{"id":"https://openalex.org/W3211925927","doi":"https://doi.org/10.1109/redundancy52534.2021.9606457","title":"Eliminating Broadband Covert Channels in DSA-Like Signatures","display_name":"Eliminating Broadband Covert Channels in DSA-Like Signatures","publication_year":2021,"publication_date":"2021-10-25","ids":{"openalex":"https://openalex.org/W3211925927","doi":"https://doi.org/10.1109/redundancy52534.2021.9606457","mag":"3211925927"},"language":"en","primary_location":{"id":"doi:10.1109/redundancy52534.2021.9606457","is_oa":false,"landing_page_url":"https://doi.org/10.1109/redundancy52534.2021.9606457","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2021 XVII International Symposium \"Problems of Redundancy in Information and Control Systems\" (REDUNDANCY)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5110807399","display_name":"Andrey Fionov","orcid":null},"institutions":[{"id":"https://openalex.org/I4210155925","display_name":"Siberian State University Geosystems and Technology","ror":"https://ror.org/04t6tw838","country_code":"RU","type":"education","lineage":["https://openalex.org/I4210155925"]}],"countries":["RU"],"is_corresponding":true,"raw_author_name":"Andrey Fionov","raw_affiliation_strings":["Siberian State University of Telecommunications and Information Sciences, Federal Research Center for Information and Computation Technologies, Siberian State University of Geosystems and Technologies, Novosibirsk, Russia"],"affiliations":[{"raw_affiliation_string":"Siberian State University of Telecommunications and Information Sciences, Federal Research Center for Information and Computation Technologies, Siberian State University of Geosystems and Technologies, Novosibirsk, Russia","institution_ids":["https://openalex.org/I4210155925"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5085200068","display_name":"Alexandr Klevtsov","orcid":null},"institutions":[{"id":"https://openalex.org/I4210155925","display_name":"Siberian State University Geosystems and Technology","ror":"https://ror.org/04t6tw838","country_code":"RU","type":"education","lineage":["https://openalex.org/I4210155925"]}],"countries":["RU"],"is_corresponding":false,"raw_author_name":"Alexandr Klevtsov","raw_affiliation_strings":["Siberian State University of Geosystems and Technologies, Novosibirsk, Russia"],"affiliations":[{"raw_affiliation_string":"Siberian State University of Geosystems and Technologies, Novosibirsk, Russia","institution_ids":["https://openalex.org/I4210155925"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5110807399"],"corresponding_institution_ids":["https://openalex.org/I4210155925"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.16467564,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"22","issue":null,"first_page":"45","last_page":"48"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7491415143013},{"id":"https://openalex.org/keywords/covert-channel","display_name":"Covert channel","score":0.7175918817520142},{"id":"https://openalex.org/keywords/narrowband","display_name":"Narrowband","score":0.7082498073577881},{"id":"https://openalex.org/keywords/digital-signature","display_name":"Digital signature","score":0.6686714887619019},{"id":"https://openalex.org/keywords/covert","display_name":"Covert","score":0.6652998924255371},{"id":"https://openalex.org/keywords/channel","display_name":"Channel (broadcasting)","score":0.635947585105896},{"id":"https://openalex.org/keywords/broadband","display_name":"Broadband","score":0.6269714832305908},{"id":"https://openalex.org/keywords/signature","display_name":"Signature (topology)","score":0.621476948261261},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.5547571778297424},{"id":"https://openalex.org/keywords/transmission","display_name":"Transmission (telecommunications)","score":0.49765732884407043},{"id":"https://openalex.org/keywords/digital-signature-algorithm","display_name":"Digital Signature Algorithm","score":0.4783734381198883},{"id":"https://openalex.org/keywords/broadband-networks","display_name":"Broadband networks","score":0.41696053743362427},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3632773458957672},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.2942435145378113},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.09098851680755615}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7491415143013},{"id":"https://openalex.org/C29024540","wikidata":"https://www.wikidata.org/wiki/Q1476964","display_name":"Covert channel","level":5,"score":0.7175918817520142},{"id":"https://openalex.org/C2776096036","wikidata":"https://www.wikidata.org/wiki/Q1140483","display_name":"Narrowband","level":2,"score":0.7082498073577881},{"id":"https://openalex.org/C118463975","wikidata":"https://www.wikidata.org/wiki/Q220849","display_name":"Digital signature","level":3,"score":0.6686714887619019},{"id":"https://openalex.org/C2779338814","wikidata":"https://www.wikidata.org/wiki/Q5179285","display_name":"Covert","level":2,"score":0.6652998924255371},{"id":"https://openalex.org/C127162648","wikidata":"https://www.wikidata.org/wiki/Q16858953","display_name":"Channel (broadcasting)","level":2,"score":0.635947585105896},{"id":"https://openalex.org/C509933004","wikidata":"https://www.wikidata.org/wiki/Q194163","display_name":"Broadband","level":2,"score":0.6269714832305908},{"id":"https://openalex.org/C2779696439","wikidata":"https://www.wikidata.org/wiki/Q7512811","display_name":"Signature (topology)","level":2,"score":0.621476948261261},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.5547571778297424},{"id":"https://openalex.org/C761482","wikidata":"https://www.wikidata.org/wiki/Q118093","display_name":"Transmission (telecommunications)","level":2,"score":0.49765732884407043},{"id":"https://openalex.org/C202424057","wikidata":"https://www.wikidata.org/wiki/Q1224829","display_name":"Digital Signature Algorithm","level":4,"score":0.4783734381198883},{"id":"https://openalex.org/C125599584","wikidata":"https://www.wikidata.org/wiki/Q15057100","display_name":"Broadband networks","level":3,"score":0.41696053743362427},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3632773458957672},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.2942435145378113},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.09098851680755615},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0},{"id":"https://openalex.org/C103377522","wikidata":"https://www.wikidata.org/wiki/Q3493999","display_name":"Security information and event management","level":4,"score":0.0},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.0},{"id":"https://openalex.org/C99138194","wikidata":"https://www.wikidata.org/wiki/Q183427","display_name":"Hash function","level":2,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C184842701","wikidata":"https://www.wikidata.org/wiki/Q370563","display_name":"Cloud computing security","level":3,"score":0.0},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/redundancy52534.2021.9606457","is_oa":false,"landing_page_url":"https://doi.org/10.1109/redundancy52534.2021.9606457","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2021 XVII International Symposium \"Problems of Redundancy in Information and Control Systems\" (REDUNDANCY)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.6000000238418579}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":7,"referenced_works":["https://openalex.org/W314733515","https://openalex.org/W1981386223","https://openalex.org/W2108834246","https://openalex.org/W2116967855","https://openalex.org/W2143227080","https://openalex.org/W2915352631","https://openalex.org/W6645569672"],"related_works":["https://openalex.org/W2409612194","https://openalex.org/W4224042389","https://openalex.org/W1568579691","https://openalex.org/W20460883","https://openalex.org/W174282171","https://openalex.org/W1587013156","https://openalex.org/W2392378177","https://openalex.org/W3177125027","https://openalex.org/W2365022962","https://openalex.org/W2383048426"],"abstract_inverted_index":{"The":[0,29],"Digital":[1],"Signature":[2],"Algorithm":[3],"(DSA)":[4],"is":[5,90,115],"a":[6,9,20,51,71,87,105],"representative":[7],"of":[8,11,22,31,53,63,70,81,92,125],"family":[10],"digital":[12],"signature":[13,112],"algorithms":[14],"that":[15,89],"are":[16,50],"known":[17,83],"to":[18,40,59,117],"have":[19],"number":[21],"subliminal":[23],"channels":[24,33],"for":[25,122],"covert":[26,99,127],"data":[27],"transmission.":[28],"capacity":[30],"these":[32],"stretches":[34],"from":[35],"several":[36],"bits":[37,45],"(narrowband":[38],"channels)":[39],"about":[41],"256":[42],"or":[43],"so":[44],"(a":[46],"broadband":[47,65,98],"channel).":[48],"There":[49],"couple":[52],"methods":[54,84],"described":[55],"in":[56,111],"the":[57,61,64,68,74,82,93,97,123,126],"literature":[58],"prevent":[60],"usage":[62],"channel":[66],"with":[67],"help":[69],"warden.":[72],"In":[73],"present":[75],"paper,":[76],"we":[77],"discuss":[78],"some":[79],"weaknesses":[80,94],"and":[85,95,114],"suggest":[86],"solution":[88,102],"free":[91],"eliminates":[96],"channel.":[100],"Our":[101],"also":[103],"requires":[104],"warden":[106],"who":[107],"does":[108],"not":[109],"participate":[110],"generation":[113],"able":[116],"check":[118],"any":[119],"signed":[120],"message":[121],"absence":[124],"communication.":[128]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
