{"schema":"https://pith.science/schemas/pith-integrity/v1.json","pith_number":"2605.08259","arxiv_id":"2605.08259","integrity":{"available":true,"endpoint":"/pith/2605.08259/integrity.json","summary":{"critical":0,"advisory":1,"informational":0,"by_detector":{"doi_compliance":{"total":1,"critical":0,"advisory":1,"informational":0}}},"clean":false,"detectors_run":[{"name":"claim_evidence","version":"1.0.0","status":"completed","ran_at":"2026-05-20T11:42:03.470747Z","findings_count":0},{"name":"ai_meta_artifact","version":"1.0.0","status":"completed","ran_at":"2026-05-20T06:39:08.112526Z","findings_count":0},{"name":"doi_title_agreement","version":"1.0.0","status":"completed","ran_at":"2026-05-19T17:31:19.140773Z","findings_count":0},{"name":"doi_compliance","version":"1.0.0","status":"completed","ran_at":"2026-05-19T12:12:29.722708Z","findings_count":1}],"findings":[{"detector":"doi_compliance","finding_type":"recoverable_identifier","severity":"advisory","verdict_class":"incontrovertible","note":"DOI in the printed bibliography is fragmented by whitespace or line breaks. A longer candidate (10.1007/978−3−540−24676−37) was visible in the surrounding text but could not be confirmed against doi.org as printed.","detected_doi":"10.1007/978−3−540−24676−37","detected_arxiv_id":null,"ref_index":19,"audited_at":"2026-05-19T12:12:29.722708Z"}],"snapshot_sha256":"94dd39c57e8e195953816c17c82fca1707b9e7e7bca6afe600c7caba8bf75c8d"},"events":[{"event_id":1181,"event_type":"pith.integrity.v1","payload_sha256":"d0032b21daac65a51160555a80c97a4124406f6bd6d87379921b9ac5d89faede","signature_b64":"L5RDlsXh362Ga6gqMgdaMJd4aLXO2atwWpZ95EnBhw98a33fjZUnYPfzqAWbHr7AF38X0Wa23Fbi7ZVHvI2EBQ==","signing_key_id":"pith-v1-2026-05","created_at":"2026-05-19T12:17:03.220687+00:00","payload":{"note":"DOI in the printed bibliography is fragmented by whitespace or line breaks. A longer candidate (10.1007/978−3−540−24676−37) was visible in the surrounding text but could not be confirmed against doi.org as printed.","snippet":"Renner, R., Wolf, S. The Exact Price for Unconditionally Secure Asymmetric Cryptog- raphy. In: Cachin, C., Camenisch, J.L. (eds) Advances in Cryptology - EUROCRYPT 2004. EUROCRYPT 2004. Lecture Notes in Computer Science,3027. Springer, Berl","arxiv_id":"2605.08259","detector":"doi_compliance","evidence":{"ref_index":19,"verdict_class":"incontrovertible","resolved_title":null,"printed_excerpt":"Renner, R., Wolf, S. The Exact Price for Unconditionally Secure Asymmetric Cryptog- raphy. In: Cachin, C., Camenisch, J.L. (eds) Advances in Cryptology - EUROCRYPT 2004. EUROCRYPT 2004. Lecture Notes in Computer Science,3027. Springer, Berl","reconstructed_doi":"10.1007/978−3−540−24676−37"},"severity":"advisory","ref_index":19,"audited_at":"2026-05-19T12:12:29.722708Z","event_type":"pith.integrity.v1","detected_doi":"10.1007/978−3−540−24676−37","detector_url":"https://pith.science/pith-integrity-protocol#doi_compliance","external_url":null,"finding_type":"recoverable_identifier","evidence_hash":"3124f82e4fae1e68d381c29a6e57e4fb5bac153d097106be3008036c2879db6b","paper_version":1,"verdict_class":"incontrovertible","resolved_title":null,"detector_version":"1.0.0","detected_arxiv_id":null}}],"endpoint_self":"/pith/2605.08259/integrity.json","protocol_url":"https://pith.science/pith-integrity-protocol"}