{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T07:22:15Z","timestamp":1730272935406,"version":"3.28.0"},"reference-count":19,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,9]]},"DOI":"10.1109\/iscisc.2016.7736454","type":"proceedings-article","created":{"date-parts":[[2016,11,7]],"date-time":"2016-11-07T21:27:30Z","timestamp":1478554050000},"page":"72-78","source":"Crossref","is-referenced-by-count":0,"title":["FMNV continuous non-malleable encoding scheme is more efficient than believed"],"prefix":"10.1109","author":[{"given":"Amir S.","family":"Mortazavi","sequence":"first","affiliation":[]},{"given":"Mahmoud","family":"Salmasizadeh","sequence":"additional","affiliation":[]},{"given":"Amir","family":"Daneshgar","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-40084-1_14"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/2591796.2591804"},{"key":"ref12","first-page":"69","article-title":"Explicit non-malleable codes resistant to permutations","volume":"21","author":"agrawal","year":"2014","journal-title":"Electronic Colloquium on Computational Complexity (ECCC)"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-44371-2_26"},{"key":"ref14","first-page":"308","article-title":"Private circuits II: keeping secrets in tamperable circuits","author":"ishai","year":"0"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-45146-4_27"},{"key":"ref16","first-page":"427","article-title":"Locally decodable and updatable non-malleable codes and their applications","author":"dachman-soled","year":"0"},{"key":"ref17","first-page":"532","article-title":"From single-bit to multi-bit public-key encryption via non-malleable codes","author":"coretti","year":"0"},{"journal-title":"Introduction to Modern Cryptography","year":"2015","author":"katz","key":"ref18"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-44647-8_33"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-25385-0_40"},{"key":"ref3","first-page":"440","article-title":"Non-malleable coding against bitwise and split-state tampering","author":"cheraghchi","year":"0"},{"key":"ref6","first-page":"451","article-title":"Tamper detection and continuous nonmalleable codes","author":"jafargholi","year":"0"},{"key":"ref5","first-page":"517","article-title":"Tamper and leakage resilience in the split-state model","author":"liu","year":"0"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/2746539.2746544"},{"key":"ref7","first-page":"111","article-title":"Efficient nonmalleable codes and key-derivation for poly-size tampering circuits","author":"faust","year":"0"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-15317-4_9"},{"key":"ref1","first-page":"465","article-title":"Continuous non-malleable codes","author":"faust","year":"0"},{"key":"ref9","article-title":"Block-wise non-malleable codes","author":"chandran","year":"2015","journal-title":"IACR Cryptology ePrint Archive"}],"event":{"name":"2016 13th International Iranian Society of Cryptology Conference on Information Security and Cryptology (ISCISC)","start":{"date-parts":[[2016,9,7]]},"location":"Tehran","end":{"date-parts":[[2016,9,8]]}},"container-title":["2016 13th International Iranian Society of Cryptology Conference on Information Security and Cryptology (ISCISC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7604981\/7736436\/07736454.pdf?arnumber=7736454","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,1,23]],"date-time":"2017-01-23T22:42:56Z","timestamp":1485211376000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7736454\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,9]]},"references-count":19,"URL":"https:\/\/doi.org\/10.1109\/iscisc.2016.7736454","relation":{},"subject":[],"published":{"date-parts":[[2016,9]]}}}