{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T04:11:07Z","timestamp":1725423067126},"reference-count":32,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,8]]},"DOI":"10.1109\/trustcom.2016.0303","type":"proceedings-article","created":{"date-parts":[[2017,2,9]],"date-time":"2017-02-09T21:44:06Z","timestamp":1486676646000},"page":"1984-1989","source":"Crossref","is-referenced-by-count":0,"title":["On the Leakage Resilient Cryptography in Game-Theoretic Settings"],"prefix":"10.1109","author":[{"given":"Mohammad Shahriar","family":"Rahman","sequence":"first","affiliation":[]},{"given":"Keita","family":"Emura","sequence":"additional","affiliation":[]},{"given":"Shinsaku","family":"Kiyomoto","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/1866307.1866324"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-32928-9_23"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-19962-7_13"},{"key":"ref10","first-page":"613","article-title":"Efficient public-key cryptography in the presence of key leakage","author":"dodis","year":"2010","journal-title":"ASIACRYPT"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-14623-7_2"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/CSF.2015.39"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/FOCS.2008.56"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1587\/transfun.E98.A.853"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-22792-9_17"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/FOCS.2010.65"},{"key":"ref17","first-page":"107","article-title":"After-the-fact leakage in public-key encryption","author":"halevi","year":"2011","journal-title":"TCC"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/1007352.1007447"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1587\/transfun.E93.A.42"},{"key":"ref28","first-page":"348","article-title":"Nonce-based symmetric encryption","author":"rogaway","year":"2004","journal-title":"FSE"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-10366-7_40"},{"key":"ref27","first-page":"462","article-title":"A leakage-resilient mode of operation","author":"pietrzak","year":"2009","journal-title":"Euro-Crypt"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-16715-2_17"},{"key":"ref6","first-page":"440","article-title":"Hierarchical identity based encryption with constant size ciphertext","author":"boneh","year":"2005","journal-title":"Eurocrypt"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1007\/11761679_23"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-10366-7_14"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/1866307.1866325"},{"key":"ref7","first-page":"1","article-title":"Circular and leakage resilient public-key encryption under subgroup indistinguishability - (or: Quadratic residuosity strikes back)","author":"brakerski","year":"2010","journal-title":"Crypto"},{"key":"ref2","first-page":"474","article-title":"Simultaneous hardcore bits and cryptography against memory attacks","author":"akavia","year":"2009","journal-title":"TCC"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/FOCS.2010.56"},{"year":"0","key":"ref1"},{"key":"ref20","first-page":"41","article-title":"Protecting cryptographic keys against continual leakage","author":"juma","year":"2010","journal-title":"CRYPT°"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-17373-8_34"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-71039-4_19"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-00457-5_4"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-19571-6_7"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-54242-8_7"},{"journal-title":"A Course in Game Theory","year":"1994","author":"osborne","key":"ref25"}],"event":{"name":"2016 IEEE Trustcom\/BigDataSE\/I\u200bSPA","start":{"date-parts":[[2016,8,23]]},"location":"Tianjin, China","end":{"date-parts":[[2016,8,26]]}},"container-title":["2016 IEEE Trustcom\/BigDataSE\/ISPA"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7845250\/7846883\/07847186.pdf?arnumber=7847186","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,12,13]],"date-time":"2017-12-13T20:07:10Z","timestamp":1513195630000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7847186\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,8]]},"references-count":32,"URL":"https:\/\/doi.org\/10.1109\/trustcom.2016.0303","relation":{},"subject":[],"published":{"date-parts":[[2016,8]]}}}