{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T05:06:00Z","timestamp":1743051960633,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":24,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783662549698"},{"type":"electronic","value":"9783662549704"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-662-54970-4_18","type":"book-chapter","created":{"date-parts":[[2017,5,16]],"date-time":"2017-05-16T02:02:55Z","timestamp":1494900175000},"page":"299-320","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Explicit Optimal Binary Pebbling for One-Way Hash Chain Reversal"],"prefix":"10.1007","author":[{"given":"Berry","family":"Schoenmakers","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,5,17]]},"reference":[{"issue":"1","key":"18_CR1","doi-asserted-by":"publisher","first-page":"84","DOI":"10.1504\/IJACT.2013.053435","volume":"3","author":"J Buchmann","year":"2013","unstructured":"Buchmann, J., Dahmen, E., Ereth, S., H\u00fclsing, A., R\u00fcckert, M.: On the security of the Winternitz one-time signature scheme. Int. J. Appl. Crypt. 3(1), 84\u201396 (2013)","journal-title":"Int. J. Appl. Crypt."},{"key":"18_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"507","DOI":"10.1007\/978-3-642-23951-9_33","volume-title":"Cryptographic Hardware and Embedded Systems \u2013 CHES 2011","author":"JW Bos","year":"2011","unstructured":"Bos, J.W., \u00d6zen, O., Stam, M.: Efficient hashing using the AES instruction set. In: Preneel, B., Takagi, T. (eds.) CHES 2011. LNCS, vol. 6917, pp. 507\u2013522. Springer, Heidelberg (2011). doi:10.1007\/978-3-642-23951-9_33"},{"key":"18_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"102","DOI":"10.1007\/3-540-36504-4_8","volume-title":"Financial Cryptography","author":"D Coppersmith","year":"2003","unstructured":"Coppersmith, D., Jakobsson, M.: Almost optimal hash sequence traversal. In: Blaze, M. (ed.) FC 2002. LNCS, vol. 2357, pp. 102\u2013119. Springer, Heidelberg (2003). doi:10.1007\/3-540-36504-4_8"},{"key":"18_CR4","unstructured":"Goyal, V.: How to re-initialize a hash chain. eprint.iacr.org\/2004\/097"},{"key":"18_CR5","series-title":"Applications, and Tools","first-page":"95","volume-title":"Computational Differentiation Techniques","author":"J Grimm","year":"1996","unstructured":"Grimm, J., Potter, L., Rostaing-Schmidt, N.: Optimal time and minimum space-time product for reversing a certain class of programs. In: Berz, M., Bischof, C.H., Corliss, G., Griewank, A. (eds.) Computational Differentiation Techniques. Applications, and Tools, pp. 95\u2013106. SIAM, Philadelphia (1996)"},{"issue":"1","key":"18_CR6","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1080\/10556789208805505","volume":"1","author":"A Griewank","year":"1992","unstructured":"Griewank, A.: Achieving logarithmic growth of temporal and spatial complexity in reverse automatic differentiation. Optim. Methods Softw. 1(1), 35\u201354 (1992)","journal-title":"Optim. Methods Softw."},{"key":"18_CR7","doi-asserted-by":"publisher","DOI":"10.1137\/1.9780898717761","volume-title":"Evaluating Derivatives: Principles and Techniques of Algorithmic Differentiation","author":"A Griewank","year":"2008","unstructured":"Griewank, A., Walther, A.: Evaluating Derivatives: Principles and Techniques of Algorithmic Differentiation, 2nd edn. SIAM, Reading (2008)","edition":"2"},{"key":"18_CR8","unstructured":"Haller, N.: The S\/KEY one-time password system. In: Proceedings of the Symposium on Network and Distributed System Security (NDSS), pp. 151\u2013157. Internet Society, February 1994. en.wikipedia.org\/wiki\/S\/KEY"},{"key":"18_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"332","DOI":"10.1007\/3-540-44647-8_20","volume-title":"Advances in Cryptology \u2014 CRYPTO 2001","author":"G Itkis","year":"2001","unstructured":"Itkis, G., Reyzin, L.: Forward-secure signatures with optimal signing and verifying. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 332\u2013354. Springer, Heidelberg (2001). doi:10.1007\/3-540-44647-8_20"},{"key":"18_CR10","unstructured":"Jakobsson, M.: Fractal hash sequence representation and traversal. In: Proceedings of IEEE International Symposium on Information Theory (ISIT 2002), p. 437. IEEE Press (2002). Full version eprint.iacr.org\/2002\/001"},{"key":"18_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"86","DOI":"10.1007\/978-3-540-45203-4_7","volume-title":"Applied Cryptography and Network Security","author":"S-R Kim","year":"2003","unstructured":"Kim, S.-R.: Improved scalable hash chain traversal. In: Zhou, J., Yung, M., Han, Y. (eds.) ACNS 2003. LNCS, vol. 2846, pp. 86\u201395. Springer, Heidelberg (2003). doi:10.1007\/978-3-540-45203-4_7"},{"issue":"11","key":"18_CR12","doi-asserted-by":"publisher","first-page":"770","DOI":"10.1145\/358790.358797","volume":"24","author":"L Lamport","year":"1981","unstructured":"Lamport, L.: Password authentication with insecure communication. Commun. ACM 24(11), 770\u2013772 (1981)","journal-title":"Commun. ACM"},{"key":"18_CR13","doi-asserted-by":"crossref","unstructured":"Levin, L.: One-way function and pseudorandom generators. In: Proceedings of the 17th Symposium on Theory of Computing (STOC 1985), pp. 363\u2013365 (1985)","DOI":"10.1145\/22145.22185"},{"key":"18_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"369","DOI":"10.1007\/3-540-48184-2_32","volume-title":"Advances in Cryptology \u2014 CRYPTO 1987","author":"RC Merkle","year":"1988","unstructured":"Merkle, R.C.: A digital signature based on a conventional encryption function. In: Pomerance, C. (ed.) CRYPTO 1987. LNCS, vol. 293, pp. 369\u2013378. Springer, Heidelberg (1988). doi:10.1007\/3-540-48184-2_32"},{"key":"18_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"218","DOI":"10.1007\/0-387-34805-0_21","volume-title":"Advances in Cryptology \u2014 CRYPTO 1989 Proceedings","author":"RC Merkle","year":"1990","unstructured":"Merkle, R.C.: A certified digital signature. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol. 435, pp. 218\u2013238. Springer, New York (1990). doi:10.1007\/0-387-34805-0_21"},{"key":"18_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"68","DOI":"10.1007\/978-3-642-40392-7_6","volume-title":"Lightweight Cryptography for Security and Privacy","author":"N Mourier","year":"2013","unstructured":"Mourier, N., Stampp, R., Strenzke, F.: An implementation of the hash-chain signature scheme for wireless sensor networks. In: Avoine, G., Kara, O. (eds.) LightSec 2013. LNCS, vol. 8162, pp. 68\u201380. Springer, Heidelberg (2013). doi:10.1007\/978-3-642-40392-7_6"},{"key":"18_CR17","unstructured":"Nakamoto, S.: Bitcoin: a peer-to-peer electronic cash system, 31 October 2008. bitcoin.org\/bitcoin.pdf"},{"issue":"2","key":"18_CR18","first-page":"2","volume":"5","author":"A Perrig","year":"2002","unstructured":"Perrig, A., Canetti, R., Tygar, J.D., Song, D.: The TESLA broadcast authentication protocol. RSA CryptoBytes 5(2), 2\u201313 (2002)","journal-title":"RSA CryptoBytes"},{"key":"18_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"59","DOI":"10.1007\/3-540-62494-5_5","volume-title":"Security Protocols","author":"TP Pedersen","year":"1997","unstructured":"Pedersen, T.P.: Electronic payments of small amounts. In: Lomas, M. (ed.) Security Protocols 1996. LNCS, vol. 1189, pp. 59\u201368. Springer, Heidelberg (1997). doi:10.1007\/3-540-62494-5_5"},{"key":"18_CR20","doi-asserted-by":"crossref","DOI":"10.1201\/b15719","volume-title":"Introduction to Reversible Computing","author":"K Perumalla","year":"2013","unstructured":"Perumalla, K.: Introduction to Reversible Computing. Chapman and Hall\/CRC, Boca Raton (2013)"},{"key":"18_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"270","DOI":"10.1007\/978-3-540-45126-6_20","volume-title":"Financial Cryptography","author":"Y Sella","year":"2003","unstructured":"Sella, Y.: On the computation-storage trade-offs of hash chain traversal. In: Wright, R.N. (ed.) FC 2003. LNCS, vol. 2742, pp. 270\u2013285. Springer, Heidelberg (2003). doi:10.1007\/978-3-540-45126-6_20"},{"key":"18_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"541","DOI":"10.1007\/978-3-540-24676-3_32","volume-title":"Advances in Cryptology - EUROCRYPT 2004","author":"M Szydlo","year":"2004","unstructured":"Szydlo, M.: Merkle tree traversal in log space and time. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 541\u2013554. Springer, Heidelberg (2004). doi:10.1007\/978-3-540-24676-3_32"},{"key":"18_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"325","DOI":"10.1007\/978-3-642-00862-7_22","volume-title":"Topics in Cryptology \u2013 CT-RSA 2009","author":"DH Yum","year":"2009","unstructured":"Yum, D.H., Seo, J.W., Eom, S., Lee, P.J.: Single-layer fractal hash chain traversal with almost optimal complexity. In: Fischlin, M. (ed.) CT-RSA 2009. LNCS, vol. 5473, pp. 325\u2013339. Springer, Heidelberg (2009). doi:10.1007\/978-3-642-00862-7_22"},{"key":"18_CR24","unstructured":"Zhao, Y., Li, D.: An improved elegant method to re-initialize hash chains, January 2005. eprint.iacr.org\/2005\/011"}],"container-title":["Lecture Notes in Computer Science","Financial Cryptography and Data Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-662-54970-4_18","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,4,2]],"date-time":"2024-04-02T16:47:04Z","timestamp":1712076424000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-662-54970-4_18"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783662549698","9783662549704"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-662-54970-4_18","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]},"assertion":[{"value":"17 May 2017","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"FC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Financial Cryptography and Data Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Christ Church","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Barbados","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2016","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22 February 2016","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26 February 2016","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"fc2016","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/fc16.ifca.ai\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}