{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,17]],"date-time":"2025-11-17T02:59:23Z","timestamp":1763348363403,"version":"3.37.3"},"reference-count":44,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"6","license":[{"start":{"date-parts":[[2022,11,1]],"date-time":"2022-11-01T00:00:00Z","timestamp":1667260800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2022,11,1]],"date-time":"2022-11-01T00:00:00Z","timestamp":1667260800000},"content-version":"am","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2022,11,1]],"date-time":"2022-11-01T00:00:00Z","timestamp":1667260800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,11,1]],"date-time":"2022-11-01T00:00:00Z","timestamp":1667260800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100003968","name":"Iran National Science Foundation","doi-asserted-by":"publisher","award":["96\/53979"],"award-info":[{"award-number":["96\/53979"]}],"id":[{"id":"10.13039\/501100003968","id-type":"DOI","asserted-by":"publisher"}]},{"name":"INSF Post-doctoral","award":["96010051"],"award-info":[{"award-number":["96010051"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Serv. Comput."],"published-print":{"date-parts":[[2022,11,1]]},"DOI":"10.1109\/tsc.2021.3100323","type":"journal-article","created":{"date-parts":[[2021,7,27]],"date-time":"2021-07-27T20:02:41Z","timestamp":1627416161000},"page":"3541-3553","source":"Crossref","is-referenced-by-count":3,"title":["Smooth Projective Hash Function From Codes and its Applications"],"prefix":"10.1109","volume":"15","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-4879-8640","authenticated-orcid":false,"given":"Masoumeh Koochak","family":"Shooshtari","sequence":"first","affiliation":[{"name":"Department of Electrical Engineering, Information Systems and Security Laboratory (ISSL), Sharif University of Technology, Tehran, Iran"}]},{"given":"Mohammad Reza","family":"Aref","sequence":"additional","affiliation":[{"name":"Department of Electrical Engineering, Information Systems and Security Laboratory (ISSL), Sharif University of Technology, Tehran, Iran"}]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-12929-2_6"},{"key":"ref38","first-page":"520","article-title":"Decoding random binary linear codes in $ 2^{n\/20}$2n\/20: How 1 + 1 = 0 improves information set decoding","author":"becker","year":"2012","journal-title":"Proc Adv Cryptol - EUROCRYPT 31st Annu Int Conf Theory Appl Cryptogr Techn"},{"key":"ref33","first-page":"419","article-title":"Chosen-ciphertext security via correlated products","author":"rosen","year":"2019","journal-title":"Proc Theory Cryptogr 6th Theory Cryptogr Conf"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-010-9061-2"},{"key":"ref31","first-page":"65","article-title":"Towards a concrete security proof of courtois, finiasz and sendrier signature scheme","author":"dallot","year":"2007","journal-title":"Proc Res Cryptol Second Western Eur Workshop Revised Selected Papers"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45682-1_10"},{"key":"ref37","first-page":"107","article-title":"Decoding random linear codes in $ \\tilde{O}(2^{0.054n})$O&#x02DC;(20.054n)","author":"may","year":"2011","journal-title":"in"},{"key":"ref36","first-page":"106","article-title":"A method for finding codewords of small weight","author":"stern","year":"1988","journal-title":"Proc Coding Theory Appl 3rd Int Colloquium"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45961-8_25"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-00862-7_16"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-10366-7_37"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-59879-6_5"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/1151414.1151418"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/11426639_24"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-03356-8_39"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/1866307.1866365"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-012-9133-6"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-46803-6_3"},{"journal-title":"Code-Based Cryptography","year":"2009","author":"bernstein","key":"ref17"},{"journal-title":"Post quantum cryptography standardization Announcement and outline of NIST's Call for Submissions","year":"2017","key":"ref18"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-70700-6_2"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-34961-4_30"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-40041-4_25"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-46447-2_15"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/1613676.1613679"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-010-9092-8"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-68339-9_22"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/11426639_5"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-13190-5_6"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-03356-8_2"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/1151414.1151418"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-44987-6_29"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-46035-7_4"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-76581-5_22"},{"key":"ref22","first-page":"923","article-title":"Efficient implementation of password-based authenticated key exchange from RLWE and post-quantum TLS","volume":"20","author":"gao","year":"2018","journal-title":"Int J Netw Secur"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-52153-4_11"},{"key":"ref42","article-title":"Classic McEliece: Conservative code-based cryptography","author":"bernstein","year":"2020","journal-title":"NIST Post-Quantum Cryptogr Project 3rd Round Candidate Algorithms"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-40588-4_4"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.3390\/a12100209"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-03356-8_26"},{"key":"ref44","article-title":"Hash proof systems over lattices revisited","volume":"2017","author":"benhamouda","year":"2017","journal-title":"IACR Cryptology ePrint"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2012.2203582"},{"article-title":"Diverse modules and Zero-knowledge","year":"2016","author":"hamouda","key":"ref43"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1007\/s10623-008-9175-9"}],"container-title":["IEEE Transactions on Services Computing"],"original-title":[],"link":[{"URL":"https:\/\/ieeexplore.ieee.org\/ielam\/4629386\/9985445\/9497657-aam.pdf","content-type":"application\/pdf","content-version":"am","intended-application":"syndication"},{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/4629386\/9985445\/09497657.pdf?arnumber=9497657","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,9]],"date-time":"2023-01-09T21:15:12Z","timestamp":1673298912000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9497657\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,11,1]]},"references-count":44,"journal-issue":{"issue":"6"},"URL":"https:\/\/doi.org\/10.1109\/tsc.2021.3100323","relation":{},"ISSN":["1939-1374","2372-0204"],"issn-type":[{"type":"electronic","value":"1939-1374"},{"type":"electronic","value":"2372-0204"}],"subject":[],"published":{"date-parts":[[2022,11,1]]}}}