{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,6]],"date-time":"2025-12-06T04:52:21Z","timestamp":1764996741189,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":24,"publisher":"ACM","license":[{"start":{"date-parts":[[2004,10,25]],"date-time":"2004-10-25T00:00:00Z","timestamp":1098662400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2004,10,25]]},"DOI":"10.1145\/1030083.1030129","type":"proceedings-article","created":{"date-parts":[[2005,1,30]],"date-time":"2005-01-30T17:55:16Z","timestamp":1107107716000},"page":"344-353","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":15,"title":["Versatile padding schemes for joint signature and encryption"],"prefix":"10.1145","author":[{"given":"Yevgeniy","family":"Dodis","sequence":"first","affiliation":[{"name":"New York University"}]},{"given":"Michael J.","family":"Freedman","sequence":"additional","affiliation":[{"name":"New York University"}]},{"given":"Stanislaw","family":"Jarecki","sequence":"additional","affiliation":[{"name":"University of California, Irvine"}]},{"given":"Shabsi","family":"Walfish","sequence":"additional","affiliation":[{"name":"New York University"}]}],"member":"320","published-online":{"date-parts":[[2004,10,25]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.5555\/647087.715701"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.5555\/648119.746901"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/168588.168596"},{"key":"e_1_3_2_1_4_1","volume-title":"Italy","author":"BELLARE M.","year":"1994","unstructured":"BELLARE , M. , AND ROGAWAY , P. Optimal asymmetric encryption. In Advances in Cryptology--EUROCRYPT 94 (Perugia , Italy , May 1994 ).]] BELLARE, M., AND ROGAWAY, P. Optimal asymmetric encryption. In Advances in Cryptology--EUROCRYPT 94 (Perugia, Italy, May 1994).]]"},{"key":"e_1_3_2_1_5_1","volume-title":"Spain","author":"BELLARE M.","year":"1996","unstructured":"BELLARE , M. , AND ROGAWAY , P. The exact security of digital signatures: How to sign with RSA and Rabin. In Advances in Cryptology--EUROCRYPT 96 (Saragossa , Spain , May 1996 ).]] BELLARE, M., AND ROGAWAY, P. The exact security of digital signatures: How to sign with RSA and Rabin. In Advances in Cryptology--EUROCRYPT 96 (Saragossa, Spain, May 1996).]]"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.5555\/646767.704297"},{"key":"e_1_3_2_1_7_1","volume-title":"Proc. USENIX Technical Conference","author":"DAVIS D.","year":"2001","unstructured":"DAVIS , D. Defective sign & encrypt in s\/mime,pkcs#7, moss, pem, pgp, and xml. In Proc. USENIX Technical Conference ( Boston, Massachusetts , June 2001 ).]] DAVIS, D. Defective sign & encrypt in s\/mime,pkcs#7, moss, pem, pgp, and xml. In Proc. USENIX Technical Conference (Boston, Massachusetts, June 2001).]]"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-39200-9_19"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.5555\/1766811.1766819"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.5555\/646766.704288"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1137\/0217017"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/501983.502013"},{"key":"e_1_3_2_1_14_1","first-page":"2","article-title":"Cryptanalysis and improvement of petersen-michels signcryption schemes","volume":"146","author":"HE W.","year":"1999","unstructured":"HE , W. , AND WU , T . Cryptanalysis and improvement of petersen-michels signcryption schemes . IEEE Computers and Digital Communications 146 , 2 ( 1999 ), 123--124.]] HE, W., AND WU, T. Cryptanalysis and improvement of petersen-michels signcryption schemes. IEEE Computers and Digital Communications 146, 2 (1999), 123--124.]]","journal-title":"IEEE Computers and Digital Communications"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.5555\/647934.740910"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-45146-4_22"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1137\/0217022"},{"key":"e_1_3_2_1_19_1","volume-title":"California","author":"MAO W.","year":"2003","unstructured":"MAO , W. , AND MALONE-LEE , J. Two birds one stone: Signcryption using RSA. In Progress in Cryptology -- CT-RSA 2003 (San Francisco , California , Apr. 2003 ).]] MAO, W., AND MALONE-LEE, J. Two birds one stone: Signcryption using RSA. In Progress in Cryptology -- CT-RSA 2003 (San Francisco, California, Apr. 2003).]]"},{"key":"e_1_3_2_1_20_1","first-page":"2","article-title":"Cryptanalysis and improvement of signcryption schemes","volume":"145","author":"PETERSEN H.","year":"1998","unstructured":"PETERSEN , H. , AND MICHELS , M . Cryptanalysis and improvement of signcryption schemes . IEEE Computers and Digital Communications 145 , 2 ( 1998 ), 140--151.]] PETERSEN, H., AND MICHELS, M. Cryptanalysis and improvement of signcryption schemes. IEEE Computers and Digital Communications 145, 2 (1998), 140--151.]]","journal-title":"IEEE Computers and Digital Communications"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45067-X_33"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/586110.586125"},{"key":"e_1_3_2_1_23_1","volume-title":"RSA Encryption Standard. Version 1.5","author":"RSA LABORATORIES","year":"1993","unstructured":"RSA LABORATORIES . PKCS #1 : RSA Encryption Standard. Version 1.5 . Nov. 1993 .]] RSA LABORATORIES. PKCS #1: RSA Encryption Standard. Version 1.5. Nov. 1993.]]"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.5555\/646766.704276"},{"key":"e_1_3_2_1_26_1","volume-title":"California","author":"ZHENG Y.","year":"1997","unstructured":"ZHENG , Y. Digital signcryption or how to achieve cost(signature & encryption) 1\/2 cost(signature) + cost(encryption). In Advances in Cryptology--CRYPTO 97 (Santa Barbara , California , Aug. 1997 ).]] ZHENG, Y. Digital signcryption or how to achieve cost(signature & encryption) 1\/2 cost(signature) + cost(encryption). In Advances in Cryptology--CRYPTO 97 (Santa Barbara, California, Aug. 1997).]]"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0020-0190(98)00167-7"}],"event":{"name":"CCS04: 11th ACM Conference on Computer and Communications Security 2004","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control","ACM Association for Computing Machinery"],"location":"Washington DC USA","acronym":"CCS04"},"container-title":["Proceedings of the 11th ACM conference on Computer and communications security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1030083.1030129","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1030083.1030129","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T16:25:07Z","timestamp":1750263907000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1030083.1030129"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004,10,25]]},"references-count":24,"alternative-id":["10.1145\/1030083.1030129","10.1145\/1030083"],"URL":"https:\/\/doi.org\/10.1145\/1030083.1030129","relation":{},"subject":[],"published":{"date-parts":[[2004,10,25]]},"assertion":[{"value":"2004-10-25","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}