{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,30]],"date-time":"2026-04-30T11:38:18Z","timestamp":1777549098497,"version":"3.51.4"},"reference-count":34,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2007,7]]},"DOI":"10.1109\/csf.2007.23","type":"proceedings-article","created":{"date-parts":[[2007,7,23]],"date-time":"2007-07-23T16:33:26Z","timestamp":1185208406000},"page":"112-124","source":"Crossref","is-referenced-by-count":15,"title":["Key-dependent Message Security under Active Attacks--BRSIM\/UC-Soundness of Symbolic Encryption with Key Cycles"],"prefix":"10.1109","author":[{"given":"Michael","family":"Backes","sequence":"first","affiliation":[]},{"given":"Birgit","family":"Pfitzmann","sequence":"additional","affiliation":[]},{"given":"Andre","family":"Scedrov","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1983.1056650"},{"key":"17","first-page":"157","article-title":"Computationally sound, automated proofs for security protocols","author":"cortier","year":"2005","journal-title":"Proc 14th European Symposium on Programming (ESOP)"},{"key":"18","doi-asserted-by":"crossref","first-page":"391","DOI":"10.1137\/S0097539795291562","article-title":"Nonmalleable cryptography","volume":"30","author":"dolev","year":"2000","journal-title":"SIAM Journal on Computing"},{"key":"33","doi-asserted-by":"publisher","DOI":"10.1002\/j.1538-7305.1949.tb00928.x"},{"key":"15","year":"0"},{"key":"34","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.1982.45"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1007\/11681878_20"},{"key":"13","doi-asserted-by":"crossref","first-page":"93","DOI":"10.1007\/3-540-44987-6_7","article-title":"An efficient system for non-transferable anonymous credentials with optional anonymity revocation","volume":"2045","author":"camenisch","year":"2001","journal-title":"Lecture Notes in Computer Science"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1007\/s001459910006"},{"key":"11","doi-asserted-by":"crossref","first-page":"531","DOI":"10.1007\/3-540-44448-3_41","article-title":"Authenticated encryption: Relations among notions and analysis of the generic composition paradigm","volume":"1976","author":"bellare","year":"2000","journal-title":"Lecture Notes in Computer Science"},{"key":"12","first-page":"62","article-title":"Encryption-scheme security in the presence of key-dependent messages","author":"black","year":"2002","journal-title":"Proc 9th Annual Workshop on Selected Areas in Cryptography (SAC)"},{"key":"21","year":"0"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1145\/950620.950623"},{"key":"22","doi-asserted-by":"crossref","first-page":"77","DOI":"10.1007\/3-540-38424-3_6","article-title":"Fair computation of general functions in presence of immoral majority","volume":"537","author":"goldwasser","year":"1990","journal-title":"Lecture Notes in Computer Science"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1016\/0022-0000(84)90070-9"},{"key":"24","first-page":"77","article-title":"Semantics and program analysis of computationally secure information flow","author":"laud","year":"2001","journal-title":"Proc 10th Eur Symp Programming (ESOP)"},{"key":"25","year":"0"},{"key":"26","doi-asserted-by":"crossref","DOI":"10.1515\/9780691206844","author":"luby","year":"1996","journal-title":"Pseudorandomness and Cryptographic Applications"},{"key":"27","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.1989.36288"},{"key":"28","doi-asserted-by":"crossref","first-page":"392","DOI":"10.1007\/3-540-46766-1_32","article-title":"Secure computation","volume":"576","author":"micali","year":"1991","journal-title":"Lecture Notes in Computer Science"},{"key":"29","doi-asserted-by":"crossref","first-page":"133","DOI":"10.1007\/978-3-540-24638-1_8","article-title":"Soundness of formal encryption in the presence of active adversaries","volume":"2951","author":"micciancio","year":"2004","journal-title":"Lecture Notes in Computer Science"},{"key":"3","doi-asserted-by":"crossref","first-page":"374","DOI":"10.1007\/11555827_22","article-title":"Soundness of formal encryption in the presence of key-cycles","volume":"3679","author":"ada?o","year":"2005","journal-title":"Lecture Notes in Computer Science"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-44929-9_1"},{"key":"10","doi-asserted-by":"crossref","first-page":"26","DOI":"10.1007\/BFb0055718","article-title":"Relations among notions of security for public-key encryption schemes","volume":"1462","author":"bellare","year":"1998","journal-title":"Lecture Notes in Computer Science"},{"key":"1","year":"0"},{"key":"30","year":"0"},{"key":"7","year":"0"},{"key":"6","year":"0"},{"key":"32","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-46766-1_35"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2005.25"},{"key":"31","year":"0"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/CSFW.2004.1310742"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.1997.646128"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1007\/BF00196771"}],"event":{"name":"20th IEEE Computer Security Foundations Symposium (CSF'07)","location":"Venice, Italy","start":{"date-parts":[[2007,7,6]]},"end":{"date-parts":[[2007,7,8]]}},"container-title":["20th IEEE Computer Security Foundations Symposium (CSF'07)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4271630\/4271631\/04271644.pdf?arnumber=4271644","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,4,25]],"date-time":"2020-04-25T05:17:26Z","timestamp":1587791846000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/4271644\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007,7]]},"references-count":34,"URL":"https:\/\/doi.org\/10.1109\/csf.2007.23","relation":{},"ISSN":["1063-6900"],"issn-type":[{"value":"1063-6900","type":"print"}],"subject":[],"published":{"date-parts":[[2007,7]]}}}