Leakage-Resilient Certificate-Based Signature Resistant to Side-Channel Attacks
Certificate-based cryptography is an attractive public-key setting, and it not only simplifies certificate management in the traditional public-key cryptography but also eliminates the key escrow problem inherent in the identity-based cryptography. Recently, leakage-resilient cryptography resistant...
        Saved in:
      
    
          | Published in | IEEE access Vol. 7; pp. 19041 - 19053 | 
|---|---|
| Main Authors | , , , | 
| Format | Journal Article | 
| Language | English | 
| Published | 
        Piscataway
          IEEE
    
        2019
     The Institute of Electrical and Electronics Engineers, Inc. (IEEE)  | 
| Subjects | |
| Online Access | Get full text | 
| ISSN | 2169-3536 2169-3536  | 
| DOI | 10.1109/ACCESS.2019.2896773 | 
Cover
| Abstract | Certificate-based cryptography is an attractive public-key setting, and it not only simplifies certificate management in the traditional public-key cryptography but also eliminates the key escrow problem inherent in the identity-based cryptography. Recently, leakage-resilient cryptography resistant to side-channel attacks has received significant attention from cryptographic researchers. By side-channel attacks, adversaries could obtain partial information of secret and private keys involved in cryptographic algorithms by perceiving execution time or energy consumptions of each algorithm invocation. The certificate-based signature (CBS) is a class of important public-key signature. Up to date, there exists no leakage-resilient CBS (LR-CBS) scheme resistant to side-channel attacks. In this paper, the first LR-CBS scheme is proposed and it possesses overall unbounded leakage property, namely, it permits adversaries to continuously obtain partial information of secret or private keys involved in the associated algorithm invocations. The security analysis is given to prove that the proposed LR-CBS scheme is existential unforgeability against adaptive chosen-message attacks for adversaries in the generic bilinear group model. | 
    
|---|---|
| AbstractList | Certificate-based cryptography is an attractive public-key setting, and it not only simplifies certificate management in the traditional public-key cryptography but also eliminates the key escrow problem inherent in the identity-based cryptography. Recently, leakage-resilient cryptography resistant to side-channel attacks has received significant attention from cryptographic researchers. By side-channel attacks, adversaries could obtain partial information of secret and private keys involved in cryptographic algorithms by perceiving execution time or energy consumptions of each algorithm invocation. The certificate-based signature (CBS) is a class of important public-key signature. Up to date, there exists no leakage-resilient CBS (LR-CBS) scheme resistant to side-channel attacks. In this paper, the first LR-CBS scheme is proposed and it possesses overall unbounded leakage property, namely, it permits adversaries to continuously obtain partial information of secret or private keys involved in the associated algorithm invocations. The security analysis is given to prove that the proposed LR-CBS scheme is existential unforgeability against adaptive chosen-message attacks for adversaries in the generic bilinear group model. | 
    
| Author | Huang, Sen-Shan Wu, Jui-Di Tseng, Yuh-Min Tsai, Tung-Tso  | 
    
| Author_xml | – sequence: 1 givenname: Jui-Di surname: Wu fullname: Wu, Jui-Di organization: Department of Mathematics, National Changhua University of Education, Changhua, Taiwan – sequence: 2 givenname: Yuh-Min orcidid: 0000-0003-0860-7766 surname: Tseng fullname: Tseng, Yuh-Min email: ymtseng@cc.ncue.edu.tw organization: Department of Mathematics, National Changhua University of Education, Changhua, Taiwan – sequence: 3 givenname: Sen-Shan surname: Huang fullname: Huang, Sen-Shan organization: Department of Mathematics, National Changhua University of Education, Changhua, Taiwan – sequence: 4 givenname: Tung-Tso surname: Tsai fullname: Tsai, Tung-Tso organization: Department of Research, Foxconn, Taipei, Taiwan  | 
    
| BookMark | eNptUV1r2zAUFaWDdm1_QV8Ce3YmWR-WHjPTbYVAYemexbV0nSn17ExSGP33U-YSRpheJA7n496j9-RynEYk5J7RJWPUfFy17cNms6wpM8taG9U0_IJc10yZikuuLv95X5G7lHa0HF0g2VyTpzXCC2yx-oYpDAHHvGgx5tAHBxmrT5DQLzZhO0I-RFwcWSlDYeWpwB6r9geMIw6LVc7gXtItedfDkPDu7b4h3z8_PLdfq_XTl8d2ta6coDpXXcMFdwi-h16CYjXTrvdGOyONY77uuga4ELKDTjkmATQK0fGeet87rpHfkMfZ10-ws_sYfkJ8tRME-xeY4tZCWcMNaIVAKWojvJOd0IiGeSjJDqRqvFJ18RKz12Hcw-tvGIaTIaP22LEF5zAle-zYvnVcZB9m2T5Ovw6Yst1NhziWrW0tpFSskTUtLDOzXJxSithbFzLkMI05QhhOCfMvnifwM-35XP9X3c-qgIgnhVacGib4H5z9qkE | 
    
| CODEN | IAECCG | 
    
| CitedBy_id | crossref_primary_10_1109_JSYST_2022_3149186 crossref_primary_10_1109_OJCS_2020_3008961  | 
    
| Cites_doi | 10.1137/060651380 10.15388/Informatica.2016.99 10.1002/sec.1580 10.1049/iet-ifs.2015.0188 10.1007/s10586-013-0253-z 10.1109/ACCESS.2018.2809426 10.1016/j.comnet.2005.01.010 10.1007/s13389-016-0121-x 10.1016/j.jss.2015.05.066 10.1109/TIT.1985.1057074 10.15388/Informatica.2018.161 10.1109/JSYST.2013.2289271 10.1016/j.proeng.2012.01.397 10.1145/2484389.2484394 10.1007/978-3-642-35999-6_4 10.1007/978-3-319-06320-1_31 10.1049/iet-ifs.2016.0261 10.1016/j.jss.2011.08.014 10.1145/359340.359342 10.1007/3-540-39568-7_5 10.1109/FOCS.2010.55 10.1016/j.tcs.2017.10.020 10.1016/j.ins.2016.03.032  | 
    
| ContentType | Journal Article | 
    
| Copyright | Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2019 | 
    
| Copyright_xml | – notice: Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2019 | 
    
| DBID | 97E ESBDL RIA RIE AAYXX CITATION 7SC 7SP 7SR 8BQ 8FD JG9 JQ2 L7M L~C L~D ADTOC UNPAY DOA  | 
    
| DOI | 10.1109/ACCESS.2019.2896773 | 
    
| DatabaseName | IEEE All-Society Periodicals Package (ASPP) 2005–Present IEEE Xplore Open Access Journals IEEE All-Society Periodicals Package (ASPP) 1998–Present IEEE Electronic Library (IEL) CrossRef Computer and Information Systems Abstracts Electronics & Communications Abstracts Engineered Materials Abstracts METADEX Technology Research Database Materials Research Database ProQuest Computer Science Collection Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts  Academic Computer and Information Systems Abstracts Professional Unpaywall for CDI: Periodical Content Unpaywall DOAJ: Directory of Open Access Journals  | 
    
| DatabaseTitle | CrossRef Materials Research Database Engineered Materials Abstracts Technology Research Database Computer and Information Systems Abstracts – Academic Electronics & Communications Abstracts ProQuest Computer Science Collection Computer and Information Systems Abstracts Advanced Technologies Database with Aerospace METADEX Computer and Information Systems Abstracts Professional  | 
    
| DatabaseTitleList | Materials Research Database  | 
    
| Database_xml | – sequence: 1 dbid: DOA name: DOAJ Directory of Open Access Journals url: https://www.doaj.org/ sourceTypes: Open Website – sequence: 2 dbid: RIE name: IEEE Electronic Library (IEL) url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/ sourceTypes: Publisher – sequence: 3 dbid: UNPAY name: Unpaywall url: https://proxy.k.utb.cz/login?url=https://unpaywall.org/ sourceTypes: Open Access Repository  | 
    
| DeliveryMethod | fulltext_linktorsrc | 
    
| Discipline | Engineering | 
    
| EISSN | 2169-3536 | 
    
| EndPage | 19053 | 
    
| ExternalDocumentID | oai_doaj_org_article_44e54294dc5b48ee91daeadca567d662 10.1109/access.2019.2896773 10_1109_ACCESS_2019_2896773 8630914  | 
    
| Genre | orig-research | 
    
| GrantInformation_xml | – fundername: Ministry of Science and Technology, Taiwan grantid: MOST106-2221-E-018-007-MY2 funderid: 10.13039/501100004663  | 
    
| GroupedDBID | 0R~ 4.4 5VS 6IK 97E AAJGR ABAZT ABVLG ACGFS ADBBV AGSQL ALMA_UNASSIGNED_HOLDINGS BCNDV BEFXN BFFAM BGNUA BKEBE BPEOZ EBS EJD ESBDL GROUPED_DOAJ IPLJI JAVBF KQ8 M43 M~E O9- OCL OK1 RIA RIE RNS AAYXX CITATION 7SC 7SP 7SR 8BQ 8FD JG9 JQ2 L7M L~C L~D RIG ADTOC UNPAY  | 
    
| ID | FETCH-LOGICAL-c408t-b7343ceadfaf5a61218cfd98c959c1d2bb7a3445bab6c15aa8e44b3f0ddfc38e3 | 
    
| IEDL.DBID | UNPAY | 
    
| ISSN | 2169-3536 | 
    
| IngestDate | Fri Oct 03 12:51:18 EDT 2025 Tue Aug 19 17:28:05 EDT 2025 Sun Jun 29 16:45:31 EDT 2025 Wed Oct 01 02:58:13 EDT 2025 Thu Apr 24 22:51:56 EDT 2025 Wed Aug 27 03:01:00 EDT 2025  | 
    
| IsDoiOpenAccess | true | 
    
| IsOpenAccess | true | 
    
| IsPeerReviewed | true | 
    
| IsScholarly | true | 
    
| Language | English | 
    
| License | https://ieeexplore.ieee.org/Xplorehelp/downloads/license-information/OAPA.html | 
    
| LinkModel | DirectLink | 
    
| MergedId | FETCHMERGED-LOGICAL-c408t-b7343ceadfaf5a61218cfd98c959c1d2bb7a3445bab6c15aa8e44b3f0ddfc38e3 | 
    
| Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14  | 
    
| ORCID | 0000-0003-0860-7766 | 
    
| OpenAccessLink | https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/ielx7/6287639/8600701/08630914.pdf | 
    
| PQID | 2455617520 | 
    
| PQPubID | 4845423 | 
    
| PageCount | 13 | 
    
| ParticipantIDs | proquest_journals_2455617520 doaj_primary_oai_doaj_org_article_44e54294dc5b48ee91daeadca567d662 crossref_primary_10_1109_ACCESS_2019_2896773 crossref_citationtrail_10_1109_ACCESS_2019_2896773 unpaywall_primary_10_1109_access_2019_2896773 ieee_primary_8630914  | 
    
| ProviderPackageCode | CITATION AAYXX  | 
    
| PublicationCentury | 2000 | 
    
| PublicationDate | 20190000 2019-00-00 20190101 2019-01-01  | 
    
| PublicationDateYYYYMMDD | 2019-01-01 | 
    
| PublicationDate_xml | – year: 2019 text: 20190000  | 
    
| PublicationDecade | 2010 | 
    
| PublicationPlace | Piscataway | 
    
| PublicationPlace_xml | – name: Piscataway | 
    
| PublicationTitle | IEEE access | 
    
| PublicationTitleAbbrev | Access | 
    
| PublicationYear | 2019 | 
    
| Publisher | IEEE The Institute of Electrical and Electronics Engineers, Inc. (IEEE)  | 
    
| Publisher_xml | – name: IEEE – name: The Institute of Electrical and Electronics Engineers, Inc. (IEEE)  | 
    
| References | ref13 gentry (ref8) 2003; 2656 ref12 zhang (ref32) 2009; 5451 ref15 ref36 ref14 alwen (ref27) 2009; 5677 al-riyami (ref5) 2003; 2894 ref2 ref1 ref39 cheng (ref35) 2012; 29 ref17 ref38 ref16 scott (ref41) 2006; 4249 ref19 yuen (ref18) 2012; 7237 liu (ref34) 2011; 6827 scott (ref42) 2011; 7089 ref24 ref26 ref25 ref20 wu (ref23) 2018; 47 ref22 ref21 li (ref30) 2007; 4582 kang (ref29) 2004; 2964 kocher (ref9) 1996; 1109 boneh (ref10) 1997; 1233 ref7 boneh (ref28) 2005; 3494 ref3 wu (ref33) 2009; 15 ref6 kocher (ref11) 1999; 1666 boneh (ref4) 2001; 2139 ref40 liu (ref31) 2008; 5222 hung (ref37) 2015; 45  | 
    
| References_xml | – ident: ref40 doi: 10.1137/060651380 – ident: ref7 doi: 10.15388/Informatica.2016.99 – ident: ref19 doi: 10.1002/sec.1580 – volume: 15 start-page: 1659 year: 2009 ident: ref33 article-title: Certificate-based signatures revisited publication-title: J Universal Comput Sci – volume: 7237 start-page: 117 year: 2012 ident: ref18 article-title: Identity-based encryption resilient to continual auxiliary leakage publication-title: Adv Cryptology – ident: ref38 doi: 10.1049/iet-ifs.2015.0188 – ident: ref13 doi: 10.1007/s10586-013-0253-z – ident: ref20 doi: 10.1109/ACCESS.2018.2809426 – volume: 4249 start-page: 134 year: 2006 ident: ref41 article-title: Implementing cryptographic pairings on smartcards publication-title: Proc CHES – ident: ref12 doi: 10.1016/j.comnet.2005.01.010 – ident: ref14 doi: 10.1007/s13389-016-0121-x – ident: ref24 doi: 10.1016/j.jss.2015.05.066 – volume: 45 start-page: 243 year: 2015 ident: ref37 article-title: A short certificate-based signature scheme with provable security publication-title: Inf Technol Control – ident: ref2 doi: 10.1109/TIT.1985.1057074 – ident: ref22 doi: 10.15388/Informatica.2018.161 – volume: 6827 start-page: 167 year: 2011 ident: ref34 article-title: Short and efficient certificate-based signature publication-title: Proc Netw Workshops – volume: 47 start-page: 286 year: 2018 ident: ref23 article-title: Leakage-resilient certificateless signature under continual leakage model publication-title: Inf Technol Control – ident: ref6 doi: 10.1109/JSYST.2013.2289271 – volume: 5451 start-page: 47 year: 2009 ident: ref32 article-title: On the security of a certificate-based signature scheme and its improvement with pairings publication-title: Proc ISPEC – volume: 7089 start-page: 296 year: 2011 ident: ref42 article-title: On the efficient implementation of pairing-based protocols publication-title: Proc Int Conf Coding Cryptog – volume: 1666 start-page: 388 year: 1999 ident: ref11 article-title: Differential power analysis publication-title: Adv Cryptology – volume: 29 start-page: 2821 year: 2012 ident: ref35 article-title: Cryptanalysis of a certificate-based on signature scheme publication-title: Procedia Eng doi: 10.1016/j.proeng.2012.01.397 – volume: 1109 start-page: 104 year: 1996 ident: ref9 article-title: Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems publication-title: Adv Cryptology – ident: ref21 doi: 10.1145/2484389.2484394 – volume: 4582 start-page: 110 year: 2007 ident: ref30 article-title: Certificate-based signature: security model and efficient construction publication-title: Proc EuroPKI – ident: ref15 doi: 10.1007/978-3-642-35999-6_4 – volume: 2964 start-page: 99 year: 2004 ident: ref29 article-title: A Certificate-based signature scheme publication-title: Proc CT-RSA – ident: ref16 doi: 10.1007/978-3-319-06320-1_31 – ident: ref39 doi: 10.1049/iet-ifs.2016.0261 – ident: ref36 doi: 10.1016/j.jss.2011.08.014 – volume: 5222 start-page: 285 year: 2008 ident: ref31 article-title: Certificate-based signature schemes without pairings or random oracles publication-title: Proc ISCAS – volume: 1233 start-page: 37 year: 1997 ident: ref10 article-title: On the importance of checking cryptographic protocols for faults publication-title: Adv Cryptology – volume: 2656 start-page: 272 year: 2003 ident: ref8 article-title: Certificate-based encryption and the certificate revocation problem publication-title: Adv Cryptology – ident: ref1 doi: 10.1145/359340.359342 – volume: 2139 start-page: 213 year: 2001 ident: ref4 article-title: Identity-based encryption from the Weil pairing publication-title: Adv Cryptology – ident: ref3 doi: 10.1007/3-540-39568-7_5 – volume: 5677 start-page: 36 year: 2009 ident: ref27 article-title: Leakage-resilient public-key cryptography in the bounded-retrieval model publication-title: Adv Cryptology – volume: 3494 start-page: 440 year: 2005 ident: ref28 article-title: Hierarchical identity based encryption with constant size ciphertext publication-title: Adv Cryptology – ident: ref17 doi: 10.1109/FOCS.2010.55 – volume: 2894 start-page: 452 year: 2003 ident: ref5 article-title: Certificateless public key cryptography publication-title: Adv Cryptology – ident: ref26 doi: 10.1016/j.tcs.2017.10.020 – ident: ref25 doi: 10.1016/j.ins.2016.03.032  | 
    
| SSID | ssj0000816957 | 
    
| Score | 2.1744962 | 
    
| Snippet | Certificate-based cryptography is an attractive public-key setting, and it not only simplifies certificate management in the traditional public-key... | 
    
| SourceID | doaj unpaywall proquest crossref ieee  | 
    
| SourceType | Open Website Open Access Repository Aggregation Database Enrichment Source Index Database Publisher  | 
    
| StartPage | 19041 | 
    
| SubjectTerms | Adaptation models Algorithms certificate-based signature Cryptography generic bilinear group model Leakage leakage resilience Public key Random variables Resistance Side-channel attacks  | 
    
| SummonAdditionalLinks | – databaseName: DOAJ: Directory of Open Access Journals dbid: DOA link: http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV1LS8QwEA7iRT2IT6wvevBotG0eTY66KIv4AB_gLeQpi0t3cSvivzfT1mUXQS9eQzqdzEwzM2XmG4SOvDWaZq7ALjp3TIXXOEZFUJbjchaK4AsNieLNLe8_0atn9jwz6gtqwlp44FZwp5R6GKlEnWUmkvIydzqe3mrGS8fb2zcTciaZau5gkXPJyg5mKM_k6VmvF08EtVzyJCYZvCzJnCtqEPu7EStz0ebSezXWnx96OJxxPJdraLWLGNOzltN1tOCrDbQygyO4ie6uvX6NFwO-95PBEDoc0x7US4emwQ2fR0_l0ofBS4vimcIuCArrtB7FZecx9BhUPr6krqHnfgs9XV489vq4m5SALc1EjU1JKLFRLEEHpgEUTNjgpLCSSZu7wphSE0qZ0YbbnGktPKWGhMy5YInwZBstVqPK76A0N4Y4JkSwXFNBpYn5EueeSOFF6ZhJUPEtNGU7GHGYZjFUTTqRSdVKWoGkVSfpBB1PHxq3KBq_bz8HbUy3AgR2sxANQ3WGof4yjARtgi6nRAQnMTaiCdr_1q3qPteJKihMCS1ZkSUIT_X9g1XdzLCcY3X3P1jdQ8tAs_2zs48W67d3fxBjndocNmb9BWrH-e0 priority: 102 providerName: Directory of Open Access Journals – databaseName: IEEE Electronic Library (IEL) dbid: RIE link: http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1Lb9QwEB61vQAHXgU1UFAOHOttEj9iH9sVVYUoSECl3iI_JqjqKlvRrKry6_Ek3qgLCHGLLCe2840zM87MNwDv0DsrilCxEJU7Exoti1YRheWEUrZVi5UlR_Hskzo9Fx8u5MUWHEy5MIg4BJ_hjC6Hf_lh6Vd0VHaoFY_qTWzDdq3VmKs1nadQAQkj60QsVBbm8Gg-j2ug6C0zi26Fqmu-oXwGjv5UVGXDvnyw6q7t3a1dLO6pmpMncLae5BhhcjVb9W7mf_7G3_i_q3gKj5PNmR-NQvIMtrB7Do_uMRHuwuePaK_ip4V9wZvLBeVI5nOKuG6HFDl2HHVdyL9efh95QHPqRWZln_fL2ByQUZZCh3GQvqes_RdwfvL-2_yUpVoLzItC98zVXHAfxaq1rbREK6Z9G4z2Rhpfhsq52nIhpLNO-VJaq1EIx9sihNZzjfwl7HTLDvcgL53jQWrdemWFFsZFj0sp5EajroN0GVRrEBqfiMipHsaiGRySwjQjcg0h1yTkMjiYbroeeTj-3f2Y0J26Eon20BCRaNKebIRAqtYlgpcuSimaMtj4BryVqg5KVRnsEnrTQxJwGeyvZaVJG_6mqQTVGa1lVWTAJvn5Y6p2qIK5MdVXfx_lNTykXuNpzz7s9D9W-CbaP717Owj-L0pxAoc priority: 102 providerName: IEEE  | 
    
| Title | Leakage-Resilient Certificate-Based Signature Resistant to Side-Channel Attacks | 
    
| URI | https://ieeexplore.ieee.org/document/8630914 https://www.proquest.com/docview/2455617520 https://ieeexplore.ieee.org/ielx7/6287639/8600701/08630914.pdf https://doaj.org/article/44e54294dc5b48ee91daeadca567d662  | 
    
| UnpaywallVersion | publishedVersion | 
    
| Volume | 7 | 
    
| hasFullText | 1 | 
    
| inHoldings | 1 | 
    
| isFullTextHit | |
| isPrint | |
| journalDatabaseRights | – providerCode: PRVAFT databaseName: Open Access Digital Library customDbUrl: eissn: 2169-3536 dateEnd: 99991231 omitProxy: true ssIdentifier: ssj0000816957 issn: 2169-3536 databaseCode: KQ8 dateStart: 20130101 isFulltext: true titleUrlDefault: http://grweb.coalliance.org/oadl/oadl.html providerName: Colorado Alliance of Research Libraries – providerCode: PRVAON databaseName: DOAJ Directory of Open Access Journals customDbUrl: eissn: 2169-3536 dateEnd: 99991231 omitProxy: true ssIdentifier: ssj0000816957 issn: 2169-3536 databaseCode: DOA dateStart: 20130101 isFulltext: true titleUrlDefault: https://www.doaj.org/ providerName: Directory of Open Access Journals – providerCode: PRVHPJ databaseName: ROAD: Directory of Open Access Scholarly Resources customDbUrl: eissn: 2169-3536 dateEnd: 99991231 omitProxy: true ssIdentifier: ssj0000816957 issn: 2169-3536 databaseCode: M~E dateStart: 20130101 isFulltext: true titleUrlDefault: https://road.issn.org providerName: ISSN International Centre  | 
    
| link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1Lb9QwELZge0AceBVEoKxy4IizSfyIc9yuqCoEBQErlVPkx6RaNUpXNCsevx6P4111QUKCW2RNkklm7JmxZ74h5CVYo3nuSuq8cadcgabeK8K0HFeItmyh1BgovjuTp0v-5lycxw23UAsDACH5DDK8DGf5K-i-VzNZInhaPVOIqJ4XM--LM2_seLZ27W1yIIX3xSfkYHn2Yf4FO8oVsqYsnE0-j8CaMx16EGI-V535QENWFdszRwG1P7ZZ2fM472z6tf7xTXfdDeNzcp80W7bHnJPLbDOYzP78DdHx_7_rAbkX_dJ0PirSQ3IL-kfk7g20wkPy_i3oS7_80I9wveqwjjJdYFZ2G8ro6LG3hy79tLoYsUJTpELXc0iHKz_sgGIlQw_-JcOAlf2PyfLk9efFKY39GKjluRqoqRhn1qteq1uhEXpM2dbVytaitoUrjak041wYbaQthNYKODeszZ1rLVPAnpBJf9XDU5IWxjAnlGqt1Fzx2vioTEpgtQJVOWESUm7F0tgIVo49M7omBC153cwXC6-hDcqyibJMyKvdTesRq-Pv5Mco7x0pAm2HAS-bJs7bhnPAjl7cWWG8JkNdOO3_gNVCVk7KMiGHKM_dQ6LwEnK01Z4mLgrXTcmxF2klyjwhdKdRf7A6aukeq8_-kf6ITIavG3jh_aXBTMM-wzSUNk7jBPkFg50Snw | 
    
| linkProvider | Unpaywall | 
    
| linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1Lb9QwEB6VcigceBXEQoEcONbbJLYT-9iuqBbYLRK0Um-WHxNUdZWt2qwq-PV4kmzUBYS4RZYdP75xZuzMfAPwHr2zIg05C1G5M6HQsmgVkVtOyGSVV5hbOijOT4rpmfh0Ls-3YH-IhUHE1vkMx_TY_ssPS7-iq7IDVfCo3sQ9uC-FELKL1hpuVCiFhJZlTy2UpfrgcDKJsyD_LT2OB4uiLPmG-mlZ-vu0KhsW5s6qvrI_bu1icUfZHD-G-XqYnY_J5XjVuLH_-RuD4__O4wk86q3O5LATk6ewhfUzeHiHi3AXvszQXsaPC_uKNxcLipJMJuRzXbVBcuwoaruQfLv43jGBJlSLDMsmaZaxOCCjOIUaYydNQ3H7z-Hs-MPpZMr6bAvMi1Q1zJVccB8Fq7KVtEQspnwVtPJaap-F3LnS8rjqzrrCZ9JahUI4XqUhVJ4r5C9gu17W-BKSzDkepFKVL6xQQrt45ioK5FqhKoN0I8jXIBjfU5FTRoyFaY8kqTYdcoaQMz1yI9gfGl11TBz_rn5E6A5ViUa7LYhImH5XGiGQ8nWJ4KWLcoo6CzaugLeyKENR5CPYJfSGl_TAjWBvLSum3_I3JheUabSUeToCNsjPH0O1bR7MjaG--nsv72BnejqfmdnHk8-v4QG16O5-9mC7uV7hm2gNNe5tuwl-AfFWBdQ | 
    
| linkToUnpaywall | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1Lj9MwELage0AceC2IwIJy4IjTJH7EPnYrVisECwIqLafIjzGqtspWbCoevx5P4lZbkJDgFlmTxMk3zszEM98Q8gKcNbz0NfXRuFOuwNDoFWFajq9EqAPUBgPFt2fydMFfn4vz9MNtqIUBgCH5DAo8HPbyl7D63kxljeRpeqqQUb2sptEXZ9HY8WLtw01yIEX0xSfkYHH2fvYZO8pVUlM27E0-TcSaUzP0IMR8Ll3EQEM2DdszRwNrf2qzsudx3tp0a_Pjm1mtrhmfk7uk3U57zDm5KDa9LdzP3xgd__-57pE7yS_NZ6Mi3Sc3oHtAbl9jKzwk796AuYifH_oBrpYrrKPM55iVHYYyOnoc7aHPPy6_jFyhOUqh69nn_WUc9kCxkqGDeJO-x8r-h2Rx8urT_JSmfgzU8VL11DaMMxdVL5ggDFKPKRe8Vk4L7SpfW9sYxrmwxkpXCWMUcG5ZKL0Pjilgj8iku-zgMckra5kXSgUnDVdc2xiVSQlMK1CNFzYj9RaW1iWycuyZsWqHoKXU7Ww-jxraIpZtwjIjL3cnrUeujr-LHyPeO1Ek2h4GIjZtWrct54Advbh3wkZNBl15E9-AM0I2Xso6I4eI5-4iCbyMHG21p00fhau25tiLtBF1mRG606g_pjpq6d5Un_yj_BGZ9F838Cz6S719nhbFL7V8EKk | 
    
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Leakage-Resilient+Certificate-Based+Signature+Resistant+to+Side-Channel+Attacks&rft.jtitle=IEEE+access&rft.au=Wu%2C+Jui-Di&rft.au=Tseng%2C+Yuh-Min&rft.au=Huang%2C+Sen-Shan&rft.au=Tsai%2C+Tung-Tso&rft.date=2019&rft.issn=2169-3536&rft.eissn=2169-3536&rft.volume=7&rft.spage=19041&rft.epage=19053&rft_id=info:doi/10.1109%2FACCESS.2019.2896773&rft.externalDBID=n%2Fa&rft.externalDocID=10_1109_ACCESS_2019_2896773 | 
    
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2169-3536&client=summon | 
    
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2169-3536&client=summon | 
    
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2169-3536&client=summon |