{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,12]],"date-time":"2025-04-12T05:11:08Z","timestamp":1744434668937,"version":"3.37.3"},"reference-count":28,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2022,3,15]],"date-time":"2022-03-15T00:00:00Z","timestamp":1647302400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2022,3,15]],"date-time":"2022-03-15T00:00:00Z","timestamp":1647302400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/100004457","name":"The World Academy of Sciences","doi-asserted-by":"publisher","award":["21-021 RG\/MATHS\/AS_I-FR3240319461"],"award-info":[{"award-number":["21-021 RG\/MATHS\/AS_I-FR3240319461"]}],"id":[{"id":"10.13039\/100004457","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Des. Codes Cryptogr."],"published-print":{"date-parts":[[2022,4]]},"DOI":"10.1007\/s10623-022-01028-0","type":"journal-article","created":{"date-parts":[[2022,3,15]],"date-time":"2022-03-15T12:03:53Z","timestamp":1647345833000},"page":"1059-1079","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Standard model leakage-resilient authenticated key exchange using inner-product extractors"],"prefix":"10.1007","volume":"90","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-9431-5836","authenticated-orcid":false,"given":"Janaka","family":"Alawatugoda","sequence":"first","affiliation":[]},{"given":"Tatsuaki","family":"Okamoto","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,3,15]]},"reference":[{"issue":"5","key":"1028_CR1","doi-asserted-by":"publisher","first-page":"541","DOI":"10.1007\/s10207-016-0346-9","volume":"16","author":"J Alawatugoda","year":"2017","unstructured":"Alawatugoda J.: Generic construction of an eck-secure key exchange protocol in the standard model. Int. J. Inf. Secur. 16(5), 541\u2013557 (2017).","journal-title":"Int. J. Inf. Secur."},{"issue":"4","key":"1028_CR2","doi-asserted-by":"publisher","first-page":"215","DOI":"10.1515\/jmc-2016-0003","volume":"11","author":"J Alawatugoda","year":"2017","unstructured":"Alawatugoda J.: On the leakage-resilient key exchange. J. Math. Cryptol. 11(4), 215\u2013269 (2017).","journal-title":"J. Math. Cryptol."},{"issue":"12","key":"1028_CR3","doi-asserted-by":"publisher","first-page":"1904","DOI":"10.1093\/comjnl\/bxaa055","volume":"63","author":"J Alawatugoda","year":"2020","unstructured":"Alawatugoda J.: Public-key encryption in the standard model against strong leakage adversary. Comput. J. 63(12), 1904\u20131914 (2020).","journal-title":"Comput. J."},{"key":"1028_CR4","doi-asserted-by":"crossref","unstructured":"Alawatugoda J., Boyd C., Stebila D.: Continuous after-the-fact leakage-resilient key exchange. In: Information Security and Privacy\u201419th Australasian Conference, ACISP 2014, Wollongong, NSW, Australia, July 7\u20139, 2014. Proceedings, pp. 258\u2013273 (2014).","DOI":"10.1007\/978-3-319-08344-5_17"},{"key":"1028_CR5","doi-asserted-by":"crossref","unstructured":"Alawatugoda J., Jayasinghe D., Ragel R.: Countermeasures against Bernstein\u2019s remote cache timing attack. In: 6th IEEE International Conference on Industrial and Information Systems (ICIIS), pp. 43 \u201348 (2011).","DOI":"10.1109\/ICIINFS.2011.6038038"},{"key":"1028_CR6","doi-asserted-by":"crossref","unstructured":"Alawatugoda J., Stebila D., Boyd C.: Modelling after-the-fact leakage for key exchange. In: 9th ACM Symposium on Information, Computer and Communications Security, ASIA CCS \u201914, Kyoto, Japan\u2014June 03\u201306, 2014, pp. 207\u2013216 (2014).","DOI":"10.1145\/2590296.2590317"},{"key":"1028_CR7","doi-asserted-by":"crossref","unstructured":"Alawatugoda J., Stebila D., Boyd C.: Continuous after-the-fact leakage-resilient eck-secure key exchange. In: Cryptography and Coding\u201415th IMA International Conference, IMACC 2015, Oxford, UK, December 15-17, 2015. Proceedings, pp. 277\u2013294 (2015).","DOI":"10.1007\/978-3-319-27239-9_17"},{"key":"1028_CR8","doi-asserted-by":"crossref","unstructured":"Bellare M., Rogaway P.: Entity authentication and key distribution. In: CRYPTO, pp. 232\u2013249 (1993).","DOI":"10.1007\/3-540-48329-2_21"},{"key":"1028_CR9","doi-asserted-by":"crossref","unstructured":"Bellare M., Rogaway P.: Provably secure session key distribution\u2014the three party case. In: 27th ACM STOC, pp. 57\u201366. ACM Press (1995).","DOI":"10.1145\/225058.225084"},{"issue":"5","key":"1028_CR10","doi-asserted-by":"publisher","first-page":"1301","DOI":"10.1137\/S009753970544713X","volume":"36","author":"D Boneh","year":"2007","unstructured":"Boneh D., Canetti R., Halevi S., Katz J.: Chosen-ciphertext security from identity-based encryption. SIAM J. Comput. 36(5), 1301\u20131328 (2007).","journal-title":"SIAM J. Comput."},{"key":"1028_CR11","first-page":"181","volume":"1","author":"C Boyd","year":"2009","unstructured":"Boyd C., Cliff Y., Nieto J.M.G., Paterson K.G.: One-round key exchange in the standard model. Int. J. Adv. Comput. Technol. 1, 181\u2013199 (2009).","journal-title":"Int. J. Adv. Comput. Technol."},{"key":"1028_CR12","unstructured":"Brumley D., Boneh D.: Remote timing attacks are practical. Presented at the (2003)."},{"key":"1028_CR13","doi-asserted-by":"crossref","unstructured":"Canetti R., Krawczyk H.: Analysis of key-exchange protocols and their use for building secure channels. In: EUROCRYPT, pp. 453\u2013474 (2001).","DOI":"10.1007\/3-540-44987-6_28"},{"key":"1028_CR14","doi-asserted-by":"crossref","unstructured":"Chakraborty S., Alawatugoda J., Rangan C.P.: Leakage-resilient non-interactive key exchange in the continuous-memory leakage setting. In: Okamoto, T., Yu Y., Au M.H., Li Y. (eds.) Provable Security\u201411th International Conference, ProvSec 2017, Xi\u2019an, China, October 23-25, 2017, Proceedings, vol. 10592 of Lecture Notes in Computer Science, pp. 167\u2013187. Springer (2017).","DOI":"10.1007\/978-3-319-68637-0_10"},{"key":"1028_CR15","doi-asserted-by":"crossref","unstructured":"Chen R., Mu Y., Yang G., Susilo W., Guo F.: Strongly leakage-resilient authenticated key exchange. In: Sako K. (ed.) Topics in Cryptology\u2014CT-RSA 2016\u2014The Cryptographers\u2019 Track at the RSA Conference 2016, San Francisco, CA, USA, February 29\u2013March 4, 2016, Proceedings, vol. 9610 of Lecture Notes in Computer Science, pp. 19\u201336. Springer (2016).","DOI":"10.1007\/978-3-319-29485-8_2"},{"issue":"1","key":"1028_CR16","doi-asserted-by":"publisher","first-page":"145","DOI":"10.1007\/s10623-016-0295-3","volume":"85","author":"R Chen","year":"2017","unstructured":"Chen R., Mu Y., Yang G., Susilo W., Guo F.: Strong authenticated key exchange with auxiliary inputs. Des. Codes Cryptogr. 85(1), 145\u2013173 (2017).","journal-title":"Des. Codes Cryptogr."},{"key":"1028_CR17","doi-asserted-by":"crossref","unstructured":"Diffie W., Hellman M.: New directions in cryptography. IEEE Trans. Inf. Theory 644\u2013654 (1976).","DOI":"10.1109\/TIT.1976.1055638"},{"key":"1028_CR18","doi-asserted-by":"crossref","unstructured":"Dziembowski S., Faust S.: Leakage-resilient cryptography from the inner-product extractor. In: ASIACRYPT, pp. 702\u2013721 (2011).","DOI":"10.1007\/978-3-642-25385-0_38"},{"key":"1028_CR19","unstructured":"Herath I., Ragel R.: Side channel attacks: measures and countermeasures. Presented at the (2007)."},{"key":"1028_CR20","doi-asserted-by":"crossref","unstructured":"Herath U., Alawatugoda J., Ragel R.: Software implementation level countermeasures against the cache timing attack on advanced encryption standard. Presented at the (2013).","DOI":"10.1109\/ICIInfS.2013.6731958"},{"key":"1028_CR21","doi-asserted-by":"crossref","unstructured":"Hutter M., Mangard S., Feldhofer M.: Power and EM attacks on passive 13.56MHz RFID devices. In: CHES, pp. 320\u2013333 (2007).","DOI":"10.1007\/978-3-540-74735-2_22"},{"key":"1028_CR22","doi-asserted-by":"publisher","DOI":"10.1201\/9781420010756","volume-title":"Introduction to Modern Cryptography","author":"J Katz","year":"2007","unstructured":"Katz J., Lindell Y.: Introduction to Modern Cryptography. Chapman and Hall\/CRC Press, London (2007)."},{"key":"1028_CR23","doi-asserted-by":"crossref","unstructured":"Kocher P.C.: Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems. In: CRYPTO, pp. 104\u2013113 (1996).","DOI":"10.1007\/3-540-68697-5_9"},{"key":"1028_CR24","doi-asserted-by":"crossref","unstructured":"LaMacchia B., Lauter K., Mityagin A.: Stronger security of authenticated key exchange. In: ProvSec, pp. 1\u201316 (2007).","DOI":"10.1007\/978-3-540-75670-5_1"},{"key":"1028_CR25","doi-asserted-by":"publisher","first-page":"541","DOI":"10.1109\/TC.2002.1004593","volume":"51","author":"T Messerges","year":"2002","unstructured":"Messerges T., Dabbish E., Sloan R.: Examining smart-card security under the threat of power analysis attacks. IEEE Trans. Comput. 51, 541\u2013552 (2002).","journal-title":"IEEE Trans. Comput."},{"key":"1028_CR26","doi-asserted-by":"crossref","unstructured":"Moriyama D., Okamoto T.: Leakage resilient eCK-secure key exchange protocol without random oracles. In: ASIACCS, pp. 441\u2013447 (2011).","DOI":"10.1145\/1966913.1966976"},{"issue":"12","key":"1028_CR27","doi-asserted-by":"publisher","first-page":"2885","DOI":"10.1007\/s10623-019-00656-3","volume":"87","author":"G Yang","year":"2019","unstructured":"Yang G., Chen R., Mu Y., Susilo W., Guo F., Li J.: Strongly leakage resilient authenticated key exchange, revisited. Des. Codes Cryptogr. 87(12), 2885\u20132911 (2019).","journal-title":"Des. Codes Cryptogr."},{"key":"1028_CR28","doi-asserted-by":"crossref","unstructured":"Yang G., Mu Y., Susilo W., Wong D.S.: Leakage resilient authenticated key exchange secure in the auxiliary input model. In: ISPEC, pp. 204\u2013217 (2013).","DOI":"10.1007\/978-3-642-38033-4_15"}],"container-title":["Designs, Codes and Cryptography"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-022-01028-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10623-022-01028-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-022-01028-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,17]],"date-time":"2023-02-17T11:22:34Z","timestamp":1676632954000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10623-022-01028-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,3,15]]},"references-count":28,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2022,4]]}},"alternative-id":["1028"],"URL":"https:\/\/doi.org\/10.1007\/s10623-022-01028-0","relation":{},"ISSN":["0925-1022","1573-7586"],"issn-type":[{"type":"print","value":"0925-1022"},{"type":"electronic","value":"1573-7586"}],"subject":[],"published":{"date-parts":[[2022,3,15]]},"assertion":[{"value":"9 May 2021","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"25 February 2022","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"26 February 2022","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"15 March 2022","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"17 February 2023","order":5,"name":"change_date","label":"Change Date","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"Update","order":6,"name":"change_type","label":"Change Type","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"Incorrect ORCID number of the author Dr. Janaka Alawatugoda has been corrected.","order":7,"name":"change_details","label":"Change Details","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no conflict of interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"No animals or humans are used.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval"}},{"value":"Not applicable.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent to participate"}},{"value":"Not applicable.","order":5,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent for publication"}}]}}