{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,18]],"date-time":"2025-12-18T14:02:02Z","timestamp":1766066522261,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":45,"publisher":"ACM","license":[{"start":{"date-parts":[[2015,10,12]],"date-time":"2015-10-12T00:00:00Z","timestamp":1444608000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2015,10,12]]},"DOI":"10.1145\/2810103.2813635","type":"proceedings-article","created":{"date-parts":[[2015,10,6]],"date-time":"2015-10-06T15:22:12Z","timestamp":1444144932000},"page":"364-375","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":83,"title":["Subversion-Resilient Signature Schemes"],"prefix":"10.1145","author":[{"given":"Giuseppe","family":"Ateniese","sequence":"first","affiliation":[{"name":"Sapienza University of Rome, Rome, Italy"}]},{"given":"Bernardo","family":"Magri","sequence":"additional","affiliation":[{"name":"Sapienza University of Rome, Rome, Italy"}]},{"given":"Daniele","family":"Venturi","sequence":"additional","affiliation":[{"name":"Sapienza University of Rome, Rome, Italy"}]}],"member":"320","published-online":{"date-parts":[[2015,10,12]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-013-9153-x"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-03356-8_3"},{"key":"e_1_3_2_1_3_1","volume-title":"Subversion-resilient signature schemes. IACR Cryptology ePrint Archive","author":"Ateniese Giuseppe","year":"2015","unstructured":"Giuseppe Ateniese , Bernardo Magri , and Daniele Venturi . Subversion-resilient signature schemes. IACR Cryptology ePrint Archive , 2015 :517, 2015. Giuseppe Ateniese, Bernardo Magri, and Daniele Venturi. Subversion-resilient signature schemes. IACR Cryptology ePrint Archive, 2015:517, 2015."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-44371-2_26"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-25385-0_26"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-44371-2_1"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.5555\/1754495.1754541"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.5555\/1788414.1788419"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-007-9005-7"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/s001459900053"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.5555\/647087.715827"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-42045-0_8"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-42045-0_8"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-17470-9_11"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-48116-5_28"},{"key":"e_1_3_2_1_16_1","first-page":"375","volume-title":"CRYPTO","author":"Desmedt Yvo","year":"1988","unstructured":"Yvo Desmedt . Abuses in cryptography and how to fight them . In CRYPTO , pages 375 -- 389 , 1988 . Yvo Desmedt. Abuses in cryptography and how to fight them. In CRYPTO, pages 375--389, 1988."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.5555\/648120.747056"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-46800-5_5"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-30580-4_28"},{"key":"e_1_3_2_1_20_1","first-page":"434","volume-title":"Innovations in Computer Science","author":"Dziembowski Stefan","year":"2010","unstructured":"Stefan Dziembowski , Krzysztof Pietrzak , and Daniel Wichs . Non-malleable codes . In Innovations in Computer Science , pages 434 -- 452 , 2010 . Stefan Dziembowski, Krzysztof Pietrzak, and Daniel Wichs. Non-malleable codes. In Innovations in Computer Science, pages 434--452, 2010."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-47672-7_37"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-34961-4_8"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-54242-8_20"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.5555\/1756123.1756136"},{"key":"e_1_3_2_1_25_1","first-page":"258","volume-title":"TCC","author":"Gennaro Rosario","year":"2004","unstructured":"Rosario Gennaro , Anna Lysyanskaya , Tal Malkin , Silvio Micali , and Tal Rabin . Algorithmic tamper-proof (ATP) security : Theoretical foundations for security against hardware tampering . In TCC , pages 258 -- 277 , 2004 . Rosario Gennaro, Anna Lysyanskaya, Tal Malkin, Silvio Micali, and Tal Rabin. Algorithmic tamper-proof (ATP) security: Theoretical foundations for security against hardware tampering. In TCC, pages 258--277, 2004."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-30057-8_5"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-46497-7_5"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.5555\/2033036.2033063"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/948109.948132"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-32009-5_30"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.5555\/646767.704299"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.5555\/795665.796482"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-46803-6_22"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/501983.501987"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-54631-0_21"},{"key":"e_1_3_2_1_36_1","volume-title":"The New York Times","author":"Perlroth Nicole","year":"2013","unstructured":"Nicole Perlroth , Jeff Larson , and Scott Shane . N.S. A. able to foil basic safeguards of privacy on web . The New York Times , September 2013 . Nicole Perlroth, Jeff Larson, and Scott Shane. N.S.A. able to foil basic safeguards of privacy on web. The New York Times, September 2013."},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2004.36"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-30057-8_6"},{"key":"e_1_3_2_1_39_1","volume-title":"Surreptitiously weakening cryptographic systems. IACR Cryptology ePrint Archive","author":"Schneier Bruce","year":"2015","unstructured":"Bruce Schneier , Matthew Fredrikson , Tadayoshi Kohno , and Thomas Ristenpart . Surreptitiously weakening cryptographic systems. IACR Cryptology ePrint Archive , 2015 :97, 2015. Bruce Schneier, Matthew Fredrikson, Tadayoshi Kohno, and Thomas Ristenpart. Surreptitiously weakening cryptographic systems. IACR Cryptology ePrint Archive, 2015:97, 2015."},{"key":"e_1_3_2_1_40_1","first-page":"51","volume-title":"CRYPTO","author":"Simmons Gustavus J.","year":"1983","unstructured":"Gustavus J. Simmons . The prisoners' problem and the subliminal channel . In CRYPTO , pages 51 -- 67 , 1983 . Gustavus J. Simmons. The prisoners' problem and the subliminal channel. In CRYPTO, pages 51--67, 1983."},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.1983.78"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1007\/11426639_7"},{"key":"e_1_3_2_1_43_1","first-page":"89","volume-title":"CRYPTO","author":"Adam","year":"1996","unstructured":"Adam L. Young and Moti Yung. The dark side of \"black-box\" cryptography, or: Should we trust Capstone ? In CRYPTO , pages 89 -- 103 , 1996 . Adam L. Young and Moti Yung. The dark side of \"black-box\" cryptography, or: Should we trust Capstone? In CRYPTO, pages 89--103, 1996."},{"key":"e_1_3_2_1_44_1","first-page":"62","volume-title":"EUROCRYPT","author":"Adam","year":"1997","unstructured":"Adam L. Young and Moti Yung. Kleptography: Using cryptography against cryptography . In EUROCRYPT , pages 62 -- 74 , 1997 . Adam L. Young and Moti Yung. Kleptography: Using cryptography against cryptography. In EUROCRYPT, pages 62--74, 1997."},{"key":"e_1_3_2_1_45_1","volume-title":"Young and Moti Yung. Malicious Cryptography: Exposing Cryptovirology","author":"Adam","year":"2004","unstructured":"Adam L. Young and Moti Yung. Malicious Cryptography: Exposing Cryptovirology . John Wiley & Sons, Inc. , first edition, 2004 . Adam L. Young and Moti Yung. Malicious Cryptography: Exposing Cryptovirology. John Wiley & Sons, Inc., first edition, 2004."}],"event":{"name":"CCS'15: The 22nd ACM Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Denver Colorado USA","acronym":"CCS'15"},"container-title":["Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2810103.2813635","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2810103.2813635","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T05:48:36Z","timestamp":1750225716000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2810103.2813635"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,10,12]]},"references-count":45,"alternative-id":["10.1145\/2810103.2813635","10.1145\/2810103"],"URL":"https:\/\/doi.org\/10.1145\/2810103.2813635","relation":{},"subject":[],"published":{"date-parts":[[2015,10,12]]},"assertion":[{"value":"2015-10-12","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}