{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T21:34:13Z","timestamp":1725572053329},"publisher-location":"Berlin, Heidelberg","reference-count":19,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540666820"},{"type":"electronic","value":"9783540479420"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1999]]},"DOI":"10.1007\/978-3-540-47942-0_26","type":"book-chapter","created":{"date-parts":[[2010,12,17]],"date-time":"2010-12-17T04:16:22Z","timestamp":1292559382000},"page":"309-323","source":"Crossref","is-referenced-by-count":5,"title":["On the Channel Capacity of Narrow-Band Subliminal Channels"],"prefix":"10.1007","author":[{"given":"Kazukuni","family":"Kobara","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Hideki","family":"Imai","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"issue":"169","key":"26_CR1","first-page":"42980","volume":"56","author":"Proposed federal information processing standard for digital signature standard (DSS)","year":"1991","unstructured":"Proposed federal information processing standard for digital signature standard (DSS). Federal Register 56(169), 42980\u2013429892 (1991)","journal-title":"Federal Register"},{"key":"26_CR2","unstructured":"Public key cryptography for the financial services industry: The elliptic curve digital signature algorithm (ECDSA). American National Standard X9.62-1998 (1998)"},{"key":"26_CR3","doi-asserted-by":"crossref","first-page":"151","DOI":"10.1007\/3-540-61996-8_38","volume-title":"Information Hiding","author":"Ross Anderson","year":"1996","unstructured":"Anderson, R., Vaudenay, S., Preneel, B., Nyberg, K.: The Newton channel. In: 1st Int. Workshop on Information Hiding, pp. 151\u2013156 (1996)"},{"key":"26_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1007\/3-540-49649-1_3","volume-title":"Advances in Cryptology - ASIACRYPT\u201998","author":"D. Boneh","year":"1998","unstructured":"Boneh, D., Durfee, G., Frankel, Y.: An attack on RSA given a small fraction of the private key bits. In: Ohta, K., Pei, D. (eds.) ASIACRYPT 1998. LNCS, vol.\u00a01514, pp. 25\u201334. Springer, Heidelberg (1998)"},{"key":"26_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"157","DOI":"10.1007\/3-540-61996-8_39","volume-title":"Information Hiding","author":"M. Burmester","year":"1996","unstructured":"Burmester, M., Desmedt, Y., Itoh, T., Sakurai, K., Shizuya, H., Yung, M.: A pro- gress report on subliminal-free channels. In: Anderson, R. (ed.) IH 1996. LNCS, vol.\u00a01174, pp. 157\u2013168. Springer, Heidelberg (1996)"},{"key":"26_CR6","doi-asserted-by":"crossref","unstructured":"Desmedt, Y.: Simmons protocol is not free of subliminal channels. In: Proc. of 9th IEEE Computer Security Foundations Workshop, pp. 170\u2013175 (1996)","DOI":"10.1109\/CSFW.1996.503702"},{"key":"26_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"10","DOI":"10.1007\/3-540-39568-7_2","volume-title":"Advances in Cryptology","author":"T. ElGamal","year":"1985","unstructured":"ElGamal, T.: A public-key cryptosystem and a signature scheme bsed on discrete logarithms. In: Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol.\u00a0196, pp. 10\u201318. Springer, Heidelberg (1985)"},{"key":"26_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"325","DOI":"10.1007\/BFb0028488","volume-title":"Information and Communications Security","author":"K. Kobara","year":"1997","unstructured":"Kobara, K., Imai, H.: Self-synchronized message randomization methods for subliminal channels. In: Han, Y., Quing, S. (eds.) ICICS 1997. LNCS, vol.\u00a01334, pp. 325\u2013334. Springer, Heidelberg (1997)"},{"key":"26_CR9","unstructured":"Kobara, K., Imai, H.: The capacity of a channel with a one-way function. In: Proc. of Japan\u2013Korea Joint Workshop on Information Security and Cryptology (JW-ISC) 1997, pp. 173\u2013179 (1997)"},{"key":"26_CR10","doi-asserted-by":"crossref","first-page":"51","DOI":"10.1007\/978-1-4684-4730-9_5","volume-title":"Advances in Cryptology","author":"Gustavus J. Simmons","year":"1984","unstructured":"Simmons, G.J.: The prisoners problem and the subliminal channel. In: Proc. of CRYPTO 1983, pp. 51\u201367 (1984)"},{"key":"26_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"364","DOI":"10.1007\/3-540-39757-4_25","volume-title":"Advances in Cryptology","author":"G.J. Simmons","year":"1985","unstructured":"Simmons, G.J.: The subliminal channel and digital signatures. In: Beth, T., Cot, N., Ingemarsson, I. (eds.) EUROCRYPT 1984. LNCS, vol.\u00a0209, pp. 364\u2013378. Springer, Heidelberg (1985)"},{"key":"26_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"33","DOI":"10.1007\/3-540-39799-X_5","volume-title":"Advances in Cryptology","author":"G.J. Simmons","year":"1986","unstructured":"Simmons, G.J.: A secure subliminal channel (?). In: Williams, H.C. (ed.) CRYPTO 1985. LNCS, vol.\u00a0218, pp. 33\u201341. Springer, Heidelberg (1986)"},{"issue":"4","key":"26_CR13","doi-asserted-by":"crossref","first-page":"459","DOI":"10.1002\/ett.4460050408","volume":"4","author":"G.J. Simmons","year":"1994","unstructured":"Simmons, G.J.: Subliminal Channels: Past and Present. European Trans. On Telecommunications\u00a04(4), 459\u2013473 (1994)","journal-title":"European Trans. On Telecommunications"},{"key":"26_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"218","DOI":"10.1007\/3-540-48285-7_18","volume-title":"Advances in Cryptology - EUROCRYPT \u201993","author":"G.J. Simmons","year":"1994","unstructured":"Simmons, G.J.: Subliminal communication is easy using the DSA. In: Helleseth, T. (ed.) EUROCRYPT 1993. LNCS, vol.\u00a0765, pp. 218\u2013232. Springer, Heidelberg (1994)"},{"issue":"4","key":"26_CR15","doi-asserted-by":"publisher","first-page":"463","DOI":"10.1109\/49.668970","volume":"16","author":"G.J. Simmons","year":"1998","unstructured":"Simmons, G.J.: Results concerning the bandwidth of subliminal channels. IEEE Journal on Selected Areas in Communication\u00a016(4), 463\u2013473 (1998)","journal-title":"IEEE Journal on Selected Areas in Communication"},{"issue":"4","key":"26_CR16","doi-asserted-by":"publisher","first-page":"452","DOI":"10.1109\/49.668969","volume":"16","author":"G.J. Simmons","year":"1998","unstructured":"Simmons, G.J.: The History of Subliminal Channels. IEEE Journal on Selected Areas in Communication\u00a016(4), 452\u2013462 (1998)","journal-title":"IEEE Journal on Selected Areas in Communication"},{"key":"26_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"89","DOI":"10.1007\/3-540-68697-5_8","volume-title":"Advances in Cryptology - CRYPTO \u201996","author":"A. Young","year":"1996","unstructured":"Young, A., Yung, M.: The dark side of black-box cryptography or: Should we trust capstone? In: Koblitz, N. (ed.) CRYPTO 1996. LNCS, vol.\u00a01109, pp. 89\u2013103. Springer, Heidelberg (1996)"},{"key":"26_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"62","DOI":"10.1007\/3-540-69053-0_6","volume-title":"Advances in Cryptology - EUROCRYPT \u201997","author":"A. Young","year":"1997","unstructured":"Young, A., Yung, M.: Kleptography: Using cryptography against cryptography. In: Fumy, W. (ed.) EUROCRYPT 1997. LNCS, vol.\u00a01233, pp. 62\u201374. Springer, Heidelberg (1997)"},{"key":"26_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"264","DOI":"10.1007\/BFb0052241","volume-title":"Advances in Cryptology - CRYPTO \u201997","author":"A. Young","year":"1997","unstructured":"Young, A., Yung, M.: The prevalence of kleptographic attacks on discretelog based cryptosystems. In: Kaliski Jr., B.S. (ed.) CRYPTO 1997. LNCS, vol.\u00a01294, pp. 264\u2013276. Springer, Heidelberg (1997)"}],"container-title":["Lecture Notes in Computer Science","Information and Communication Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-47942-0_26","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,10,13]],"date-time":"2018-10-13T02:45:21Z","timestamp":1539398721000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-47942-0_26"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1999]]},"ISBN":["9783540666820","9783540479420"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-47942-0_26","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[1999]]}}}