{"id":"https://openalex.org/W2983439871","doi":"https://doi.org/10.1145/3338500.3360333","title":"On the Security of RSA-PSS in the Wild","display_name":"On the Security of RSA-PSS in the Wild","publication_year":2019,"publication_date":"2019-11-07","ids":{"openalex":"https://openalex.org/W2983439871","doi":"https://doi.org/10.1145/3338500.3360333","mag":"2983439871"},"language":"en","primary_location":{"id":"doi:10.1145/3338500.3360333","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3338500.3360333","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 5th ACM Workshop on Security Standardisation Research Workshop","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5090031971","display_name":"Saqib A. Kakvi","orcid":"https://orcid.org/0000-0003-4425-4240"},"institutions":[{"id":"https://openalex.org/I167360494","display_name":"University of Wuppertal","ror":"https://ror.org/00613ak93","country_code":"DE","type":"education","lineage":["https://openalex.org/I167360494"]}],"countries":["DE"],"is_corresponding":true,"raw_author_name":"Saqib A. Kakvi","raw_affiliation_strings":["University of Wuppertal, Wuppertal, Germany"],"affiliations":[{"raw_affiliation_string":"University of Wuppertal, Wuppertal, Germany","institution_ids":["https://openalex.org/I167360494"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5090031971"],"corresponding_institution_ids":["https://openalex.org/I167360494"],"apc_list":null,"apc_paid":null,"fwci":0.28,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.66532478,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"23","last_page":"34"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11693","display_name":"Cryptography and Residue Arithmetic","score":0.9947999715805054,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10720","display_name":"Complexity and Algorithms in Graphs","score":0.9902999997138977,"subfield":{"id":"https://openalex.org/subfields/1703","display_name":"Computational Theory and Mathematics"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6739873886108398},{"id":"https://openalex.org/keywords/mathematical-proof","display_name":"Mathematical proof","score":0.5896161794662476},{"id":"https://openalex.org/keywords/hash-function","display_name":"Hash function","score":0.539857029914856},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.5203549265861511},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.5067372918128967},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.4676731526851654},{"id":"https://openalex.org/keywords/context","display_name":"Context (archaeology)","score":0.4304659962654114},{"id":"https://openalex.org/keywords/signature","display_name":"Signature (topology)","score":0.4273243546485901},{"id":"https://openalex.org/keywords/digital-signature","display_name":"Digital signature","score":0.41495001316070557},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.36850711703300476},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.27865880727767944},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.09277835488319397}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6739873886108398},{"id":"https://openalex.org/C108710211","wikidata":"https://www.wikidata.org/wiki/Q11538","display_name":"Mathematical proof","level":2,"score":0.5896161794662476},{"id":"https://openalex.org/C99138194","wikidata":"https://www.wikidata.org/wiki/Q183427","display_name":"Hash function","level":2,"score":0.539857029914856},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.5203549265861511},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.5067372918128967},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.4676731526851654},{"id":"https://openalex.org/C2779343474","wikidata":"https://www.wikidata.org/wiki/Q3109175","display_name":"Context (archaeology)","level":2,"score":0.4304659962654114},{"id":"https://openalex.org/C2779696439","wikidata":"https://www.wikidata.org/wiki/Q7512811","display_name":"Signature (topology)","level":2,"score":0.4273243546485901},{"id":"https://openalex.org/C118463975","wikidata":"https://www.wikidata.org/wiki/Q220849","display_name":"Digital signature","level":3,"score":0.41495001316070557},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.36850711703300476},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.27865880727767944},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.09277835488319397},{"id":"https://openalex.org/C151730666","wikidata":"https://www.wikidata.org/wiki/Q7205","display_name":"Paleontology","level":1,"score":0.0},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3338500.3360333","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3338500.3360333","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 5th ACM Workshop on Security Standardisation Research Workshop","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/17","score":0.4399999976158142,"display_name":"Partnerships for the goals"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":30,"referenced_works":["https://openalex.org/W6801964","https://openalex.org/W207538773","https://openalex.org/W298908593","https://openalex.org/W1568436295","https://openalex.org/W1604930642","https://openalex.org/W1623551255","https://openalex.org/W1681309784","https://openalex.org/W1788164537","https://openalex.org/W1805549252","https://openalex.org/W1809974132","https://openalex.org/W1817126074","https://openalex.org/W1827890996","https://openalex.org/W1886381013","https://openalex.org/W1963094505","https://openalex.org/W1966284004","https://openalex.org/W1980471700","https://openalex.org/W2052267638","https://openalex.org/W2101040389","https://openalex.org/W2105209441","https://openalex.org/W2152783950","https://openalex.org/W2158276883","https://openalex.org/W2162048617","https://openalex.org/W2162653919","https://openalex.org/W2340481244","https://openalex.org/W2409148419","https://openalex.org/W2607790354","https://openalex.org/W2724229234","https://openalex.org/W2765461951","https://openalex.org/W2949344334","https://openalex.org/W4250179531"],"related_works":["https://openalex.org/W2149234266","https://openalex.org/W2390942931","https://openalex.org/W1932157736","https://openalex.org/W1981680180","https://openalex.org/W4235108210","https://openalex.org/W2350215162","https://openalex.org/W2033963098","https://openalex.org/W2017125388","https://openalex.org/W1601957798","https://openalex.org/W2382634619"],"abstract_inverted_index":{"The":[0,124],"RSA":[1,29],"Probabilistic":[2],"Signature":[3],"Scheme":[4],"(RSA-PSS)":[5],"due":[6],"to":[7,73,101,231],"Bellare":[8,35],"and":[9,36,41,60,89,104,147,197,240,253],"Rogaway":[10,37],"(EUROCRYPT":[11,62],"1996)":[12],"is":[13,22,83,120,128,159,237],"a":[14,23,242],"widely":[15],"deployed":[16],"signature":[17,112],"scheme.":[18],"In":[19],"particular":[20],"it":[21,47],"suggested":[24],"replacement":[25],"for":[26,139],"the":[27,79,122,156,162,167,176,186,209,220,262,266],"deterministic":[28],"Full":[30],"Domain":[31],"Hash":[32],"(RSA-FDH)":[33],"by":[34,58,194],"(ACM":[38,91,199],"CCS":[39,92,200],"1993)":[40],"PKCS#":[42],"v1.5":[43,97,134,149,251],"(RFC":[44],"2313),":[45],"as":[46],"can":[48,257],"provide":[49],"stronger":[50],"security":[51,72,100,169,177,243],"guarantees.":[52],"It":[53,202],"has":[54],"since":[55],"been":[56],"shown":[57],"Kavki":[59],"Kiltz":[61],"2012,":[63],"Journal":[64],"of":[65,75,141,178,182,188,212,249,265],"Cryptology":[66],"2018)":[67,93],"that":[68,74,95,129,206,233,245,248,254],"RSA-FDH":[69,103],"provides":[70],"similar":[71],"RSA-PSS,":[76],"also":[77],"in":[78,114,117,130,185,224],"case":[80,127],"when":[81],"RSA-PSS":[82,146,213],"not":[84,121],"randomized.":[85],"Recently,":[86],"Jager,":[87],"Kakvi":[88],"May":[90],"showed":[94],"PKCS#1":[96,133,148],"gives":[98],"comparable":[99],"both":[102,145,255],"RSA-PSS.":[105],"However,":[106],"all":[107,225],"these":[108],"proofs":[109,170],"consider":[110,208],"each":[111],"scheme":[113,222],"isolation,":[115],"where":[116],"practice":[118],"this":[119,179,234],"case.":[123],"most":[125],"interesting":[126],"TLS":[131],"1.3,":[132],"signatures":[135,150,252],"are":[136,151,229,269],"still":[137],"included":[138],"reasons":[140],"backwards":[142],"compatibility,":[143],"meaning":[144],"implemented.":[152],"To":[153],"save":[154],"space,":[155],"key":[157,183],"material":[158,184],"shared":[160],"between":[161],"two":[163],"schemes,":[164],"which":[165,191,217],"means":[166],"aforementioned":[168],"no":[171],"longer":[172],"apply.":[173],"We":[174,228],"investigate":[175],"joint":[180,235],"usage":[181,236],"context":[187],"Sibling":[189],"Signatures,":[190],"were":[192],"introduced":[193],"Camenisch,":[195],"Drijvers,":[196],"Dubovitskaya":[198],"2017).":[201],"must":[203],"be":[204,258],"noted":[205],"we":[207],"standardised":[210],"version":[211],"(IEEE":[214],"Standard":[215],"P1363-2000),":[216],"deviates":[218],"from":[219],"original":[221],"considered":[223],"previous":[226],"papers.":[227],"able":[230],"show":[232],"indeed":[238],"secure,":[239],"achieves":[241],"level":[244],"closely":[246],"matches":[247],"PKCS\\#1":[250],"schemes":[256],"safely":[259],"used,":[260],"if":[261],"output":[263],"lengths":[264],"hash":[267],"functions":[268],"chosen":[270],"appropriately.":[271]},"counts_by_year":[{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
