{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,27]],"date-time":"2026-04-27T11:04:24Z","timestamp":1777287864334,"version":"3.51.4"},"reference-count":33,"publisher":"Society for Industrial & Applied Mathematics (SIAM)","issue":"5","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["SIAM J. Comput."],"published-print":{"date-parts":[[2015,1]]},"DOI":"10.1137\/130931461","type":"journal-article","created":{"date-parts":[[2015,10,28]],"date-time":"2015-10-28T04:12:15Z","timestamp":1446005535000},"page":"1480-1549","source":"Crossref","is-referenced-by-count":10,"title":["How to Compute in the Presence of Leakage"],"prefix":"10.1137","volume":"44","author":[{"given":"Shafi","family":"Goldwasser","sequence":"first","affiliation":[]},{"given":"Guy N.","family":"Rothblum","sequence":"additional","affiliation":[]}],"member":"351","reference":[{"key":"atypb1","first-page":"715","author":"Ajtai M.","year":"2011","journal-title":"STOC"},{"key":"atypb2","first-page":"722","author":"Bitansky N.","year":"2011","journal-title":"ASIACRYPT"},{"key":"atypb3","first-page":"1","author":"Barak B.","year":"2001","journal-title":"CRYPTO"},{"key":"atypb4","doi-asserted-by":"crossref","first-page":"1235","DOI":"10.1145\/2213977.2214087","author":"Boyle E.","year":"2012","journal-title":"STOC"},{"key":"atypb5","first-page":"108","author":"Boneh D.","year":"2008","journal-title":"CRYPTO"},{"key":"atypb6","first-page":"501","author":"Brakerski Z.","year":"2010","journal-title":"FOCS"},{"key":"atypb7","doi-asserted-by":"crossref","first-page":"639","DOI":"10.1145\/237814.238015","author":"Canetti R.","year":"1996","journal-title":"STOC"},{"key":"atypb8","doi-asserted-by":"publisher","DOI":"10.1137\/0217015"},{"key":"atypb9","first-page":"121","author":"F.","year":"2010","journal-title":"Italy"},{"key":"atypb10","first-page":"702","author":"Dziembowski S.","year":"2011","journal-title":"ASIACRYPT"},{"key":"atypb11","first-page":"230","author":"Dziembowski S.","year":"2012","journal-title":"TCC"},{"key":"atypb12","first-page":"511","author":"Dodis Y.","year":"2010","journal-title":"FOCS"},{"key":"atypb13","first-page":"688","author":"Dodis Y.","year":"2011","journal-title":"FOCS"},{"key":"atypb14","doi-asserted-by":"publisher","DOI":"10.1137\/060651380"},{"key":"atypb15","first-page":"293","author":"Dziembowski S.","year":"2008","journal-title":"FOCS"},{"key":"atypb16","first-page":"343","author":"Faust S.","year":"2010","journal-title":"TCC"},{"key":"atypb17","first-page":"135","author":"Faust S.","year":"2010","journal-title":"EUROCRYPT"},{"key":"atypb19","first-page":"308","author":"Goyal V.","year":"2010","journal-title":"TCC"},{"key":"atypb20","first-page":"39","author":"Goldwasser S.","year":"2008","journal-title":"CRYPTO"},{"key":"atypb21","doi-asserted-by":"publisher","DOI":"10.1145\/233551.233553"},{"key":"atypb22","first-page":"59","author":"Goldwasser S.","year":"2010","journal-title":"CRYPTO"},{"key":"atypb23","first-page":"107","author":"Halevi S.","year":"2011","journal-title":"TCC"},{"key":"atypb25","first-page":"463","author":"Ishai Y.","year":"2003","journal-title":"CRYPTO"},{"key":"atypb26","first-page":"41","author":"Juma A.","year":"2010","journal-title":"CRYPTO"},{"key":"atypb27","first-page":"725","author":"Lewko A.","year":"2011","journal-title":"STOC"},{"key":"atypb28","first-page":"70","author":"Lewko A.","year":"2011","journal-title":"TCC"},{"key":"atypb29","first-page":"278","author":"Micali S.","year":"2004","journal-title":"TCC"},{"key":"atypb30","first-page":"18","author":"Naor M.","year":"2009","journal-title":"CRYPTO"},{"key":"atypb31","first-page":"462","author":"Pietrzak K.","year":"2009","journal-title":"EUROCRYPT"},{"key":"atypb33","first-page":"552","author":"Rothblum G. N.","year":"2012","journal-title":"CRYPTO"},{"key":"atypb34","first-page":"199","author":"Ristenpart T.","year":"2009","journal-title":"Chicago"},{"key":"atypb35","first-page":"554","author":"Sander T.","year":"1999","journal-title":"FOCS"},{"key":"atypb36","doi-asserted-by":"crossref","first-page":"887","DOI":"10.1145\/2213977.2214056","volume":"2012","author":"Williams V. V.","year":"2012","journal-title":"STOC"}],"container-title":["SIAM Journal on Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/epubs.siam.org\/doi\/pdf\/10.1137\/130931461","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,9,10]],"date-time":"2020-09-10T12:10:25Z","timestamp":1599739825000},"score":1,"resource":{"primary":{"URL":"http:\/\/epubs.siam.org\/doi\/10.1137\/130931461"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,1]]},"references-count":33,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2015,1]]}},"alternative-id":["10.1137\/130931461"],"URL":"https:\/\/doi.org\/10.1137\/130931461","relation":{},"ISSN":["0097-5397","1095-7111"],"issn-type":[{"value":"0097-5397","type":"print"},{"value":"1095-7111","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015,1]]}}}