{"id":"https://openalex.org/W2784558226","doi":"https://doi.org/10.1109/mc.2018.1151029","title":"Psst, Can You Keep a Secret?","display_name":"Psst, Can You Keep a Secret?","publication_year":2018,"publication_date":"2018-01-01","ids":{"openalex":"https://openalex.org/W2784558226","doi":"https://doi.org/10.1109/mc.2018.1151029","mag":"2784558226","pmid":"https://pubmed.ncbi.nlm.nih.gov/29576634"},"language":"en","primary_location":{"id":"doi:10.1109/mc.2018.1151029","is_oa":false,"landing_page_url":"https://doi.org/10.1109/mc.2018.1151029","pdf_url":null,"source":{"id":"https://openalex.org/S178916657","display_name":"Computer","issn_l":"0018-9162","issn":["0018-9162","1558-0814"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Computer","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","pubmed"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://www.ncbi.nlm.nih.gov/pmc/articles/5865220","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5013116110","display_name":"Apostol Vassilev","orcid":"https://orcid.org/0000-0002-9081-3042"},"institutions":[{"id":"https://openalex.org/I4210116971","display_name":"Media Working Group","ror":"https://ror.org/02fyfj503","country_code":"US","type":"other","lineage":["https://openalex.org/I4210116971"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Apostol Vassilev","raw_affiliation_strings":["NIST","Research Team Lead in the Security Testing, Validation, and Measurement Group at NIST. He is also chair of the government-industry working group dedicated to modernizing the Cryptographic Module Validation Program through the adoption of advanced machine-based testing methodologies and automation"],"affiliations":[{"raw_affiliation_string":"NIST","institution_ids":[]},{"raw_affiliation_string":"Research Team Lead in the Security Testing, Validation, and Measurement Group at NIST. He is also chair of the government-industry working group dedicated to modernizing the Cryptographic Module Validation Program through the adoption of advanced machine-based testing methodologies and automation","institution_ids":["https://openalex.org/I4210116971"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5036504001","display_name":"Nicky Mouha","orcid":"https://orcid.org/0000-0001-8861-782X"},"institutions":[{"id":"https://openalex.org/I4210103330","display_name":"\u00c9cole Normale Sup\u00e9rieure","ror":"https://ror.org/01dp7jr64","country_code":"BI","type":"education","lineage":["https://openalex.org/I4210103330"]}],"countries":["BI"],"is_corresponding":false,"raw_author_name":"Nicky Mouha","raw_affiliation_strings":["NIST","Guest researcher in the Cryptographic Technology Group at NIST and an associate member of the CASCADE (Construction and Analysis of Systems for Confidentiality and Authenticity of Data and Entities) team of ENS (\u00c9cole normale sup\u00e9rieure) Paris"],"affiliations":[{"raw_affiliation_string":"NIST","institution_ids":[]},{"raw_affiliation_string":"Guest researcher in the Cryptographic Technology Group at NIST and an associate member of the CASCADE (Construction and Analysis of Systems for Confidentiality and Authenticity of Data and Entities) team of ENS (\u00c9cole normale sup\u00e9rieure) Paris","institution_ids":["https://openalex.org/I4210103330"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5014793898","display_name":"Lu\u00eds T. A. N. Brand\u00e3o","orcid":"https://orcid.org/0000-0002-4501-089X"},"institutions":[{"id":"https://openalex.org/I4210160393","display_name":"Advanced Technology Group (Czechia)","ror":"https://ror.org/04v4fdz58","country_code":"CZ","type":"company","lineage":["https://openalex.org/I4210160393"]}],"countries":["CZ"],"is_corresponding":false,"raw_author_name":"Luis Brandao","raw_affiliation_strings":["NIST","Guest researcher in the Cryptographic Technology Group at NIST"],"affiliations":[{"raw_affiliation_string":"NIST","institution_ids":[]},{"raw_affiliation_string":"Guest researcher in the Cryptographic Technology Group at NIST","institution_ids":["https://openalex.org/I4210160393"]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5013116110"],"corresponding_institution_ids":["https://openalex.org/I4210116971"],"apc_list":null,"apc_paid":null,"fwci":0.4887,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.71259287,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":"51","issue":"1","first_page":"94","last_page":"97"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9990000128746033,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8841952085494995},{"id":"https://openalex.org/keywords/implementation","display_name":"Implementation","score":0.7898269891738892},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.7452082633972168},{"id":"https://openalex.org/keywords/robustness","display_name":"Robustness (evolution)","score":0.7289970517158508},{"id":"https://openalex.org/keywords/software-implementation","display_name":"Software implementation","score":0.5458011627197266},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.5391047596931458},{"id":"https://openalex.org/keywords/cryptographic-primitive","display_name":"Cryptographic primitive","score":0.5017807483673096},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.4709756374359131},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.38315004110336304},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3746320605278015},{"id":"https://openalex.org/keywords/computer-engineering","display_name":"Computer engineering","score":0.3329703211784363},{"id":"https://openalex.org/keywords/cryptographic-protocol","display_name":"Cryptographic protocol","score":0.18409574031829834},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.1812668740749359}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8841952085494995},{"id":"https://openalex.org/C26713055","wikidata":"https://www.wikidata.org/wiki/Q245962","display_name":"Implementation","level":2,"score":0.7898269891738892},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.7452082633972168},{"id":"https://openalex.org/C63479239","wikidata":"https://www.wikidata.org/wiki/Q7353546","display_name":"Robustness (evolution)","level":3,"score":0.7289970517158508},{"id":"https://openalex.org/C2983609787","wikidata":"https://www.wikidata.org/wiki/Q10534782","display_name":"Software implementation","level":3,"score":0.5458011627197266},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.5391047596931458},{"id":"https://openalex.org/C15927051","wikidata":"https://www.wikidata.org/wiki/Q246593","display_name":"Cryptographic primitive","level":4,"score":0.5017807483673096},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.4709756374359131},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.38315004110336304},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3746320605278015},{"id":"https://openalex.org/C113775141","wikidata":"https://www.wikidata.org/wiki/Q428691","display_name":"Computer engineering","level":1,"score":0.3329703211784363},{"id":"https://openalex.org/C33884865","wikidata":"https://www.wikidata.org/wiki/Q1254335","display_name":"Cryptographic protocol","level":3,"score":0.18409574031829834},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.1812668740749359},{"id":"https://openalex.org/C55493867","wikidata":"https://www.wikidata.org/wiki/Q7094","display_name":"Biochemistry","level":1,"score":0.0},{"id":"https://openalex.org/C185592680","wikidata":"https://www.wikidata.org/wiki/Q2329","display_name":"Chemistry","level":0,"score":0.0},{"id":"https://openalex.org/C104317684","wikidata":"https://www.wikidata.org/wiki/Q7187","display_name":"Gene","level":2,"score":0.0}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1109/mc.2018.1151029","is_oa":false,"landing_page_url":"https://doi.org/10.1109/mc.2018.1151029","pdf_url":null,"source":{"id":"https://openalex.org/S178916657","display_name":"Computer","issn_l":"0018-9162","issn":["0018-9162","1558-0814"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Computer","raw_type":"journal-article"},{"id":"pmid:29576634","is_oa":false,"landing_page_url":"https://pubmed.ncbi.nlm.nih.gov/29576634","pdf_url":null,"source":{"id":"https://openalex.org/S4306525036","display_name":"PubMed","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I1299303238","host_organization_name":"National Institutes of Health","host_organization_lineage":["https://openalex.org/I1299303238"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Computer","raw_type":null},{"id":"pmh:oai:pubmedcentral.nih.gov:5865220","is_oa":true,"landing_page_url":"https://www.ncbi.nlm.nih.gov/pmc/articles/5865220","pdf_url":null,"source":{"id":"https://openalex.org/S2764455111","display_name":"PubMed Central","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I1299303238","host_organization_name":"National Institutes of Health","host_organization_lineage":["https://openalex.org/I1299303238"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Computer (Long Beach Calif)","raw_type":"Text"}],"best_oa_location":{"id":"pmh:oai:pubmedcentral.nih.gov:5865220","is_oa":true,"landing_page_url":"https://www.ncbi.nlm.nih.gov/pmc/articles/5865220","pdf_url":null,"source":{"id":"https://openalex.org/S2764455111","display_name":"PubMed Central","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I1299303238","host_organization_name":"National Institutes of Health","host_organization_lineage":["https://openalex.org/I1299303238"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Computer (Long Beach Calif)","raw_type":"Text"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":9,"referenced_works":["https://openalex.org/W1873852107","https://openalex.org/W1897761346","https://openalex.org/W2112138431","https://openalex.org/W2170961388","https://openalex.org/W2175377689","https://openalex.org/W2586046457","https://openalex.org/W2686848947","https://openalex.org/W2951084996","https://openalex.org/W6739680232"],"related_works":["https://openalex.org/W2741776607","https://openalex.org/W4388857716","https://openalex.org/W18954787","https://openalex.org/W3138083505","https://openalex.org/W4254460476","https://openalex.org/W2783353176","https://openalex.org/W62555423","https://openalex.org/W4390962791","https://openalex.org/W150283939","https://openalex.org/W2339543721"],"abstract_inverted_index":{"The":[0],"security":[1],"of":[2,12,20],"encrypted":[3],"data":[4],"depends":[5],"not":[6],"only":[7],"on":[8,17],"the":[9,18],"theoretical":[10],"properties":[11],"cryptographic":[13],"primitives":[14],"but":[15],"also":[16],"robustness":[19],"their":[21],"implementations":[22],"in":[23],"software":[24],"and":[25],"hardware.":[26],"Threshold":[27],"cryptography":[28],"introduces":[29],"a":[30],"computational":[31],"paradigm":[32],"that":[33],"enables":[34],"higher":[35],"assurance":[36],"for":[37],"such":[38],"implementations.":[39]},"counts_by_year":[{"year":2020,"cited_by_count":1},{"year":2019,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
