{"id":"https://openalex.org/W4365934937","doi":"https://doi.org/10.1007/978-3-031-30589-4_7","title":"Caveat Implementor! Key Recovery Attacks on\u00a0MEGA","display_name":"Caveat Implementor! Key Recovery Attacks on\u00a0MEGA","publication_year":2023,"publication_date":"2023-01-01","ids":{"openalex":"https://openalex.org/W4365934937","doi":"https://doi.org/10.1007/978-3-031-30589-4_7"},"language":"en","primary_location":{"id":"doi:10.1007/978-3-031-30589-4_7","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-031-30589-4_7","pdf_url":null,"source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},"type":"book-chapter","indexed_in":["crossref","datacite"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://kclpure.kcl.ac.uk/portal/en/publications/3d9d830b-1c0c-4451-b757-08bb52e749c8","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5066696423","display_name":"M. Albrecht","orcid":"https://orcid.org/0000-0003-1835-052X"},"institutions":[{"id":"https://openalex.org/I183935753","display_name":"King's College London","ror":"https://ror.org/0220mzb33","country_code":"GB","type":"education","lineage":["https://openalex.org/I124357947","https://openalex.org/I183935753"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Martin R. Albrecht","raw_affiliation_strings":["King\u2019s College London, London, UK","King's College London, London, UK"],"affiliations":[{"raw_affiliation_string":"King\u2019s College London, London, UK","institution_ids":["https://openalex.org/I183935753"]},{"raw_affiliation_string":"King's College London, London, UK","institution_ids":["https://openalex.org/I183935753"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5039065303","display_name":"Miro Haller","orcid":"https://orcid.org/0000-0001-8796-5064"},"institutions":[{"id":"https://openalex.org/I35440088","display_name":"ETH Zurich","ror":"https://ror.org/05a28rw58","country_code":"CH","type":"education","lineage":["https://openalex.org/I2799323385","https://openalex.org/I35440088"]}],"countries":["CH"],"is_corresponding":false,"raw_author_name":"Miro Haller","raw_affiliation_strings":["Applied Cryptography Group, ETH Zurich, Zurich, Switzerland"],"affiliations":[{"raw_affiliation_string":"Applied Cryptography Group, ETH Zurich, Zurich, Switzerland","institution_ids":["https://openalex.org/I35440088"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5021787921","display_name":"Lenka Marekov\u00e1","orcid":"https://orcid.org/0000-0001-8616-4150"},"institutions":[{"id":"https://openalex.org/I184558857","display_name":"Royal Holloway University of London","ror":"https://ror.org/04g2vpn86","country_code":"GB","type":"education","lineage":["https://openalex.org/I124357947","https://openalex.org/I184558857"]}],"countries":["GB"],"is_corresponding":true,"raw_author_name":"Lenka Marekov\u00e1","raw_affiliation_strings":["Information Security Group, Royal Holloway, University of London, London, UK"],"affiliations":[{"raw_affiliation_string":"Information Security Group, Royal Holloway, University of London, London, UK","institution_ids":["https://openalex.org/I184558857"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5072987600","display_name":"Kenneth G. Paterson","orcid":"https://orcid.org/0000-0002-5145-4489"},"institutions":[{"id":"https://openalex.org/I35440088","display_name":"ETH Zurich","ror":"https://ror.org/05a28rw58","country_code":"CH","type":"education","lineage":["https://openalex.org/I2799323385","https://openalex.org/I35440088"]}],"countries":["CH"],"is_corresponding":false,"raw_author_name":"Kenneth G. Paterson","raw_affiliation_strings":["Applied Cryptography Group, ETH Zurich, Zurich, Switzerland"],"affiliations":[{"raw_affiliation_string":"Applied Cryptography Group, ETH Zurich, Zurich, Switzerland","institution_ids":["https://openalex.org/I35440088"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5021787921"],"corresponding_institution_ids":["https://openalex.org/I184558857"],"apc_list":{"value":5000,"currency":"EUR","value_usd":5392},"apc_paid":null,"fwci":3.1994,"has_fulltext":false,"cited_by_count":6,"citation_normalized_percentile":{"value":0.92306066,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":95,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"190","last_page":"218"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9988999962806702,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9987999796867371,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7798420190811157},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6283949613571167},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.60848069190979},{"id":"https://openalex.org/keywords/mega","display_name":"Mega-","score":0.5817674398422241},{"id":"https://openalex.org/keywords/oracle","display_name":"Oracle","score":0.5735601186752319},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.5540324449539185},{"id":"https://openalex.org/keywords/cryptosystem","display_name":"Cryptosystem","score":0.4694361686706543},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.4677966237068176},{"id":"https://openalex.org/keywords/brute-force-attack","display_name":"Brute-force attack","score":0.4671840965747833},{"id":"https://openalex.org/keywords/sanity","display_name":"Sanity","score":0.45577099919319153},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.45552098751068115},{"id":"https://openalex.org/keywords/random-oracle","display_name":"Random oracle","score":0.43245798349380493},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.09443512558937073}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7798420190811157},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6283949613571167},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.60848069190979},{"id":"https://openalex.org/C2781078984","wikidata":"https://www.wikidata.org/wiki/Q107205","display_name":"Mega-","level":2,"score":0.5817674398422241},{"id":"https://openalex.org/C55166926","wikidata":"https://www.wikidata.org/wiki/Q2892946","display_name":"Oracle","level":2,"score":0.5735601186752319},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.5540324449539185},{"id":"https://openalex.org/C6295992","wikidata":"https://www.wikidata.org/wiki/Q976521","display_name":"Cryptosystem","level":3,"score":0.4694361686706543},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.4677966237068176},{"id":"https://openalex.org/C207468940","wikidata":"https://www.wikidata.org/wiki/Q869370","display_name":"Brute-force attack","level":3,"score":0.4671840965747833},{"id":"https://openalex.org/C2777607469","wikidata":"https://www.wikidata.org/wiki/Q2915214","display_name":"Sanity","level":2,"score":0.45577099919319153},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.45552098751068115},{"id":"https://openalex.org/C94284585","wikidata":"https://www.wikidata.org/wiki/Q228184","display_name":"Random oracle","level":4,"score":0.43245798349380493},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.09443512558937073},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C118552586","wikidata":"https://www.wikidata.org/wiki/Q7867","display_name":"Psychiatry","level":1,"score":0.0},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.0},{"id":"https://openalex.org/C1276947","wikidata":"https://www.wikidata.org/wiki/Q333","display_name":"Astronomy","level":1,"score":0.0}],"mesh":[],"locations_count":4,"locations":[{"id":"doi:10.1007/978-3-031-30589-4_7","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-031-30589-4_7","pdf_url":null,"source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},{"id":"pmh:oai:kclpure.kcl.ac.uk:publications/3d9d830b-1c0c-4451-b757-08bb52e749c8","is_oa":true,"landing_page_url":"https://kclpure.kcl.ac.uk/portal/en/publications/3d9d830b-1c0c-4451-b757-08bb52e749c8","pdf_url":null,"source":{"id":"https://openalex.org/S4306400216","display_name":"Research Portal (King's College London)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I183935753","host_organization_name":"King's College London","host_organization_lineage":["https://openalex.org/I183935753"],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Albrecht, M, Haller, M, Marekov\u00e1, L & Paterson, K 2023, Caveat Implementor! Key Recovery Attacks on MEGA. in C Hazay & M Stam (eds), Advances in Cryptology \u2013 EUROCRYPT 2023 - 42nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 14008 LNCS, pp. 190-218. https://doi.org/10.1007/978-3-031-30589-4_7","raw_type":"info:eu-repo/semantics/publishedVersion"},{"id":"pmh:oai:www.research-collection.ethz.ch:20.500.11850/614276","is_oa":true,"landing_page_url":"http://hdl.handle.net/20.500.11850/614276","pdf_url":null,"source":{"id":"https://openalex.org/S4306402302","display_name":"Repository for Publications and Research Data (ETH Zurich)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I35440088","host_organization_name":"ETH Zurich","host_organization_lineage":["https://openalex.org/I35440088"],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Advances in Cryptology \u2013 EUROCRYPT 2023","raw_type":"info:eu-repo/semantics/acceptedVersion"},{"id":"doi:10.3929/ethz-b-000614276","is_oa":true,"landing_page_url":"https://doi.org/10.3929/ethz-b-000614276","pdf_url":null,"source":{"id":"https://openalex.org/S7407051236","display_name":"ETH Z\u00fcrich Research Collection","issn_l":null,"issn":[],"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":null,"raw_source_name":null,"raw_type":"article-journal"}],"best_oa_location":{"id":"pmh:oai:kclpure.kcl.ac.uk:publications/3d9d830b-1c0c-4451-b757-08bb52e749c8","is_oa":true,"landing_page_url":"https://kclpure.kcl.ac.uk/portal/en/publications/3d9d830b-1c0c-4451-b757-08bb52e749c8","pdf_url":null,"source":{"id":"https://openalex.org/S4306400216","display_name":"Research Portal (King's College London)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I183935753","host_organization_name":"King's College London","host_organization_lineage":["https://openalex.org/I183935753"],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Albrecht, M, Haller, M, Marekov\u00e1, L & Paterson, K 2023, Caveat Implementor! Key Recovery Attacks on MEGA. in C Hazay & M Stam (eds), Advances in Cryptology \u2013 EUROCRYPT 2023 - 42nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 14008 LNCS, pp. 190-218. https://doi.org/10.1007/978-3-031-30589-4_7","raw_type":"info:eu-repo/semantics/publishedVersion"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":14,"referenced_works":["https://openalex.org/W10068438","https://openalex.org/W1495253569","https://openalex.org/W1550863203","https://openalex.org/W1602301309","https://openalex.org/W1809974132","https://openalex.org/W2033145856","https://openalex.org/W2147906334","https://openalex.org/W3003637591","https://openalex.org/W3016124431","https://openalex.org/W3102849428","https://openalex.org/W3149570512","https://openalex.org/W4288057802","https://openalex.org/W4384948645","https://openalex.org/W6966753220"],"related_works":["https://openalex.org/W4254131102","https://openalex.org/W2363707454","https://openalex.org/W2319595751","https://openalex.org/W4383823969","https://openalex.org/W3120570282","https://openalex.org/W4237140913","https://openalex.org/W2372667816","https://openalex.org/W623943098","https://openalex.org/W2541942312","https://openalex.org/W1970666118"],"abstract_inverted_index":null,"counts_by_year":[{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":4}],"updated_date":"2026-02-06T02:01:19.302388","created_date":"2025-10-10T00:00:00"}
