{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T12:46:05Z","timestamp":1730292365808,"version":"3.28.0"},"reference-count":7,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,10,25]],"date-time":"2021-10-25T00:00:00Z","timestamp":1635120000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,10,25]],"date-time":"2021-10-25T00:00:00Z","timestamp":1635120000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,10,25]],"date-time":"2021-10-25T00:00:00Z","timestamp":1635120000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,10,25]]},"DOI":"10.1109\/redundancy52534.2021.9606457","type":"proceedings-article","created":{"date-parts":[[2021,11,11]],"date-time":"2021-11-11T20:32:50Z","timestamp":1636662770000},"page":"45-48","source":"Crossref","is-referenced-by-count":0,"title":["Eliminating Broadband Covert Channels in DSA-Like Signatures"],"prefix":"10.1109","author":[{"given":"Andrey","family":"Fionov","sequence":"first","affiliation":[]},{"given":"Alexandr","family":"Klevtsov","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"doi-asserted-by":"publisher","key":"ref4","DOI":"10.1109\/DASC.2006.46"},{"doi-asserted-by":"publisher","key":"ref3","DOI":"10.1109\/TIT.1985.1057074"},{"key":"ref6","first-page":"101","article-title":"Covert comminication channels in digital signature algorithm GOST R 34.10-2001","volume":"22","author":"atmashkin","year":"2011","journal-title":"Mathematical Structures and Modeling"},{"year":"1994","author":"horster","article-title":"Subliminal channels in discrete logarithm based signature schemes and how to avoid them","key":"ref5"},{"doi-asserted-by":"publisher","key":"ref7","DOI":"10.17487\/RFC8446"},{"key":"ref2","first-page":"364","article-title":"The subliminal channel and digital signatures","author":"simmons","year":"1984","journal-title":"Eurocrypt&#x2019;84"},{"key":"ref1","article-title":"Digital signature algorithm","author":"kravitz","year":"1991","journal-title":"US Patent US5231668A"}],"event":{"name":"2021 XVII International Symposium Problems of Redundancy in Information and Control Systems (REDUNDANCY)","start":{"date-parts":[[2021,10,25]]},"location":"Moscow, Russian Federation","end":{"date-parts":[[2021,10,29]]}},"container-title":["2021 XVII International Symposium \"Problems of Redundancy in Information and Control Systems\" (REDUNDANCY)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9606438\/9606439\/09606457.pdf?arnumber=9606457","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,10]],"date-time":"2022-05-10T16:51:44Z","timestamp":1652201504000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9606457\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,10,25]]},"references-count":7,"URL":"https:\/\/doi.org\/10.1109\/redundancy52534.2021.9606457","relation":{},"subject":[],"published":{"date-parts":[[2021,10,25]]}}}