{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T23:17:52Z","timestamp":1725491872904},"publisher-location":"Berlin, Heidelberg","reference-count":21,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540741237"},{"type":"electronic","value":"9783540741244"}],"license":[{"start":{"date-parts":[[2007,1,1]],"date-time":"2007-01-01T00:00:00Z","timestamp":1167609600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2007]]},"DOI":"10.1007\/978-3-540-74124-4_11","type":"book-chapter","created":{"date-parts":[[2007,9,12]],"date-time":"2007-09-12T23:06:39Z","timestamp":1189638399000},"page":"161-171","source":"Crossref","is-referenced-by-count":0,"title":["Hiding Information Hiding"],"prefix":"10.1007","author":[{"given":"Adam","family":"Young","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Moti","family":"Yung","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"key":"11_CR1","doi-asserted-by":"crossref","unstructured":"Brassard, G., Cr\u00e9peau, C., Robert, J.M.: All-or-nothing disclosure of secrets. In: Advances in Cryptology\u2014Crypto 1986, pp. 234\u2013238 (1986)","DOI":"10.1007\/3-540-47721-7_17"},{"key":"11_CR2","doi-asserted-by":"crossref","unstructured":"Brassard, G., Cr\u00e9peau, C., Robert, J.M.: Information Theoretic Reductions among Disclosure Problems. In: IEEE Symposium on Foundations of Computer Science, pp. 168\u2013173 (1986)","DOI":"10.1109\/SFCS.1986.26"},{"key":"11_CR3","doi-asserted-by":"crossref","unstructured":"Berger, R., Peralta, R., Tedrick, T.: A Provably Secure Oblivious Transfer Protocol. In: Advances in Cryptology\u2014Eurocrypt 1984, pp. 379\u2013386 (1985)","DOI":"10.1007\/3-540-39757-4_26"},{"key":"11_CR4","unstructured":"Blum, M.: Three applications of the oblivious transfer: Part I: Coin flipping by telephone; Part II: How to exchange secrets; Part III: How to send certified electronic mail. UC Berkeley (1981)"},{"key":"11_CR5","doi-asserted-by":"crossref","unstructured":"Boneh, D.: The Decision Diffie-Hellman Problem. In: Proceedings of the Third Algorithmic Number Theory Symposium\u2014ANTS, pp. 48\u201363 (1998)","DOI":"10.1007\/BFb0054851"},{"key":"11_CR6","doi-asserted-by":"crossref","unstructured":"Canetti, R., Dwork, C., Naor, M., Ostrovsky, R.: Deniable Encryption. In: Advances in Cryptology\u2014Crypto 1997, pp. 90\u2013104 (1997)","DOI":"10.1007\/BFb0052229"},{"key":"11_CR7","doi-asserted-by":"crossref","unstructured":"Cramer, R., Shoup, V.: A practical public key cryptosystem provably secure against adaptive chosen ciphertext attack. In: Advances in Cryptology\u2014Crypto 1998, pp. 13\u201325 (1998)","DOI":"10.1007\/BFb0055717"},{"issue":"6","key":"11_CR8","doi-asserted-by":"publisher","first-page":"644","DOI":"10.1109\/TIT.1976.1055638","volume":"IT-22","author":"W. Diffie","year":"1976","unstructured":"Diffie, W., Hellman, M.: New Directions in Cryptography. IEEE Trans. on Info. Theory\u00a0IT-22(6), 644\u2013654 (1976)","journal-title":"IEEE Trans. on Info. Theory"},{"issue":"4","key":"11_CR9","doi-asserted-by":"publisher","first-page":"469","DOI":"10.1109\/TIT.1985.1057074","volume":"31","author":"T. Gamal El","year":"1985","unstructured":"El Gamal, T.: A Public Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms. IEEE Trans. Info. Theory\u00a031(4), 469\u2013472 (1985)","journal-title":"IEEE Trans. Info. Theory"},{"key":"11_CR10","unstructured":"Goldwasser, S., Bellare, M.: Lecture Notes on Cryptography. Manuscript (July 10, 1996)"},{"key":"11_CR11","unstructured":"Goldreich, O.: Foundations of Cryptography Class Notes (1989), available at http:\/\/www.wisdom.weizmann.ac.il\/people\/homepages\/oded\/ln89.html"},{"issue":"1","key":"11_CR12","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1007\/BF02620230","volume":"6","author":"O. Goldreich","year":"1993","unstructured":"Goldreich, O.: A uniform-complexity treatment of encryption and zero-knowledge. Journal of Cryptology\u00a06(1), 21\u201353 (1993)","journal-title":"Journal of Cryptology"},{"issue":"2","key":"11_CR13","doi-asserted-by":"publisher","first-page":"270","DOI":"10.1016\/0022-0000(84)90070-9","volume":"28","author":"S. Goldwasser","year":"1984","unstructured":"Goldwasser, S., Micali, S.: Probabilistic Encryption. Journal of Computer and System Sciences\u2014JCSS\u00a028(2), 270\u2013299 (1984)","journal-title":"Journal of Computer and System Sciences\u2014JCSS"},{"key":"11_CR14","doi-asserted-by":"crossref","unstructured":"Kilian, J.: Founding cryptography on oblivious transfer. In: ACM Symposium on Theory of Computing\u2014STOC, pp. 20\u201331 (1988)","DOI":"10.1145\/62212.62215"},{"key":"11_CR15","volume-title":"Uses of randomness in algorithms and protocols","author":"J. Kilian","year":"1990","unstructured":"Kilian, J.: Uses of randomness in algorithms and protocols. MIT Press, Cambridge (1990)"},{"issue":"2","key":"11_CR16","doi-asserted-by":"publisher","first-page":"412","DOI":"10.1137\/0217025","volume":"17","author":"S. Micali","year":"1988","unstructured":"Micali, S., Rackoff, C., Sloan, B.: The notion of security for probabilistic cryptosystems. SIAM J. on Comput.\u00a017(2), 412\u2013426 (1988)","journal-title":"SIAM J. on Comput."},{"key":"11_CR17","unstructured":"Rabin, M.: How to exchange secrets by oblivious transfer. Harvard Aiken Comp. Lab, TR-81 (1981)"},{"key":"11_CR18","doi-asserted-by":"crossref","unstructured":"Tsiounis, Y., Yung, M.: On the security of ElGamal-based encryption. In: Proc. Public Key Cryptography\u2014PKC 1998, pp. 117\u2013134 (1998)","DOI":"10.1007\/BFb0054019"},{"key":"11_CR19","doi-asserted-by":"crossref","unstructured":"Young, A., Yung, M.: Deniable Password Snatching: On the Possibility of Evasive Electronic Espionage. IEEE Symp. on Sec. and Priv. 224\u2013235 (1997)","DOI":"10.1109\/SECPRI.1997.601339"},{"key":"11_CR20","volume-title":"Malicious Cryptography: Exposing Cryptovirology","author":"A. Young","year":"2004","unstructured":"Young, A., Yung, M.: Malicious Cryptography: Exposing Cryptovirology. John Wiley & Sons, Inc, England (2004)"},{"key":"11_CR21","doi-asserted-by":"crossref","unstructured":"Young, A., Yung, M.: Questionable Encryption and Its Applications. In: Proc. Int. Conf. on Cryptology in Malaysia\u2014MyCrypt 2005, pp. 210\u2013221 (2005)","DOI":"10.1007\/11554868_15"}],"container-title":["Lecture Notes in Computer Science","Information Hiding"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-74124-4_11","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,4,26]],"date-time":"2020-04-26T09:29:45Z","timestamp":1587893385000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-74124-4_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007]]},"ISBN":["9783540741237","9783540741244"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-74124-4_11","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2007]]}}}