{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,19]],"date-time":"2025-09-19T09:18:12Z","timestamp":1758273492598,"version":"3.37.3"},"reference-count":33,"publisher":"Oxford University Press (OUP)","issue":"8","license":[{"start":{"date-parts":[[2018,6,11]],"date-time":"2018-06-11T00:00:00Z","timestamp":1528675200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/academic.oup.com\/journals\/pages\/about_us\/legal\/notices"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61472146"],"award-info":[{"award-number":["61472146"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Guangdong Natural Science Funds for Distinguished Young Scholar","award":["2014A030306021"],"award-info":[{"award-number":["2014A030306021"]}]},{"name":"Pearl River Nova Program of Guangzhou","award":["201610010037"],"award-info":[{"award-number":["201610010037"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,8,1]]},"DOI":"10.1093\/comjnl\/bxy059","type":"journal-article","created":{"date-parts":[[2018,5,22]],"date-time":"2018-05-22T15:06:24Z","timestamp":1527001584000},"page":"1216-1227","source":"Crossref","is-referenced-by-count":1,"title":["Leakage-Resilient Dual-Form Signatures"],"prefix":"10.1093","volume":"61","author":[{"given":"Jianye","family":"Huang","sequence":"first","affiliation":[{"name":"College of Mathematics and Informatics, South China Agricultural University, Guangzhou, China"}]},{"given":"Qiong","family":"Huang","sequence":"additional","affiliation":[{"name":"College of Mathematics and Informatics, South China Agricultural University, Guangzhou, China"},{"name":"Nanjing University of Information Science and Technology, Nanjing, China"}]},{"given":"Willy","family":"Susilo","sequence":"additional","affiliation":[{"name":"University of Wollongong, Wollongong, NSW, Australia"}]}],"member":"286","published-online":{"date-parts":[[2018,6,11]]},"reference":[{"key":"key\n\t\t\t\t20180724123907_bxy059C1","doi-asserted-by":"crossref","first-page":"91","DOI":"10.1145\/1506409.1506429","article-title":"Lest we remember: cold-boot attacks on encryption keys","volume":"52","author":"Halderman","year":"2009","journal-title":"Commun. ACM"},{"year":"1996","author":"Kocher","key":"key\n\t\t\t\t20180724123907_bxy059C2"},{"key":"key\n\t\t\t\t20180724123907_bxy059C3","first-page":"251","article-title":"Electromagnetic analysis: concrete results","volume":"2162","author":"Gandolfi","year":"2001","journal-title":"Ches"},{"key":"key\n\t\t\t\t20180724123907_bxy059C4","doi-asserted-by":"crossref","first-page":"200","DOI":"10.1007\/3-540-45418-7_17","article-title":"Electromagnetic analysis (EMA): measures and counter-measures for smart cards","volume":"2140","author":"Quisquater","year":"2001","journal-title":"Smart Card Programming Secur."},{"year":"1999","author":"Kocher","key":"key\n\t\t\t\t20180724123907_bxy059C5"},{"key":"key\n\t\t\t\t20180724123907_bxy059C6","doi-asserted-by":"crossref","first-page":"292","DOI":"10.1007\/3-540-48059-5_25","volume-title":"Cryptographic Hardware and Embedded Systems","author":"Coron","year":"1999"},{"year":"1997","author":"Boneh","key":"key\n\t\t\t\t20180724123907_bxy059C7"},{"year":"1997","author":"Biham","key":"key\n\t\t\t\t20180724123907_bxy059C8"},{"year":"2008","author":"Dziembowski","key":"key\n\t\t\t\t20180724123907_bxy059C9"},{"key":"key\n\t\t\t\t20180724123907_bxy059C10","doi-asserted-by":"crossref","first-page":"278","DOI":"10.1007\/978-3-540-24638-1_16","volume-title":"Theory of Cryptography: First Theory of Cryptography Conference, TCC 2004, Cambridge, MA, USA, February 19\u201321, 2004. Proceedings","author":"Micali","year":"2004"},{"year":"2009","author":"Akavia","key":"key\n\t\t\t\t20180724123907_bxy059C11"},{"year":"2009","author":"Katz","key":"key\n\t\t\t\t20180724123907_bxy059C12"},{"key":"key\n\t\t\t\t20180724123907_bxy059C13","doi-asserted-by":"crossref","first-page":"513","DOI":"10.1007\/s00145-012-9136-3","article-title":"Fully Leakage-Resilient Signatures","volume":"26","author":"Boyle","year":"2013","journal-title":"J. Cryptol."},{"year":"2009","author":"Alwen","key":"key\n\t\t\t\t20180724123907_bxy059C14"},{"year":"2010","author":"Brakerski","key":"key\n\t\t\t\t20180724123907_bxy059C15"},{"year":"2011","author":"Kalai","key":"key\n\t\t\t\t20180724123907_bxy059C16"},{"year":"2011","author":"Garg","key":"key\n\t\t\t\t20180724123907_bxy059C17"},{"year":"2012","author":"Gerbush","key":"key\n\t\t\t\t20180724123907_bxy059C18"},{"year":"2004","author":"Camenisch","key":"key\n\t\t\t\t20180724123907_bxy059C19"},{"year":"2004","author":"Dan","key":"key\n\t\t\t\t20180724123907_bxy059C20"},{"year":"2011","author":"Malkin","key":"key\n\t\t\t\t20180724123907_bxy059C21"},{"key":"key\n\t\t\t\t20180724123907_bxy059C22","doi-asserted-by":"crossref","first-page":"422","DOI":"10.1007\/s00145-015-9197-1","article-title":"Signature schemes secure against hard-to-invert leakage","volume":"29","author":"Faust","year":"2016","journal-title":"J. Cryptol."},{"year":"2012","author":"Yuen","key":"key\n\t\t\t\t20180724123907_bxy059C23"},{"year":"2014","author":"Wang","key":"key\n\t\t\t\t20180724123907_bxy059C24"},{"year":"2006","author":"Boneh","key":"key\n\t\t\t\t20180724123907_bxy059C25"},{"key":"key\n\t\t\t\t20180724123907_bxy059C26","doi-asserted-by":"crossref","first-page":"1829","DOI":"10.1002\/sec.1436","article-title":"Generic transformations for existentially unforgeable signature schemes in the bounded leakage model","volume":"9","author":"Wang","year":"2016","journal-title":"Secur. Commun. Netw."},{"year":"2016","author":"Huang","key":"key\n\t\t\t\t20180724123907_bxy059C27"},{"year":"2007","author":"Huang","key":"key\n\t\t\t\t20180724123907_bxy059C28"},{"key":"key\n\t\t\t\t20180724123907_bxy059C29","first-page":"eV23","article-title":"Exponent-inversion signatures and IBE under static assumptions","volume":"14","author":"Yuen","year":"2014","journal-title":"Eur. Urol. Suppl."},{"year":"2014","author":"Chase","key":"key\n\t\t\t\t20180724123907_bxy059C30"},{"year":"2011","author":"Lewko","key":"key\n\t\t\t\t20180724123907_bxy059C31"},{"year":"2005","author":"Boneh","key":"key\n\t\t\t\t20180724123907_bxy059C32"},{"key":"key\n\t\t\t\t20180724123907_bxy059C33","doi-asserted-by":"crossref","first-page":"313","DOI":"10.1016\/j.ins.2017.09.055","article-title":"Black-box constructions of signature schemes in the bounded leakage setting","volume":"423","author":"Huang","year":"2018","journal-title":"Inf. Sci."}],"container-title":["The Computer Journal"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/academic.oup.com\/comjnl\/article-pdf\/61\/8\/1216\/25209168\/bxy059.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,18]],"date-time":"2019-10-18T05:54:05Z","timestamp":1571378045000},"score":1,"resource":{"primary":{"URL":"https:\/\/academic.oup.com\/comjnl\/article\/61\/8\/1216\/5035762"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,6,11]]},"references-count":33,"journal-issue":{"issue":"8","published-online":{"date-parts":[[2018,6,11]]},"published-print":{"date-parts":[[2018,8,1]]}},"URL":"https:\/\/doi.org\/10.1093\/comjnl\/bxy059","relation":{},"ISSN":["0010-4620","1460-2067"],"issn-type":[{"type":"print","value":"0010-4620"},{"type":"electronic","value":"1460-2067"}],"subject":[],"published-other":{"date-parts":[[2018,8]]},"published":{"date-parts":[[2018,6,11]]}}}