{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T20:18:04Z","timestamp":1740169084098,"version":"3.37.3"},"reference-count":42,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/OAPA.html"}],"funder":[{"DOI":"10.13039\/501100004663","name":"Ministry of Science and Technology, Taiwan","doi-asserted-by":"publisher","award":["MOST106-2221-E-018-007-MY2"],"award-info":[{"award-number":["MOST106-2221-E-018-007-MY2"]}],"id":[{"id":"10.13039\/501100004663","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2019]]},"DOI":"10.1109\/access.2019.2896773","type":"journal-article","created":{"date-parts":[[2019,1,31]],"date-time":"2019-01-31T20:33:37Z","timestamp":1548966817000},"page":"19041-19053","source":"Crossref","is-referenced-by-count":4,"title":["Leakage-Resilient Certificate-Based Signature Resistant to Side-Channel Attacks"],"prefix":"10.1109","volume":"7","author":[{"given":"Jui-Di","family":"Wu","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0860-7766","authenticated-orcid":false,"given":"Yuh-Min","family":"Tseng","sequence":"additional","affiliation":[]},{"given":"Sen-Shan","family":"Huang","sequence":"additional","affiliation":[]},{"given":"Tung-Tso","family":"Tsai","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1049\/iet-ifs.2016.0261"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1049\/iet-ifs.2015.0188"},{"key":"ref33","first-page":"1659","article-title":"Certificate-based signatures revisited","volume":"15","author":"wu","year":"2009","journal-title":"J Universal Comput Sci"},{"key":"ref32","first-page":"47","article-title":"On the security of a certificate-based signature scheme and its improvement with pairings","volume":"5451","author":"zhang","year":"2009","journal-title":"Proc ISPEC"},{"key":"ref31","first-page":"285","article-title":"Certificate-based signature schemes without pairings or random oracles","volume":"5222","author":"liu","year":"2008","journal-title":"Proc ISCAS"},{"key":"ref30","first-page":"110","article-title":"Certificate-based signature: security model and efficient construction","volume":"4582","author":"li","year":"2007","journal-title":"Proc EuroPKI"},{"key":"ref37","first-page":"243","article-title":"A short certificate-based signature scheme with provable security","volume":"45","author":"hung","year":"2015","journal-title":"Inf Technol Control"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2011.08.014"},{"key":"ref35","doi-asserted-by":"crossref","first-page":"2821","DOI":"10.1016\/j.proeng.2012.01.397","article-title":"Cryptanalysis of a certificate-based on signature scheme","volume":"29","author":"cheng","year":"2012","journal-title":"Procedia Eng"},{"key":"ref34","first-page":"167","article-title":"Short and efficient certificate-based signature","volume":"6827","author":"liu","year":"2011","journal-title":"Proc Netw Workshops"},{"key":"ref10","first-page":"37","article-title":"On the importance of checking cryptographic protocols for faults","volume":"1233","author":"boneh","year":"1997","journal-title":"Adv Cryptology"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1137\/060651380"},{"key":"ref11","first-page":"388","article-title":"Differential power analysis","volume":"1666","author":"kocher","year":"1999","journal-title":"Adv Cryptology"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2005.01.010"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/s10586-013-0253-z"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/s13389-016-0121-x"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-35999-6_4"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-06320-1_31"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/FOCS.2010.55"},{"key":"ref18","first-page":"117","article-title":"Identity-based encryption resilient to continual auxiliary leakage","volume":"7237","author":"yuen","year":"2012","journal-title":"Adv Cryptology"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1002\/sec.1580"},{"key":"ref28","first-page":"440","article-title":"Hierarchical identity based encryption with constant size ciphertext","volume":"3494","author":"boneh","year":"2005","journal-title":"Adv Cryptology"},{"key":"ref4","first-page":"213","article-title":"Identity-based encryption from the Weil pairing","volume":"2139","author":"boneh","year":"2001","journal-title":"Adv Cryptology"},{"key":"ref27","first-page":"36","article-title":"Leakage-resilient public-key cryptography in the bounded-retrieval model","volume":"5677","author":"alwen","year":"2009","journal-title":"Adv Cryptology"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-39568-7_5"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2013.2289271"},{"key":"ref29","first-page":"99","article-title":"A Certificate-based signature scheme","volume":"2964","author":"kang","year":"2004","journal-title":"Proc CT-RSA"},{"key":"ref5","first-page":"452","article-title":"Certificateless public key cryptography","volume":"2894","author":"al-riyami","year":"2003","journal-title":"Adv Cryptology"},{"key":"ref8","first-page":"272","article-title":"Certificate-based encryption and the certificate revocation problem","volume":"2656","author":"gentry","year":"2003","journal-title":"Adv Cryptology"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.15388\/Informatica.2016.99"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1985.1057074"},{"key":"ref9","first-page":"104","article-title":"Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems","volume":"1109","author":"kocher","year":"1996","journal-title":"Adv Cryptology"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/359340.359342"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2809426"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.15388\/Informatica.2018.161"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/2484389.2484394"},{"key":"ref42","first-page":"296","article-title":"On the efficient implementation of pairing-based protocols","volume":"7089","author":"scott","year":"2011","journal-title":"Proc Int Conf Coding Cryptog"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2015.05.066"},{"key":"ref41","first-page":"134","article-title":"Implementing cryptographic pairings on smartcards","volume":"4249","author":"scott","year":"2006","journal-title":"Proc CHES"},{"key":"ref23","first-page":"286","article-title":"Leakage-resilient certificateless signature under continual leakage model","volume":"47","author":"wu","year":"2018","journal-title":"Inf Technol Control"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1016\/j.tcs.2017.10.020"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2016.03.032"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/8600701\/08630914.pdf?arnumber=8630914","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,27]],"date-time":"2022-01-27T05:41:02Z","timestamp":1643262062000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8630914\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"references-count":42,"URL":"https:\/\/doi.org\/10.1109\/access.2019.2896773","relation":{},"ISSN":["2169-3536"],"issn-type":[{"type":"electronic","value":"2169-3536"}],"subject":[],"published":{"date-parts":[[2019]]}}}