{"id":"https://openalex.org/W4220928246","doi":"https://doi.org/10.1007/s10623-022-01019-1","title":"Practical algorithm substitution attack on extractable signatures","display_name":"Practical algorithm substitution attack on extractable signatures","publication_year":2022,"publication_date":"2022-03-05","ids":{"openalex":"https://openalex.org/W4220928246","doi":"https://doi.org/10.1007/s10623-022-01019-1"},"language":"en","primary_location":{"id":"doi:10.1007/s10623-022-01019-1","is_oa":false,"landing_page_url":"https://doi.org/10.1007/s10623-022-01019-1","pdf_url":null,"source":{"id":"https://openalex.org/S81616010","display_name":"Designs Codes and Cryptography","issn_l":"0925-1022","issn":["0925-1022","1573-7586"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Designs, Codes and Cryptography","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5054238314","display_name":"Yi Zhao","orcid":null},"institutions":[{"id":"https://openalex.org/I25355098","display_name":"Chang'an University","ror":"https://ror.org/05mxya461","country_code":"CN","type":"education","lineage":["https://openalex.org/I25355098"]},{"id":"https://openalex.org/I4210136859","display_name":"Xi\u2019an University of Posts and Telecommunications","ror":"https://ror.org/04jn0td46","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210136859"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yi Zhao","raw_affiliation_strings":["School of Cyberspace Security, Xi\u2019an University of Posts and Telecommunications, Xi\u2019an, 710121, China","School of Information Engineering, Chang\u2019an University, Xi\u2019an, 710064, China","School of Information Engineering, Chang\u2019an University, Xi\u2019an, China"],"raw_orcid":"https://orcid.org/0000-0002-0553-113X","affiliations":[{"raw_affiliation_string":"School of Cyberspace Security, Xi\u2019an University of Posts and Telecommunications, Xi\u2019an, 710121, China","institution_ids":["https://openalex.org/I4210136859"]},{"raw_affiliation_string":"School of Information Engineering, Chang\u2019an University, Xi\u2019an, 710064, China","institution_ids":["https://openalex.org/I25355098"]},{"raw_affiliation_string":"School of Information Engineering, Chang\u2019an University, Xi\u2019an, China","institution_ids":["https://openalex.org/I25355098"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5001485404","display_name":"Kaitai Liang","orcid":"https://orcid.org/0000-0003-0262-7678"},"institutions":[{"id":"https://openalex.org/I98358874","display_name":"Delft University of Technology","ror":"https://ror.org/02e2c7k09","country_code":"NL","type":"education","lineage":["https://openalex.org/I98358874"]}],"countries":["NL"],"is_corresponding":false,"raw_author_name":"Kaitai Liang","raw_affiliation_strings":["Faculty of Electrical Engineering, Mathematics & Computer Science, Delft University of Technology, Delft, The Netherlands"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Faculty of Electrical Engineering, Mathematics & Computer Science, Delft University of Technology, Delft, The Netherlands","institution_ids":["https://openalex.org/I98358874"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5035820331","display_name":"Yanqi Zhao","orcid":"https://orcid.org/0000-0002-1023-6549"},"institutions":[{"id":"https://openalex.org/I25355098","display_name":"Chang'an University","ror":"https://ror.org/05mxya461","country_code":"CN","type":"education","lineage":["https://openalex.org/I25355098"]},{"id":"https://openalex.org/I4210136859","display_name":"Xi\u2019an University of Posts and Telecommunications","ror":"https://ror.org/04jn0td46","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210136859"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Yanqi Zhao","raw_affiliation_strings":["School of Cyberspace Security, Xi\u2019an University of Posts and Telecommunications, Xi\u2019an, 710121, China","School of Information Engineering, Chang\u2019an University, Xi\u2019an, 710064, China","School of Cyberspace Security, Xi\u2019an University of Posts and Telecommunications, Xi\u2019an, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"School of Cyberspace Security, Xi\u2019an University of Posts and Telecommunications, Xi\u2019an, 710121, China","institution_ids":["https://openalex.org/I4210136859"]},{"raw_affiliation_string":"School of Information Engineering, Chang\u2019an University, Xi\u2019an, 710064, China","institution_ids":["https://openalex.org/I25355098"]},{"raw_affiliation_string":"School of Cyberspace Security, Xi\u2019an University of Posts and Telecommunications, Xi\u2019an, China","institution_ids":["https://openalex.org/I4210136859"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5000988425","display_name":"Bo Yang","orcid":"https://orcid.org/0000-0002-0419-1209"},"institutions":[{"id":"https://openalex.org/I88830068","display_name":"Shaanxi Normal University","ror":"https://ror.org/0170z8493","country_code":"CN","type":"education","lineage":["https://openalex.org/I88830068"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Bo Yang","raw_affiliation_strings":["School of Computer Science, Shaanxi Normal University, Xi\u2019an, 710062, China","School of Computer Science, Shaanxi Normal University, Xi\u2019an, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"School of Computer Science, Shaanxi Normal University, Xi\u2019an, 710062, China","institution_ids":["https://openalex.org/I88830068"]},{"raw_affiliation_string":"School of Computer Science, Shaanxi Normal University, Xi\u2019an, China","institution_ids":["https://openalex.org/I88830068"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5041408936","display_name":"Yang Ming","orcid":"https://orcid.org/0000-0003-1734-8866"},"institutions":[{"id":"https://openalex.org/I25355098","display_name":"Chang'an University","ror":"https://ror.org/05mxya461","country_code":"CN","type":"education","lineage":["https://openalex.org/I25355098"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yang Ming","raw_affiliation_strings":["School of Information Engineering, Chang\u2019an University, Xi\u2019an, 710064, China","School of Information Engineering, Chang\u2019an University, Xi\u2019an, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"School of Information Engineering, Chang\u2019an University, Xi\u2019an, 710064, China","institution_ids":["https://openalex.org/I25355098"]},{"raw_affiliation_string":"School of Information Engineering, Chang\u2019an University, Xi\u2019an, China","institution_ids":["https://openalex.org/I25355098"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5090517118","display_name":"Emmanouil Panaousis","orcid":null},"institutions":[{"id":"https://openalex.org/I55060895","display_name":"University of Greenwich","ror":"https://ror.org/00bmj0a71","country_code":"GB","type":"education","lineage":["https://openalex.org/I55060895"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Emmanouil Panaousis","raw_affiliation_strings":["School of Computing and Mathematical Sciences, University of Greenwich, London, UK"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"School of Computing and Mathematical Sciences, University of Greenwich, London, UK","institution_ids":["https://openalex.org/I55060895"]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5035820331"],"corresponding_institution_ids":["https://openalex.org/I25355098","https://openalex.org/I4210136859"],"apc_list":{"value":2290,"currency":"EUR","value_usd":2890},"apc_paid":null,"fwci":0.4162,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.66768033,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":96,"max":97},"biblio":{"volume":"90","issue":"4","first_page":"921","last_page":"937"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9983999729156494,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9954000115394592,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7782147526741028},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.6168032884597778},{"id":"https://openalex.org/keywords/elgamal-encryption","display_name":"ElGamal encryption","score":0.6159330606460571},{"id":"https://openalex.org/keywords/signature","display_name":"Signature (topology)","score":0.6018493175506592},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.5301286578178406},{"id":"https://openalex.org/keywords/digital-signature-algorithm","display_name":"Digital Signature Algorithm","score":0.5282099843025208},{"id":"https://openalex.org/keywords/substitution","display_name":"Substitution (logic)","score":0.5267060399055481},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.5258408188819885},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5244988799095154},{"id":"https://openalex.org/keywords/digital-signature","display_name":"Digital signature","score":0.49248775839805603},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.4194735586643219},{"id":"https://openalex.org/keywords/transmission","display_name":"Transmission (telecommunications)","score":0.4102001190185547},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.3529987931251526},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.33215364813804626},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.13090306520462036},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.12011432647705078},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.0762583315372467}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7782147526741028},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.6168032884597778},{"id":"https://openalex.org/C11045955","wikidata":"https://www.wikidata.org/wiki/Q1162410","display_name":"ElGamal encryption","level":4,"score":0.6159330606460571},{"id":"https://openalex.org/C2779696439","wikidata":"https://www.wikidata.org/wiki/Q7512811","display_name":"Signature (topology)","level":2,"score":0.6018493175506592},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.5301286578178406},{"id":"https://openalex.org/C202424057","wikidata":"https://www.wikidata.org/wiki/Q1224829","display_name":"Digital Signature Algorithm","level":4,"score":0.5282099843025208},{"id":"https://openalex.org/C2778220771","wikidata":"https://www.wikidata.org/wiki/Q1522579","display_name":"Substitution (logic)","level":2,"score":0.5267060399055481},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.5258408188819885},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5244988799095154},{"id":"https://openalex.org/C118463975","wikidata":"https://www.wikidata.org/wiki/Q220849","display_name":"Digital signature","level":3,"score":0.49248775839805603},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.4194735586643219},{"id":"https://openalex.org/C761482","wikidata":"https://www.wikidata.org/wiki/Q118093","display_name":"Transmission (telecommunications)","level":2,"score":0.4102001190185547},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.3529987931251526},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.33215364813804626},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.13090306520462036},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.12011432647705078},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.0762583315372467},{"id":"https://openalex.org/C99138194","wikidata":"https://www.wikidata.org/wiki/Q183427","display_name":"Hash function","level":2,"score":0.0},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1007/s10623-022-01019-1","is_oa":false,"landing_page_url":"https://doi.org/10.1007/s10623-022-01019-1","pdf_url":null,"source":{"id":"https://openalex.org/S81616010","display_name":"Designs Codes and Cryptography","issn_l":"0925-1022","issn":["0925-1022","1573-7586"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Designs, Codes and Cryptography","raw_type":"journal-article"},{"id":"pmh:oai:gala.gre.ac.uk:35784","is_oa":false,"landing_page_url":null,"pdf_url":null,"source":{"id":"https://openalex.org/S4306401244","display_name":"Greenwich Academic Literature Archive (University of Greenwich)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I55060895","host_organization_name":"University of Greenwich","host_organization_lineage":["https://openalex.org/I55060895"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"acceptedVersion","is_accepted":true,"is_published":false,"raw_source_name":"","raw_type":"Article"},{"id":"pmh:oai:tudelft.nl:uuid:65f37946-a831-440b-9ec4-6a723766c334","is_oa":false,"landing_page_url":"http://resolver.tudelft.nl/uuid:65f37946-a831-440b-9ec4-6a723766c334","pdf_url":null,"source":{"id":"https://openalex.org/S4306400906","display_name":"Research Repository (Delft University of Technology)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I98358874","host_organization_name":"Delft University of Technology","host_organization_lineage":["https://openalex.org/I98358874"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"journal article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.6899999976158142}],"awards":[{"id":"https://openalex.org/G1405248533","display_name":null,"funder_award_id":"62072054","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G567918762","display_name":null,"funder_award_id":"61802241","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G8125562991","display_name":null,"funder_award_id":"61772326","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G818981834","display_name":null,"funder_award_id":"61802242","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":24,"referenced_works":["https://openalex.org/W177462532","https://openalex.org/W180983570","https://openalex.org/W1484557542","https://openalex.org/W1499713421","https://openalex.org/W1554429124","https://openalex.org/W1558353365","https://openalex.org/W1589176872","https://openalex.org/W1599336840","https://openalex.org/W1646354800","https://openalex.org/W1830579067","https://openalex.org/W1860384618","https://openalex.org/W2014239329","https://openalex.org/W2052267638","https://openalex.org/W2090853363","https://openalex.org/W2162653919","https://openalex.org/W2166462813","https://openalex.org/W2169194339","https://openalex.org/W2219924285","https://openalex.org/W2496543269","https://openalex.org/W2499653921","https://openalex.org/W2532893978","https://openalex.org/W2913756301","https://openalex.org/W3029670809","https://openalex.org/W3121130432"],"related_works":["https://openalex.org/W2392378177","https://openalex.org/W4387407403","https://openalex.org/W2366246135","https://openalex.org/W204258870","https://openalex.org/W2388194153","https://openalex.org/W2383202752","https://openalex.org/W2167666134","https://openalex.org/W1529956849","https://openalex.org/W2391442431","https://openalex.org/W2047421789"],"abstract_inverted_index":null,"counts_by_year":[{"year":2025,"cited_by_count":3}],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2025-10-10T00:00:00"}
