Changes
On August 4, 2023 at 9:28:55 AM UTC, admin:
-
No fields were updated. See the metadata diff for more details.
f | 1 | { | f | 1 | { |
2 | "author": "Hartung, Gunnar", | 2 | "author": "Hartung, Gunnar", | ||
3 | "author_email": "", | 3 | "author_email": "", | ||
4 | "creator_user_id": "17755db4-395a-4b3b-ac09-e8e3484ca700", | 4 | "creator_user_id": "17755db4-395a-4b3b-ac09-e8e3484ca700", | ||
5 | "doi": "10.35097/1180", | 5 | "doi": "10.35097/1180", | ||
6 | "doi_date_published": "2023", | 6 | "doi_date_published": "2023", | ||
7 | "doi_publisher": "", | 7 | "doi_publisher": "", | ||
8 | "doi_status": "True", | 8 | "doi_status": "True", | ||
9 | "groups": [], | 9 | "groups": [], | ||
10 | "id": "30c9c35a-b452-4fa6-b60f-f8aaf9264d81", | 10 | "id": "30c9c35a-b452-4fa6-b60f-f8aaf9264d81", | ||
11 | "isopen": false, | 11 | "isopen": false, | ||
12 | "license_id": "CC BY 4.0 Attribution", | 12 | "license_id": "CC BY 4.0 Attribution", | ||
13 | "license_title": "CC BY 4.0 Attribution", | 13 | "license_title": "CC BY 4.0 Attribution", | ||
14 | "metadata_created": "2023-08-04T08:50:13.939703", | 14 | "metadata_created": "2023-08-04T08:50:13.939703", | ||
t | 15 | "metadata_modified": "2023-08-04T09:04:01.657781", | t | 15 | "metadata_modified": "2023-08-04T09:28:55.317596", |
16 | "name": "rdr-doi-10-35097-1180", | 16 | "name": "rdr-doi-10-35097-1180", | ||
17 | "notes": "Abstract: This publication contains the implementation of | 17 | "notes": "Abstract: This publication contains the implementation of | ||
18 | the attacks on the BM-FssAgg and AR-FssAgg cryptographic signature | 18 | the attacks on the BM-FssAgg and AR-FssAgg cryptographic signature | ||
19 | schemes.\r\nThese attacks were published and presented at the | 19 | schemes.\r\nThese attacks were published and presented at the | ||
20 | Financial Cryptography Conference 2017.\r\nTechnicalRemarks: The | 20 | Financial Cryptography Conference 2017.\r\nTechnicalRemarks: The | ||
21 | implementation is written for the computer algebra System | 21 | implementation is written for the computer algebra System | ||
22 | [SageMath](https://www.sagemath.org).\r\nIt was developed with | 22 | [SageMath](https://www.sagemath.org).\r\nIt was developed with | ||
23 | SageMath version 6.7.\r\n\r\nThe code can be configured by editing the | 23 | SageMath version 6.7.\r\n\r\nThe code can be configured by editing the | ||
24 | variables at the start of the file.\r\nTo run the code, simply execute | 24 | variables at the start of the file.\r\nTo run the code, simply execute | ||
25 | the file with the SageMath interpreter.", | 25 | the file with the SageMath interpreter.", | ||
26 | "num_resources": 0, | 26 | "num_resources": 0, | ||
27 | "num_tags": 6, | 27 | "num_tags": 6, | ||
28 | "orcid": "", | 28 | "orcid": "", | ||
29 | "organization": { | 29 | "organization": { | ||
30 | "approval_status": "approved", | 30 | "approval_status": "approved", | ||
31 | "created": "2023-01-12T13:30:23.238233", | 31 | "created": "2023-01-12T13:30:23.238233", | ||
32 | "description": "RADAR (Research Data Repository) is a | 32 | "description": "RADAR (Research Data Repository) is a | ||
33 | cross-disciplinary repository for archiving and publishing research | 33 | cross-disciplinary repository for archiving and publishing research | ||
34 | data from completed scientific studies and projects. The focus is on | 34 | data from completed scientific studies and projects. The focus is on | ||
35 | research data from subjects that do not yet have their own | 35 | research data from subjects that do not yet have their own | ||
36 | discipline-specific infrastructures for research data management. ", | 36 | discipline-specific infrastructures for research data management. ", | ||
37 | "id": "013c89a9-383c-4200-8baa-0f78bf1d91f9", | 37 | "id": "013c89a9-383c-4200-8baa-0f78bf1d91f9", | ||
38 | "image_url": "radar-logo.svg", | 38 | "image_url": "radar-logo.svg", | ||
39 | "is_organization": true, | 39 | "is_organization": true, | ||
40 | "name": "radar", | 40 | "name": "radar", | ||
41 | "state": "active", | 41 | "state": "active", | ||
42 | "title": "RADAR", | 42 | "title": "RADAR", | ||
43 | "type": "organization" | 43 | "type": "organization" | ||
44 | }, | 44 | }, | ||
45 | "owner_org": "013c89a9-383c-4200-8baa-0f78bf1d91f9", | 45 | "owner_org": "013c89a9-383c-4200-8baa-0f78bf1d91f9", | ||
46 | "private": false, | 46 | "private": false, | ||
47 | "production_year": "2017", | 47 | "production_year": "2017", | ||
48 | "publication_year": "2023", | 48 | "publication_year": "2023", | ||
49 | "publishers": [ | 49 | "publishers": [ | ||
50 | { | 50 | { | ||
51 | "publisher": "Karlsruhe Institute of Technology" | 51 | "publisher": "Karlsruhe Institute of Technology" | ||
52 | } | 52 | } | ||
53 | ], | 53 | ], | ||
54 | "relationships_as_object": [], | 54 | "relationships_as_object": [], | ||
55 | "relationships_as_subject": [], | 55 | "relationships_as_subject": [], | ||
56 | "repository_name": "RADAR (Research Data Repository)", | 56 | "repository_name": "RADAR (Research Data Repository)", | ||
57 | "resources": [], | 57 | "resources": [], | ||
58 | "services_used_list": "", | 58 | "services_used_list": "", | ||
59 | "source_metadata_created": "2023", | 59 | "source_metadata_created": "2023", | ||
60 | "source_metadata_modified": "", | 60 | "source_metadata_modified": "", | ||
61 | "state": "active", | 61 | "state": "active", | ||
62 | "subject_areas": [ | 62 | "subject_areas": [ | ||
63 | { | 63 | { | ||
64 | "subject_area_additional": "", | 64 | "subject_area_additional": "", | ||
65 | "subject_area_name": "Computer Science" | 65 | "subject_area_name": "Computer Science" | ||
66 | } | 66 | } | ||
67 | ], | 67 | ], | ||
68 | "tags": [ | 68 | "tags": [ | ||
69 | { | 69 | { | ||
70 | "display_name": "Attack", | 70 | "display_name": "Attack", | ||
71 | "id": "8c58596a-4199-47fd-87cc-e3868831b91c", | 71 | "id": "8c58596a-4199-47fd-87cc-e3868831b91c", | ||
72 | "name": "Attack", | 72 | "name": "Attack", | ||
73 | "state": "active", | 73 | "state": "active", | ||
74 | "vocabulary_id": null | 74 | "vocabulary_id": null | ||
75 | }, | 75 | }, | ||
76 | { | 76 | { | ||
77 | "display_name": "Cryptanalysis", | 77 | "display_name": "Cryptanalysis", | ||
78 | "id": "2e418db3-6365-44dc-8b8c-f505b0d6a867", | 78 | "id": "2e418db3-6365-44dc-8b8c-f505b0d6a867", | ||
79 | "name": "Cryptanalysis", | 79 | "name": "Cryptanalysis", | ||
80 | "state": "active", | 80 | "state": "active", | ||
81 | "vocabulary_id": null | 81 | "vocabulary_id": null | ||
82 | }, | 82 | }, | ||
83 | { | 83 | { | ||
84 | "display_name": "Digital Signatures", | 84 | "display_name": "Digital Signatures", | ||
85 | "id": "8339a96c-4980-474c-a75c-01888cb72eb0", | 85 | "id": "8339a96c-4980-474c-a75c-01888cb72eb0", | ||
86 | "name": "Digital Signatures", | 86 | "name": "Digital Signatures", | ||
87 | "state": "active", | 87 | "state": "active", | ||
88 | "vocabulary_id": null | 88 | "vocabulary_id": null | ||
89 | }, | 89 | }, | ||
90 | { | 90 | { | ||
91 | "display_name": "Forward Security", | 91 | "display_name": "Forward Security", | ||
92 | "id": "b19b85bc-0f10-4d15-bd17-e9cc9ecb013c", | 92 | "id": "b19b85bc-0f10-4d15-bd17-e9cc9ecb013c", | ||
93 | "name": "Forward Security", | 93 | "name": "Forward Security", | ||
94 | "state": "active", | 94 | "state": "active", | ||
95 | "vocabulary_id": null | 95 | "vocabulary_id": null | ||
96 | }, | 96 | }, | ||
97 | { | 97 | { | ||
98 | "display_name": "FssAgg", | 98 | "display_name": "FssAgg", | ||
99 | "id": "f514576d-ea38-40fd-aaa6-e6fa1114fd7d", | 99 | "id": "f514576d-ea38-40fd-aaa6-e6fa1114fd7d", | ||
100 | "name": "FssAgg", | 100 | "name": "FssAgg", | ||
101 | "state": "active", | 101 | "state": "active", | ||
102 | "vocabulary_id": null | 102 | "vocabulary_id": null | ||
103 | }, | 103 | }, | ||
104 | { | 104 | { | ||
105 | "display_name": "Log Files", | 105 | "display_name": "Log Files", | ||
106 | "id": "37da6640-faff-4532-bc41-ff9b2f19df26", | 106 | "id": "37da6640-faff-4532-bc41-ff9b2f19df26", | ||
107 | "name": "Log Files", | 107 | "name": "Log Files", | ||
108 | "state": "active", | 108 | "state": "active", | ||
109 | "vocabulary_id": null | 109 | "vocabulary_id": null | ||
110 | } | 110 | } | ||
111 | ], | 111 | ], | ||
112 | "title": "Implementation of the attacks on the bm-fssagg and | 112 | "title": "Implementation of the attacks on the bm-fssagg and | ||
113 | ar-fssagg signature schemes", | 113 | ar-fssagg signature schemes", | ||
114 | "type": "vdataset", | 114 | "type": "vdataset", | ||
115 | "url": "https://doi.org/10.35097/1180" | 115 | "url": "https://doi.org/10.35097/1180" | ||
116 | } | 116 | } |