{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:13:59Z","timestamp":1750306439598,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":7,"publisher":"ACM","license":[{"start":{"date-parts":[[2015,9,8]],"date-time":"2015-09-08T00:00:00Z","timestamp":1441670400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2015,9,8]]},"DOI":"10.1145\/2799979.2800045","type":"proceedings-article","created":{"date-parts":[[2015,9,22]],"date-time":"2015-09-22T19:31:27Z","timestamp":1442950287000},"page":"90-92","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Improvement of treeless signature schemes implementation by random oracle buffering"],"prefix":"10.1145","author":[{"given":"Maxim","family":"Anikeev","sequence":"first","affiliation":[{"name":"Southern Federal University, Taganrog, Russia"}]}],"member":"320","published-online":{"date-parts":[[2015,9,8]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.5555\/1522375"},{"key":"e_1_3_2_1_2_1","volume-title":"Ruhr-Universit\u00e4t Bochum","author":"Ipli I.","year":"2013","unstructured":"I. Ipli . Hardware\/software-codesign for lattice-based cryptography on reconfigurable hardware. Master's thesis , Ruhr-Universit\u00e4t Bochum , 2013 . I. Ipli. Hardware\/software-codesign for lattice-based cryptography on reconfigurable hardware. Master's thesis, Ruhr-Universit\u00e4t Bochum, 2013."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-10366-7_35"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-29011-4_43"},{"key":"e_1_3_2_1_6_1","unstructured":"V. Shoup. NTL: A library for doing number theory. http:\/\/www.shoup.net\/ntl 2013 (accessed May 7 2015).  V. Shoup. NTL: A library for doing number theory. http:\/\/www.shoup.net\/ntl 2013 (accessed May 7 2015)."},{"key":"e_1_3_2_1_7_1","volume-title":"https:\/\/www.cdc.informatik.tu-darmstadt.de\/~pschmidt\/implementations\/treeless12\/treeless12.tar.bz2","author":"Weiden P.","year":"2013","unstructured":"P. Weiden . Treeless12 -- Treeless lattice-based signature scheme. https:\/\/www.cdc.informatik.tu-darmstadt.de\/~pschmidt\/implementations\/treeless12\/treeless12.tar.bz2 , 2013 (accessed March 19, 2015). P. Weiden. Treeless12 -- Treeless lattice-based signature scheme. https:\/\/www.cdc.informatik.tu-darmstadt.de\/~pschmidt\/implementations\/treeless12\/treeless12.tar.bz2, 2013 (accessed March 19, 2015)."},{"key":"e_1_3_2_1_8_1","first-page":"65","volume":"2013","author":"Weiden P.","year":"2013","unstructured":"P. Weiden , A. H\u00fclsing , D. Cabarcas , and J. A. Buchmann . Instantiating treeless signature schemes. IACR Cryptology ePrint Archive , 2013 : 65 , 2013 . P. Weiden, A. H\u00fclsing, D. Cabarcas, and J. A. Buchmann. Instantiating treeless signature schemes. IACR Cryptology ePrint Archive, 2013:65, 2013.","journal-title":"Instantiating treeless signature schemes. IACR Cryptology ePrint Archive"}],"event":{"name":"SIN '15: The 8th International Conference on Security of Information and Networks","acronym":"SIN '15","location":"Sochi Russia"},"container-title":["Proceedings of the 8th International Conference on Security of Information and Networks"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2799979.2800045","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2799979.2800045","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T05:42:44Z","timestamp":1750225364000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2799979.2800045"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,9,8]]},"references-count":7,"alternative-id":["10.1145\/2799979.2800045","10.1145\/2799979"],"URL":"https:\/\/doi.org\/10.1145\/2799979.2800045","relation":{},"subject":[],"published":{"date-parts":[[2015,9,8]]},"assertion":[{"value":"2015-09-08","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}