DOI":"10.1201\/9781420010756","volume-title":"Introduction to Modern Cryptography","author":"J Katz","year":"2007","unstructured":"Katz, J., Lindell, Y.: Introduction to Modern Cryptography. Chapman and Hall\/CRC, London (2007)"},{"key":"2_CR8","first-page":"972","volume":"54","author":"N Koblitz","year":"2007","unstructured":"Koblitz, N.: The uneasy relationship between mathematics and cryptography. Not. Amer. Math. Soc. 54, 972\u2013979 (2007)","journal-title":"Not. Amer. Math. Soc."},{"key":"2_CR9","doi-asserted-by":"crossref","first-page":"225","DOI":"10.1515\/jmc-2013-5004","volume":"7","author":"N Koblitz","year":"2013","unstructured":"Koblitz, N., Menezes, A.: Another look at HMAC. J. Math. Cryptol. 7, 225\u2013251 (2013)","journal-title":"J. Math. Cryptol."},{"key":"2_CR10","doi-asserted-by":"crossref","first-page":"1","DOI":"10.3934\/amc.2013.7.1","volume":"7","author":"N Koblitz","year":"2013","unstructured":"Koblitz, N., Menezes, A.: Another look at security definitions. Adv. Math. Commun. 7, 1\u201338 (2013)","journal-title":"Adv. Math. Commun."},{"key":"2_CR11","doi-asserted-by":"crossref","first-page":"69","DOI":"10.1007\/978-3-319-10683-0_4","volume-title":"Open Problems in Mathematics and Computational Science","author":"N Koblitz","year":"2014","unstructured":"Koblitz, N., Menezes, A.: Another look at security theorems for 1-key nested MACs. In: Ko\u00e7, \u00c7. (ed.) Open Problems in Mathematics and Computational Science, pp. 69\u201389. Springer, Cham (2014)"},{"key":"2_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"546","DOI":"10.1007\/11535218_33","volume-title":"Advances in Cryptology \u2013 CRYPTO 2005","author":"H Krawczyk","year":"2005","unstructured":"Krawczyk, H.: HMQV: a high-performance secure Diffie-Hellman protocol. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol. 3621, pp. 546\u2013566. Springer, Heidelberg (2005). doi: 10.1007\/11535218_33"},{"key":"2_CR13","doi-asserted-by":"crossref","first-page":"47","DOI":"10.1515\/JMC.2007.004","volume":"1","author":"A Menezes","year":"2007","unstructured":"Menezes, A.: Another look at HMQV. J. Math. Cryptol. 1, 47\u201364 (2007)","journal-title":"J. Math. Cryptol."},{"key":"2_CR14","doi-asserted-by":"crossref","first-page":"1639","DOI":"10.1109\/18.259647","volume":"39","author":"A Menezes","year":"1993","unstructured":"Menezes, A., Okamoto, T., Vanstone, S.: Reducing elliptic curve logarithms to logarithms in a finite field. IEEE Trans. Inf. Theory 39, 1639\u20131646 (1993)","journal-title":"IEEE Trans. Inf. Theory"},{"key":"2_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"278","DOI":"10.1007\/978-3-540-24638-1_16","volume-title":"Theory of Cryptography","author":"S Micali","year":"2004","unstructured":"Micali, S., Reyzin, L.: Physically observable cryptography. In: Naor, M. (ed.) TCC 2004. LNCS, vol. 2951, pp. 278\u2013296. Springer, Heidelberg (2004). doi: 10.1007\/978-3-540-24638-1_16"},{"key":"2_CR16","unstructured":"Zaverucha, G.M.: Hybrid encryption in the multi-user setting. http:\/\/eprint.iacr.org\/2012\/159.pdf"}],"container-title":["Lecture Notes in Computer Science","Paradigms in Cryptology \u2013 Mycrypt 2016. Malicious and Exploratory Cryptology"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-61273-7_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,8,24]],"date-time":"2023-08-24T09:30:46Z","timestamp":1692869446000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-61273-7_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319612720","9783319612737"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-61273-7_2","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]}}}