{"id":"https://openalex.org/W4417090918","doi":"https://doi.org/10.1007/978-981-95-5125-5_9","title":"Hybrid-Query Bounds with\u00a0Partial Input Control Framework and\u00a0Application to\u00a0Tight M-eTCR","display_name":"Hybrid-Query Bounds with\u00a0Partial Input Control Framework and\u00a0Application to\u00a0Tight M-eTCR","publication_year":2025,"publication_date":"2025-12-07","ids":{"openalex":"https://openalex.org/W4417090918","doi":"https://doi.org/10.1007/978-981-95-5125-5_9"},"language":"en","primary_location":{"id":"doi:10.1007/978-981-95-5125-5_9","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-981-95-5125-5_9","pdf_url":null,"source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},"type":"book-chapter","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5065527777","display_name":"Andreas H\u00fclsing","orcid":"https://orcid.org/0000-0003-2215-4134"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Andreas H\u00fclsing","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5034257289","display_name":"Mikhail Kudinov","orcid":"https://orcid.org/0000-0002-8555-4891"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Mikhail Kudinov","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":"https://openalex.org/A5084799117","display_name":"Christian Majenz","orcid":"https://orcid.org/0000-0002-1877-8385"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Christian Majenz","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5065527777"],"corresponding_institution_ids":[],"apc_list":{"value":5000,"currency":"EUR","value_usd":5392},"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.60251365,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"256","last_page":"286"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9228000044822693,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9228000044822693,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.02250000089406967,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.014600000344216824,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/hash-function","display_name":"Hash function","score":0.6658999919891357},{"id":"https://openalex.org/keywords/oracle","display_name":"Oracle","score":0.6029999852180481},{"id":"https://openalex.org/keywords/upper-and-lower-bounds","display_name":"Upper and lower bounds","score":0.5331000089645386},{"id":"https://openalex.org/keywords/random-oracle","display_name":"Random oracle","score":0.5105999708175659},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.43369999527931213},{"id":"https://openalex.org/keywords/concrete-security","display_name":"Concrete security","score":0.4244999885559082},{"id":"https://openalex.org/keywords/leverage","display_name":"Leverage (statistics)","score":0.39010000228881836},{"id":"https://openalex.org/keywords/provable-security","display_name":"Provable security","score":0.3871000111103058},{"id":"https://openalex.org/keywords/collision-resistance","display_name":"Collision resistance","score":0.37630000710487366},{"id":"https://openalex.org/keywords/signature","display_name":"Signature (topology)","score":0.3646000027656555}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7692999839782715},{"id":"https://openalex.org/C99138194","wikidata":"https://www.wikidata.org/wiki/Q183427","display_name":"Hash function","level":2,"score":0.6658999919891357},{"id":"https://openalex.org/C55166926","wikidata":"https://www.wikidata.org/wiki/Q2892946","display_name":"Oracle","level":2,"score":0.6029999852180481},{"id":"https://openalex.org/C77553402","wikidata":"https://www.wikidata.org/wiki/Q13222579","display_name":"Upper and lower bounds","level":2,"score":0.5331000089645386},{"id":"https://openalex.org/C94284585","wikidata":"https://www.wikidata.org/wiki/Q228184","display_name":"Random oracle","level":4,"score":0.5105999708175659},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.4555000066757202},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.43369999527931213},{"id":"https://openalex.org/C147343967","wikidata":"https://www.wikidata.org/wiki/Q5159078","display_name":"Concrete security","level":3,"score":0.4244999885559082},{"id":"https://openalex.org/C153083717","wikidata":"https://www.wikidata.org/wiki/Q6535263","display_name":"Leverage (statistics)","level":2,"score":0.39010000228881836},{"id":"https://openalex.org/C131672422","wikidata":"https://www.wikidata.org/wiki/Q852594","display_name":"Provable security","level":3,"score":0.3871000111103058},{"id":"https://openalex.org/C150909736","wikidata":"https://www.wikidata.org/wiki/Q1779448","display_name":"Collision resistance","level":5,"score":0.37630000710487366},{"id":"https://openalex.org/C2779696439","wikidata":"https://www.wikidata.org/wiki/Q7512811","display_name":"Signature (topology)","level":2,"score":0.3646000027656555},{"id":"https://openalex.org/C14036430","wikidata":"https://www.wikidata.org/wiki/Q3736076","display_name":"Function (biology)","level":2,"score":0.3637999892234802},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.35929998755455017},{"id":"https://openalex.org/C189950617","wikidata":"https://www.wikidata.org/wiki/Q937228","display_name":"Property (philosophy)","level":2,"score":0.35760000348091125},{"id":"https://openalex.org/C2778029271","wikidata":"https://www.wikidata.org/wiki/Q5421931","display_name":"Extension (predicate logic)","level":2,"score":0.3416000008583069},{"id":"https://openalex.org/C117251300","wikidata":"https://www.wikidata.org/wiki/Q1849855","display_name":"Parametric statistics","level":2,"score":0.3375999927520752},{"id":"https://openalex.org/C106301342","wikidata":"https://www.wikidata.org/wiki/Q4117933","display_name":"Entropy (arrow of time)","level":2,"score":0.3111000061035156},{"id":"https://openalex.org/C2780069185","wikidata":"https://www.wikidata.org/wiki/Q7977945","display_name":"Equivalence (formal languages)","level":2,"score":0.3073999881744385},{"id":"https://openalex.org/C41065033","wikidata":"https://www.wikidata.org/wiki/Q2825412","display_name":"Adversary","level":2,"score":0.30250000953674316},{"id":"https://openalex.org/C39927690","wikidata":"https://www.wikidata.org/wiki/Q11197","display_name":"Logarithm","level":2,"score":0.3012999892234802},{"id":"https://openalex.org/C185429906","wikidata":"https://www.wikidata.org/wiki/Q1130160","display_name":"Estimator","level":2,"score":0.3005000054836273},{"id":"https://openalex.org/C2780428219","wikidata":"https://www.wikidata.org/wiki/Q16952335","display_name":"Cover (algebra)","level":2,"score":0.2978000044822693},{"id":"https://openalex.org/C2780990831","wikidata":"https://www.wikidata.org/wiki/Q319141","display_name":"Conjecture","level":2,"score":0.295199990272522},{"id":"https://openalex.org/C67388219","wikidata":"https://www.wikidata.org/wiki/Q207440","display_name":"Hash table","level":3,"score":0.29249998927116394},{"id":"https://openalex.org/C4679612","wikidata":"https://www.wikidata.org/wiki/Q866298","display_name":"Aggregate (composite)","level":2,"score":0.2797999978065491},{"id":"https://openalex.org/C133358856","wikidata":"https://www.wikidata.org/wiki/Q7395188","display_name":"SWIFFT","level":5,"score":0.2791999876499176},{"id":"https://openalex.org/C165064840","wikidata":"https://www.wikidata.org/wiki/Q1321061","display_name":"Matching (statistics)","level":2,"score":0.2635999917984009},{"id":"https://openalex.org/C128669082","wikidata":"https://www.wikidata.org/wiki/Q583461","display_name":"Randomized algorithm","level":2,"score":0.26339998841285706},{"id":"https://openalex.org/C47750902","wikidata":"https://www.wikidata.org/wiki/Q1557574","display_name":"Key size","level":4,"score":0.26170000433921814}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1007/978-981-95-5125-5_9","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-981-95-5125-5_9","pdf_url":null,"source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},{"id":"pmh:oai:pure.tue.nl:publications/ddfa2d83-9a85-4543-9d89-46a98dfd8c9f","is_oa":false,"landing_page_url":"https://research.tue.nl/en/publications/ddfa2d83-9a85-4543-9d89-46a98dfd8c9f","pdf_url":null,"source":{"id":"https://openalex.org/S4406922641","display_name":"TU/e Research Portal","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"H\u00fclsing, A, Kudinov, M & Majenz, C 2025, Hybrid-Query Bounds with\u00a0Partial Input Control Framework and\u00a0Application to\u00a0Tight M-eTCR. in G Hanaoka & B-Y Yang (eds), Advances in Cryptology - ASIACRYPT 2025 : 31st International Conference on the Theory and Application of Cryptology and Information Security, Melbourne, VIC, Australia, December 8\u201312, 2025, Proceedings. vol. VIII, Lecture Notes in Computer Science (LNCS), vol. 16252, Springer, Singapore, pp. 256-286, 31st Annual International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2025, Melbourne, Australia, 8/12/25. https://doi.org/10.1007/978-981-95-5125-5_9","raw_type":"info:eu-repo/semantics/publishedVersion"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":24,"referenced_works":["https://openalex.org/W1480477462","https://openalex.org/W1512933114","https://openalex.org/W1589034595","https://openalex.org/W1656678770","https://openalex.org/W2002930326","https://openalex.org/W2006290558","https://openalex.org/W2038761522","https://openalex.org/W2052267638","https://openalex.org/W2084652510","https://openalex.org/W2112553910","https://openalex.org/W2156186849","https://openalex.org/W2294833833","https://openalex.org/W2901529572","https://openalex.org/W2968763694","https://openalex.org/W2987483625","https://openalex.org/W3097686387","https://openalex.org/W3107498632","https://openalex.org/W4232836212","https://openalex.org/W4312620128","https://openalex.org/W4312971297","https://openalex.org/W4395698854","https://openalex.org/W4401602366","https://openalex.org/W4409253694","https://openalex.org/W7076054439"],"related_works":[],"abstract_inverted_index":null,"counts_by_year":[],"updated_date":"2025-12-08T23:20:48.110394","created_date":"2025-12-07T00:00:00"}
