{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,29]],"date-time":"2026-01-29T20:46:31Z","timestamp":1769719591266,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":17,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,10,30]],"date-time":"2017-10-30T00:00:00Z","timestamp":1509321600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"ERC","award":["Project ERCC FP7\/615074"],"award-info":[{"award-number":["Project ERCC FP7\/615074"]}]},{"DOI":"10.13039\/100000001","name":"NSF","doi-asserted-by":"publisher","award":["CNS-1526801, CNS-1717640"],"award-info":[{"award-number":["CNS-1526801, CNS-1717640"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Mircrosoft","award":["Gift"],"award-info":[{"award-number":["Gift"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,10,30]]},"DOI":"10.1145\/3133956.3133965","type":"proceedings-article","created":{"date-parts":[[2017,10,27]],"date-time":"2017-10-27T12:48:18Z","timestamp":1509108498000},"page":"923-940","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":7,"title":["Defending Against Key Exfiltration"],"prefix":"10.1145","author":[{"given":"Mihir","family":"Bellare","sequence":"first","affiliation":[{"name":"University of California, San Diego, La Jolla, CA, USA"}]},{"given":"Wei","family":"Dai","sequence":"additional","affiliation":[{"name":"University of California, San Diego, La Jolla, CA, USA"}]}],"member":"320","published-online":{"date-parts":[[2017,10,30]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Public-Key Encryption in the Bounded-Retrieval Model EUROCRYPT 2010 (LNCS), Henri Gilbert (Ed.)","volume":"6110","author":"Alwen Jo\u00ebl","year":"2010","unstructured":"Jo\u00ebl Alwen, Yevgeniy Dodis, Moni Naor, Gil Segev, Shabsi Walfish, and Daniel Wichs. 2010. Public-Key Encryption in the Bounded-Retrieval Model EUROCRYPT 2010 (LNCS), Henri Gilbert (Ed.), Vol. Vol. 6110. Springer, Heidelberg, 113--134."},{"key":"e_1_3_2_1_2_1","volume-title":"Leakage-Resilient Public-Key Cryptography in the Bounded-Retrieval Model CRYPTO 2009 (LNCS), Shai Halevi (Ed.)","volume":"5677","author":"Alwen Jo\u00ebl","year":"2009","unstructured":"Jo\u00ebl Alwen, Yevgeniy Dodis, and Daniel Wichs. 2009. Leakage-Resilient Public-Key Cryptography in the Bounded-Retrieval Model CRYPTO 2009 (LNCS), Shai Halevi (Ed.), Vol. Vol. 5677. Springer, Heidelberg, 36--54."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3133965"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-53018-4_14"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45708-9_11"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-53890-6_15"},{"key":"e_1_3_2_1_8_1","volume-title":"Serge Vaudenay (Ed.)","author":"Bellare Mihir","unstructured":"Mihir Bellare and Phillip Rogaway 2006. The Security of Triple Encryption and a Framework for Code-Based Game-Playing Proofs EUROCRYPT 2006 (LNCS), Serge Vaudenay (Ed.), Vol. Vol. 4004. Springer, Heidelberg, 409--426."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45682-1_30"},{"key":"e_1_3_2_1_10_1","volume-title":"Intrusion-Resilient Key Exchange in the Bounded Retrieval Model TCC 2007 (LNCS), Salil P. Vadhan (Ed.)","volume":"4392","author":"Cash David","year":"2007","unstructured":"David Cash, Yan Zong Ding, Yevgeniy Dodis, Wenke Lee, Richard J. Lipton, and Shabsi Walfish. 2007. Intrusion-Resilient Key Exchange in the Bounded Retrieval Model TCC 2007 (LNCS), Salil P. Vadhan (Ed.), Vol. Vol. 4392. Springer, Heidelberg, 479--498."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/1555349.1555371"},{"key":"e_1_3_2_1_12_1","volume-title":"Perfectly Secure Password Protocols in the Bounded Retrieval Model TCC 2006 (LNCS), Shai Halevi and Tal Rabin (Eds.)","volume":"3876","author":"Crescenzo Giovanni Di","year":"2006","unstructured":"Giovanni Di Crescenzo, Richard J. Lipton, and Shabsi Walfish. 2006. Perfectly Secure Password Protocols in the Bounded Retrieval Model TCC 2006 (LNCS), Shai Halevi and Tal Rabin (Eds.), Vol. Vol. 3876. Springer, Heidelberg, 225--244."},{"key":"e_1_3_2_1_13_1","volume-title":"Intrusion-Resilience Via the Bounded-Storage Model TCC 2006 (LNCS), Shai Halevi and Tal Rabin (Eds.)","volume":"3876","author":"Dziembowski Stefan","year":"2006","unstructured":"Stefan Dziembowski. 2006. Intrusion-Resilience Via the Bounded-Storage Model TCC 2006 (LNCS), Shai Halevi and Tal Rabin (Eds.), Vol. Vol. 3876. Springer, Heidelberg, 207--224."},{"key":"e_1_3_2_1_14_1","volume-title":"How to Prove Yourself: Practical Solutions to Identification and Signature Problems CRYPTO'86 (LNCS), bibfieldeditor","author":"Fiat Amos","unstructured":"Amos Fiat and Adi Shamir 1987. How to Prove Yourself: Practical Solutions to Identification and Signature Problems CRYPTO'86 (LNCS), bibfieldeditorAndrew M. Odlyzko (Ed.), Vol. Vol. 263. Springer, Heidelberg, 186--194."},{"key":"e_1_3_2_1_15_1","volume-title":"Stop data exfiltration. (2015)","author":"McAfee","year":"2015","unstructured":"McAfee 2015. Stop data exfiltration. (2015). August 2015. https:\/\/www.mcafee.com\/us\/resources\/solution-briefs\/sb-quarterly-threats-aug-2015-1.pdf."},{"key":"e_1_3_2_1_16_1","volume-title":"Ernest F. Brickell (Ed.)","author":"Okamoto Tatsuaki","unstructured":"Tatsuaki Okamoto. 1993. Provably Secure and Practical Identification Schemes and Corresponding Signature Schemes CRYPTO'92 (LNCS), Ernest F. Brickell (Ed.), Vol. Vol. 740. Springer, Heidelberg, 31--53."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.2307\/2308012"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF00196725"}],"event":{"name":"CCS '17: 2017 ACM SIGSAC Conference on Computer and Communications Security","location":"Dallas Texas USA","acronym":"CCS '17","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3133956.3133965","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3133956.3133965","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3133956.3133965","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T02:13:26Z","timestamp":1750212806000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3133956.3133965"}},"subtitle":["Efficiency Improvements for Big-Key Cryptography via Large-Alphabet Subkey Prediction"],"short-title":[],"issued":{"date-parts":[[2017,10,30]]},"references-count":17,"alternative-id":["10.1145\/3133956.3133965","10.1145\/3133956"],"URL":"https:\/\/doi.org\/10.1145\/3133956.3133965","relation":{},"subject":[],"published":{"date-parts":[[2017,10,30]]},"assertion":[{"value":"2017-10-30","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}