{"id":"https://openalex.org/W2772322851","doi":"https://doi.org/10.1007/978-3-319-72359-4_53","title":"The ECCA Security of Hybrid Encryptions","display_name":"The ECCA Security of Hybrid Encryptions","publication_year":2017,"publication_date":"2017-01-01","ids":{"openalex":"https://openalex.org/W2772322851","doi":"https://doi.org/10.1007/978-3-319-72359-4_53","mag":"2772322851"},"language":"en","primary_location":{"id":"doi:10.1007/978-3-319-72359-4_53","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-319-72359-4_53","pdf_url":null,"source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},"type":"book-chapter","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5036875950","display_name":"Honglong Dai","orcid":null},"institutions":[{"id":"https://openalex.org/I20231570","display_name":"Peking University","ror":"https://ror.org/02v51f717","country_code":"CN","type":"education","lineage":["https://openalex.org/I20231570"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Honglong Dai","raw_affiliation_strings":["School of Mathematics, Peking University, Beijing, People\u2019s Republic of China","School of Mathematics, Peking University, Beijing, People's Republic of China"],"affiliations":[{"raw_affiliation_string":"School of Mathematics, Peking University, Beijing, People\u2019s Republic of China","institution_ids":["https://openalex.org/I20231570"]},{"raw_affiliation_string":"School of Mathematics, Peking University, Beijing, People's Republic of China","institution_ids":["https://openalex.org/I20231570"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5053498620","display_name":"Jinyong Chang","orcid":"https://orcid.org/0000-0002-6569-5152"},"institutions":[{"id":"https://openalex.org/I148099405","display_name":"Xi'an University of Architecture and Technology","ror":"https://ror.org/04v2j2k71","country_code":"CN","type":"education","lineage":["https://openalex.org/I148099405"]},{"id":"https://openalex.org/I20231570","display_name":"Peking University","ror":"https://ror.org/02v51f717","country_code":"CN","type":"education","lineage":["https://openalex.org/I20231570"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jinyong Chang","raw_affiliation_strings":["School of Information and Control Engineering, Xi\u2019an University of Architecture and Technology, Xi\u2019an, Shannxi, People\u2019s Republic of China","School of Mathematics, Peking University, Beijing, People\u2019s Republic of China","School of Mathematics, Peking University, Beijing, People's Republic of China"],"affiliations":[{"raw_affiliation_string":"School of Information and Control Engineering, Xi\u2019an University of Architecture and Technology, Xi\u2019an, Shannxi, People\u2019s Republic of China","institution_ids":["https://openalex.org/I148099405"]},{"raw_affiliation_string":"School of Mathematics, Peking University, Beijing, People\u2019s Republic of China","institution_ids":["https://openalex.org/I20231570"]},{"raw_affiliation_string":"School of Mathematics, Peking University, Beijing, People's Republic of China","institution_ids":["https://openalex.org/I20231570"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5037591282","display_name":"Zhenduo Hou","orcid":"https://orcid.org/0000-0002-7383-8379"},"institutions":[{"id":"https://openalex.org/I20231570","display_name":"Peking University","ror":"https://ror.org/02v51f717","country_code":"CN","type":"education","lineage":["https://openalex.org/I20231570"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhenduo Hou","raw_affiliation_strings":["School of Mathematics, Peking University, Beijing, People\u2019s Republic of China","School of Mathematics, Peking University, Beijing, People's Republic of China"],"affiliations":[{"raw_affiliation_string":"School of Mathematics, Peking University, Beijing, People\u2019s Republic of China","institution_ids":["https://openalex.org/I20231570"]},{"raw_affiliation_string":"School of Mathematics, Peking University, Beijing, People's Republic of China","institution_ids":["https://openalex.org/I20231570"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100956729","display_name":"Maozhi Xu","orcid":null},"institutions":[{"id":"https://openalex.org/I20231570","display_name":"Peking University","ror":"https://ror.org/02v51f717","country_code":"CN","type":"education","lineage":["https://openalex.org/I20231570"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Maozhi Xu","raw_affiliation_strings":["School of Mathematics, Peking University, Beijing, People\u2019s Republic of China","School of Mathematics, Peking University, Beijing, People's Republic of China"],"affiliations":[{"raw_affiliation_string":"School of Mathematics, Peking University, Beijing, People\u2019s Republic of China","institution_ids":["https://openalex.org/I20231570"]},{"raw_affiliation_string":"School of Mathematics, Peking University, Beijing, People's Republic of China","institution_ids":["https://openalex.org/I20231570"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5036875950"],"corresponding_institution_ids":["https://openalex.org/I20231570"],"apc_list":{"value":5000,"currency":"EUR","value_usd":5392},"apc_paid":null,"fwci":0.5652,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.72072188,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":94,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"847","last_page":"859"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10720","display_name":"Complexity and Algorithms in Graphs","score":0.9980000257492065,"subfield":{"id":"https://openalex.org/subfields/1703","display_name":"Computational Theory and Mathematics"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9972000122070312,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6834607124328613},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.6751210689544678},{"id":"https://openalex.org/keywords/random-oracle","display_name":"Random oracle","score":0.5671349167823792},{"id":"https://openalex.org/keywords/ciphertext","display_name":"Ciphertext","score":0.5496871471405029},{"id":"https://openalex.org/keywords/probabilistic-encryption","display_name":"Probabilistic encryption","score":0.4981575012207031},{"id":"https://openalex.org/keywords/block-cipher","display_name":"Block cipher","score":0.4559735059738159},{"id":"https://openalex.org/keywords/randomness","display_name":"Randomness","score":0.4523414969444275},{"id":"https://openalex.org/keywords/watermarking-attack","display_name":"Watermarking attack","score":0.42924946546554565},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.42721936106681824},{"id":"https://openalex.org/keywords/oracle","display_name":"Oracle","score":0.4225602447986603},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.4117725193500519},{"id":"https://openalex.org/keywords/56-bit-encryption","display_name":"56-bit encryption","score":0.3331380784511566},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.318236380815506},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.28260669112205505},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.20485901832580566}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6834607124328613},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.6751210689544678},{"id":"https://openalex.org/C94284585","wikidata":"https://www.wikidata.org/wiki/Q228184","display_name":"Random oracle","level":4,"score":0.5671349167823792},{"id":"https://openalex.org/C93974786","wikidata":"https://www.wikidata.org/wiki/Q1589480","display_name":"Ciphertext","level":3,"score":0.5496871471405029},{"id":"https://openalex.org/C54569210","wikidata":"https://www.wikidata.org/wiki/Q7246854","display_name":"Probabilistic encryption","level":3,"score":0.4981575012207031},{"id":"https://openalex.org/C106544461","wikidata":"https://www.wikidata.org/wiki/Q543151","display_name":"Block cipher","level":3,"score":0.4559735059738159},{"id":"https://openalex.org/C125112378","wikidata":"https://www.wikidata.org/wiki/Q176640","display_name":"Randomness","level":2,"score":0.4523414969444275},{"id":"https://openalex.org/C122760801","wikidata":"https://www.wikidata.org/wiki/Q2552011","display_name":"Watermarking attack","level":5,"score":0.42924946546554565},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.42721936106681824},{"id":"https://openalex.org/C55166926","wikidata":"https://www.wikidata.org/wiki/Q2892946","display_name":"Oracle","level":2,"score":0.4225602447986603},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.4117725193500519},{"id":"https://openalex.org/C46905813","wikidata":"https://www.wikidata.org/wiki/Q4640678","display_name":"56-bit encryption","level":4,"score":0.3331380784511566},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.318236380815506},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.28260669112205505},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.20485901832580566},{"id":"https://openalex.org/C105795698","wikidata":"https://www.wikidata.org/wiki/Q12483","display_name":"Statistics","level":1,"score":0.0},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1007/978-3-319-72359-4_53","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-319-72359-4_53","pdf_url":null,"source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":11,"referenced_works":["https://openalex.org/W12882856","https://openalex.org/W31313801","https://openalex.org/W36535589","https://openalex.org/W2059832303","https://openalex.org/W2073210531","https://openalex.org/W2110326321","https://openalex.org/W2119420484","https://openalex.org/W2122987162","https://openalex.org/W2140005461","https://openalex.org/W2152783950","https://openalex.org/W2157679418"],"related_works":["https://openalex.org/W2355986883","https://openalex.org/W1988224692","https://openalex.org/W4315815885","https://openalex.org/W2175086517","https://openalex.org/W4362613232","https://openalex.org/W1958453626","https://openalex.org/W2364426341","https://openalex.org/W3197142514","https://openalex.org/W4281639007","https://openalex.org/W1518301672"],"abstract_inverted_index":null,"counts_by_year":[{"year":2018,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
