{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,9]],"date-time":"2026-01-09T12:57:18Z","timestamp":1767963438980,"version":"3.49.0"},"reference-count":38,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2015,2,13]],"date-time":"2015-02-13T00:00:00Z","timestamp":1423785600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Cryptol"],"published-print":{"date-parts":[[2016,4]]},"DOI":"10.1007\/s00145-015-9197-1","type":"journal-article","created":{"date-parts":[[2015,2,12]],"date-time":"2015-02-12T20:34:28Z","timestamp":1423773268000},"page":"422-455","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":8,"title":["Signature Schemes Secure Against Hard-to-Invert Leakage"],"prefix":"10.1007","volume":"29","author":[{"given":"Sebastian","family":"Faust","sequence":"first","affiliation":[]},{"given":"Carmit","family":"Hazay","sequence":"additional","affiliation":[]},{"given":"Jesper Buus","family":"Nielsen","sequence":"additional","affiliation":[]},{"given":"Peter Sebastian","family":"Nordholt","sequence":"additional","affiliation":[]},{"given":"Angela","family":"Zottarel","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,2,13]]},"reference":[{"key":"9197_CR1","unstructured":"J. Alwen, Y. Dodis, D. Wichs, Leakage-resilient public-key cryptography in the bounded-retrieval model. in CRYPTO (2009), pp. 36\u201354"},{"key":"9197_CR2","unstructured":"A. Akavia, S. Goldwasser, V. Vaikuntanathan, Simultaneous hardcore bits and cryptography against memory attacks. in TCC (2009), pp. 474\u2013495"},{"key":"9197_CR3","unstructured":"D. Boneh, R.A. DeMillo, R.J. Lipton, On the importance of checking cryptographic protocols for faults (extended abstract). in EUROCRYPT (1997), pp. 37\u201351"},{"key":"9197_CR4","unstructured":"Z. Brakerski, S. Goldwasser, Circular and leakage resilient public-key encryption under subgroup indistinguishability\u2014(or: Quadratic residuosity strikes back). in CRYPTO (2010), pp. 1\u201320"},{"key":"9197_CR5","unstructured":"D. Boneh, S. Halevi, M. Hamburg, R. Ostrovsky, Circular-secure encryption from decision diffie-hellman. in CRYPTO (2008), pp. 108\u2013125"},{"key":"9197_CR6","unstructured":"E. Biham, A. Shamir, Differential fault analysis of secret key cryptosystems. in CRYPTO (1997), pp. 513\u2013525"},{"key":"9197_CR7","unstructured":"Z. Brakerski, G. Segev, Better security for deterministic public-key encryption: The auxiliary-input setting. in CRYPTO (2011), pp. 543\u2013560"},{"key":"9197_CR8","unstructured":"E. Boyle, G. Segev, D. Wichs, Fully leakage-resilient signatures. in EUROCRYPT (2011), pp. 89\u2013108"},{"key":"9197_CR9","unstructured":"J. Camenisch, N. Chandran, V. Shoup, A public key encryption scheme secure against key dependent chosen plaintext and adaptive chosen ciphertext attacks. in EUROCRYPT (2009), pp. 351\u2013368"},{"key":"9197_CR10","doi-asserted-by":"crossref","unstructured":"S. Dziembowski, S. Faust, Leakage-resilient circuits without computational assumptions. in TCC ed. by R. Cramer, volume 7194 of Lecture Notes in Computer Science (Springer, Berlinm 2012) pp. 230\u2013247","DOI":"10.1007\/978-3-642-28914-9_13"},{"key":"9197_CR11","unstructured":"Y. Dodis, S. Goldwasser, Y.T. Kalai, C. Peikert, V. Vaikuntanathan, Public-key encryption schemes with auxiliary inputs. in TCC (2010), pp. 361\u2013381"},{"key":"9197_CR12","unstructured":"Y. Dodis, K. Haralambiev, A. L\u00f3pez-Alt, D. Wichs, Cryptography against continuous memory attacks. in FOCS (2010), pp. 511\u2013520"},{"key":"9197_CR13","unstructured":"Y. Dodis, K. Haralambiev, A. L\u00f3pez-Alt, D. Wichs, Efficient public-key cryptography in the presence of key leakage. in ASIACRYPT (2010), pp. 613\u2013631"},{"key":"9197_CR14","unstructured":"Y. Dodis, Y.T. Kalai, S. Lovett, On cryptography with auxiliary input. in STOC (2009), pp. 621\u2013630"},{"key":"9197_CR15","unstructured":"S. Dziembowski, K. Pietrzak, Leakage-resilient cryptography. in FOCS (2008), pp. 293\u2013302"},{"key":"9197_CR16","unstructured":"S. Faust, E. Kiltz, K. Pietrzak, G.N. Rothblum, Leakage-resilient signatures. in TCC (2010), pp. 343\u2013360"},{"key":"9197_CR17","unstructured":"K. Gandolfi, C. Mourtel, F. Olivier, Electromagnetic analysis: concrete results. in CHES, number Generators (2001), pp. 251\u2013261"},{"issue":"2","key":"9197_CR18","doi-asserted-by":"publisher","first-page":"281","DOI":"10.1137\/0217017","volume":"17","author":"S Goldwasser","year":"1988","unstructured":"S. Goldwasser, S. Micali, R.L. Rivest, A digital signature scheme secure against adaptive chosen-message attacks. SIAM J. Comput.17(2), 281\u2013308 (1988)","journal-title":"SIAM J. Comput."},{"key":"9197_CR19","unstructured":"C. Gentry, C. Peikert, V. Vaikuntanathan, Trapdoors for hard lattices and new cryptographic constructions. in STOC (2008), pp. 197\u2013206"},{"key":"9197_CR20","unstructured":"J. Groth, A. Sahai, Efficient non-interactive proof systems for bilinear groups. in EUROCRYPT (2008), pp. 415\u2013432"},{"key":"9197_CR21","unstructured":"C. Hazay, A. L\u00f3pez-Alt, H. Wee, D. Wichs, Leakage-resilient cryptography from minimal assumptions. in EUROCRYPT (2013), pp. 160\u2013176"},{"issue":"5","key":"9197_CR22","doi-asserted-by":"publisher","first-page":"91","DOI":"10.1145\/1506409.1506429","volume":"52","author":"JA Halderman","year":"2009","unstructured":"J.A. Halderman, S.D. Schoen, N. Heninger, W. Clarkson, W. Paul, J.A. Calandrino, A.J. Feldman, J. Appelbaum, E.W. Felten, Lest we remember: cold-boot attacks on encryption keys. Commun. ACM, 52(5), 91\u201398 (2009)","journal-title":"Commun. ACM"},{"key":"9197_CR23","unstructured":"P.C. Kocher, J. Jaffe, B. Jun, Differential power analysis. in CRYPTO (1999), pp. 388\u2013397"},{"key":"9197_CR24","unstructured":"P.C. Kocher, Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems. in CRYPTO (1996), pp. 104\u2013113"},{"key":"9197_CR25","unstructured":"H. Krawczyk, T. Rabin, Chameleon signatures. in NDSS (2000)"},{"key":"9197_CR26","unstructured":"J. Katz, V. Vaikuntanathan, Signature schemes with bounded leakage resilience. in ASIACRYPT (2009), pp. 703\u2013720"},{"key":"9197_CR27","unstructured":"A.B. Lewko, Y. Rouselakis, B. Waters, Achieving leakage resilience through dual system encryption. in TCC (2011), pp. 70\u201388"},{"key":"9197_CR28","unstructured":"S. Micali, L. Reyzin, Physically observable cryptography (extended abstract). in TCC (2004), pp. 278\u2013296"},{"key":"9197_CR29","unstructured":"T. Malkin, I. Teranishi, Y. Vahlis, M. Yung, Signatures resilient to continual leakage on memory and computation. in TCC (2011), pp. 89\u2013106"},{"key":"9197_CR30","unstructured":"M. Naor, G. Segev, Public-key cryptosystems resilient to key leakage. in CRYPTO (2009), pp. 18\u201335"},{"key":"9197_CR31","unstructured":"K. Pietrzak, A leakage-resilient mode of operation. in EUROCRYPT (2009), pp. 462\u2013482"},{"key":"9197_CR32","unstructured":"J.-J. Quisquater, D. Samyde, Electromagnetic analysis (ema): measures and counter-measures for smart cards. in E-smart (2001), pp. 200\u2013210"},{"key":"9197_CR33","doi-asserted-by":"crossref","unstructured":"O. Regev, On lattices, learning with errors, random linear codes, and cryptography. in STOC, eds. by H.N. Gabow, R. Fagin, (ACM, 2005), pp. 84\u201393","DOI":"10.1145\/1060590.1060603"},{"key":"9197_CR34","unstructured":"C. Rackoff, D.R. Simon, Non-interactive zero-knowledge proof of knowledge and chosen ciphertext attack. in CRYPTO (1991), pp. 433\u2013444"},{"key":"9197_CR35","unstructured":"H. Shacham, A cramer-shoup encryption scheme from the linear assumption and from progressively weaker linear variants. Cryptology ePrint Archive, Report 2007\/074, 2007"},{"key":"9197_CR36","unstructured":"F.-X. Standaert, T. Malkin, M. Yung, A unified framework for the analysis of side-channel key recovery attacks. in EUROCRYPT (2009), pp. 443\u2013461"},{"key":"9197_CR37","unstructured":"F.-X. Standaert, Leakage resilient cryptography: a practical overview. invited talk at ECRYPT workshop on symmetric encryption (SKEW 2011)"},{"key":"9197_CR38","unstructured":"T.H. Yuen, S.S.M. Chow, Y. Zhang, S.-M. Yiu, Identity-based encryption resilient to continual auxiliary leakage. in EUROCRYPT (2012), pp. 117\u2013134"}],"container-title":["Journal of Cryptology"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00145-015-9197-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s00145-015-9197-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00145-015-9197-1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00145-015-9197-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,4,8]],"date-time":"2020-04-08T08:20:52Z","timestamp":1586334052000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s00145-015-9197-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,2,13]]},"references-count":38,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2016,4]]}},"alternative-id":["9197"],"URL":"https:\/\/doi.org\/10.1007\/s00145-015-9197-1","relation":{},"ISSN":["0933-2790","1432-1378"],"issn-type":[{"value":"0933-2790","type":"print"},{"value":"1432-1378","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015,2,13]]},"assertion":[{"value":"6 August 2013","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"13 February 2015","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}