{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:26:47Z","timestamp":1750220807590,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":5,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,11,11]],"date-time":"2019-11-11T00:00:00Z","timestamp":1573430400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"NIST"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,11,11]]},"DOI":"10.1145\/3338467.3358954","type":"proceedings-article","created":{"date-parts":[[2019,11,8]],"date-time":"2019-11-08T13:40:33Z","timestamp":1573220433000},"page":"29-29","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Towards Standardization of Threshold Schemes at NIST"],"prefix":"10.1145","author":[{"given":"Lu\u00eds T. A. N.","family":"Brand\u00e3o","sequence":"first","affiliation":[{"name":"National Institute of Standards and Technology, Gaithersburg, MD, USA"}]}],"member":"320","published-online":{"date-parts":[[2019,11,11]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Michael Davidson, Nicky Mouha, and Apostol Vassilev.","author":"Lu\u00eds T. A. N.","year":"2019","unstructured":"Lu\u00eds T. A. N. Brand ao , Michael Davidson, Nicky Mouha, and Apostol Vassilev. 2019 . Time to Standardize Threshold Schemes for Cryptographic Primitives. ITL Bulletin for April 2019. National Institute of Standards and Technology . Lu\u00eds T. A. N. Brand ao, Michael Davidson, Nicky Mouha, and Apostol Vassilev. 2019. Time to Standardize Threshold Schemes for Cryptographic Primitives. ITL Bulletin for April 2019. National Institute of Standards and Technology."},{"key":"#cr-split#-e_1_3_2_1_2_1.1","doi-asserted-by":"crossref","unstructured":"Lu\u00eds T. A. N. Brand\u00e3o Nicky Mouha and Apostol Vassilev. 2019. Threshold Schemes for Cryptographic Primitives: Challenges and Opportunities in Standardization and Validation of Threshold Cryptography. NISTIR 8214. https:\/\/doi.org\/10.6028\/NIST.IR.8214 10.6028\/NIST.IR.8214","DOI":"10.6028\/NIST.IR.8214"},{"key":"#cr-split#-e_1_3_2_1_2_1.2","doi-asserted-by":"crossref","unstructured":"Lu\u00eds T. A. N. Brand\u00e3o Nicky Mouha and Apostol Vassilev. 2019. Threshold Schemes for Cryptographic Primitives: Challenges and Opportunities in Standardization and Validation of Threshold Cryptography. NISTIR 8214. https:\/\/doi.org\/10.6028\/NIST.IR.8214","DOI":"10.6028\/NIST.IR.8214"},{"key":"#cr-split#-e_1_3_2_1_3_1.1","doi-asserted-by":"crossref","unstructured":"Cryptographic Technology Group. 2016. NIST Cryptographic Standards and Guidelines Development Process. NISTIR 7977. https:\/\/doi.org\/10.6028\/NIST.IR.7977 10.6028\/NIST.IR.7977","DOI":"10.6028\/NIST.IR.7977"},{"key":"#cr-split#-e_1_3_2_1_3_1.2","doi-asserted-by":"crossref","unstructured":"Cryptographic Technology Group. 2016. NIST Cryptographic Standards and Guidelines Development Process. NISTIR 7977. https:\/\/doi.org\/10.6028\/NIST.IR.7977","DOI":"10.6028\/NIST.IR.7977"}],"event":{"name":"CCS '19: 2019 ACM SIGSAC Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"London United Kingdom","acronym":"CCS '19"},"container-title":["Proceedings of ACM Workshop on Theory of Implementation Security Workshop"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3338467.3358954","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3338467.3358954","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3338467.3358954","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:12:48Z","timestamp":1750201968000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3338467.3358954"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,11,11]]},"references-count":5,"alternative-id":["10.1145\/3338467.3358954","10.1145\/3338467"],"URL":"https:\/\/doi.org\/10.1145\/3338467.3358954","relation":{},"subject":[],"published":{"date-parts":[[2019,11,11]]},"assertion":[{"value":"2019-11-11","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}