{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,28]],"date-time":"2026-02-28T13:00:37Z","timestamp":1772283637150,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":16,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540302766","type":"print"},{"value":"9783540324188","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005]]},"DOI":"10.1007\/11586821_24","type":"book-chapter","created":{"date-parts":[[2005,11,3]],"date-time":"2005-11-03T09:48:40Z","timestamp":1131011320000},"page":"355-375","source":"Crossref","is-referenced-by-count":46,"title":["Concrete Security of the Blum-Blum-Shub Pseudorandom Generator"],"prefix":"10.1007","author":[{"given":"Andrey","family":"Sidorenko","sequence":"first","affiliation":[]},{"given":"Berry","family":"Schoenmakers","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"24_CR1","doi-asserted-by":"publisher","first-page":"194","DOI":"10.1137\/0217013","volume":"17","author":"W. Alexi","year":"1988","unstructured":"Alexi, W., Chor, B., Goldeich, O., Schnorr, C.P.: RSA and Rabin functions: certain parts are as hard as the whole. SIAM Journal on Computing\u00a017, 194\u2013209 (1988)","journal-title":"SIAM Journal on Computing"},{"key":"24_CR2","doi-asserted-by":"publisher","first-page":"364","DOI":"10.1137\/0215025","volume":"15","author":"L. Blum","year":"1986","unstructured":"Blum, L., Blum, M., Shub, M.: A Simple Unpredictable Pseudo-Random Number Generator. SIAM Journal on Computing\u00a015, 364\u2013383 (1986)","journal-title":"SIAM Journal on Computing"},{"key":"24_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"399","DOI":"10.1007\/3-540-68339-9_34","volume-title":"Advances in Cryptology - EUROCRYPT \u201996","author":"M. Bellare","year":"1996","unstructured":"Bellare, M., Rogaway, P.: The exact security of digital signatures how to sign with RSA and Rabin. In: Maurer, U.M. (ed.) EUROCRYPT 1996. LNCS, vol.\u00a01070, pp. 399\u2013416. Springer, Heidelberg (1996)"},{"key":"24_CR4","unstructured":"ECRYPT Yearly Report on Algorithms and Keysizes (2004), Available at \n                    \n                      http:\/\/www.ecrypt.eu.org\/documents\/D.SPA.10-1.1.pdf"},{"key":"24_CR5","doi-asserted-by":"publisher","first-page":"221","DOI":"10.1007\/s001459910008","volume":"13","author":"R. Fischlin","year":"2000","unstructured":"Fischlin, R., Schnorr, C.P.: Stronger Security Proofs for RSA and Rabin Bits. Journal of Cryptology\u00a013, 221\u2013244 (2000)","journal-title":"Journal of Cryptology"},{"key":"24_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"469","DOI":"10.1007\/3-540-44598-6_29","volume-title":"Advances in Cryptology - CRYPTO 2000","author":"R. Gennaro","year":"2000","unstructured":"Gennaro, R.: An improved pseudo-random generator based on discrete log. In: Bellare, M. (ed.) CRYPTO 2000. LNCS, vol.\u00a01880, pp. 469\u2013481. Springer, Heidelberg (2000)"},{"key":"24_CR7","unstructured":"Goldreich, O.: Three XOR-Lemmas \u2013 An Exposition. Technical report, ECCC TR95-056 (1995), Available at \n                    \n                      ftp:\/\/ftp.eccc.uni-trier.de\/pub\/eccc\/reports\/1995\/TR95-056\/Paper.pdf"},{"key":"24_CR8","doi-asserted-by":"publisher","first-page":"13","DOI":"10.2307\/2282952","volume":"56","author":"W. Hoeffding","year":"1963","unstructured":"Hoeffding, W.: Probability in Equations for Sums of Bounded Random Variables. Journal of the American Statistical Association\u00a056, 13\u201330 (1963)","journal-title":"Journal of the American Statistical Association"},{"key":"24_CR9","volume-title":"Seminumerical Algorithms","author":"D.E. Knuth","year":"1997","unstructured":"Knuth, D.E.: Seminumerical Algorithms, 3rd edn. Addison-Wesley, Reading (1997)","edition":"3"},{"key":"24_CR10","doi-asserted-by":"crossref","unstructured":"Katz, J., Wang, N.: Efficiency Improvements for Signature Schemes with Tight Security Reductions. In: CCS 2003, Washington, DC, USA, October 27-30 (2003)","DOI":"10.1145\/948109.948132"},{"key":"24_CR11","doi-asserted-by":"crossref","first-page":"255","DOI":"10.1007\/s00145-001-0009-4","volume":"14","author":"A.K. Lenstra","year":"2001","unstructured":"Lenstra, A.K., Verheul, E.R.: Selecting Cryptographic Key Sizes. Journal of Cryptology\u00a014, 255\u2013293 (2001)","journal-title":"Journal of Cryptology"},{"key":"24_CR12","unstructured":"Menezes, A.J., van Oorschot, P.C., Vanstone, S.A.: Handbook of Appied Cryptography. CRC Press series on discrete mathematics and its applications (2000)"},{"key":"24_CR13","unstructured":"Rabin, M.O.: Digitalized signatures and public-key functions as intractible as factorization. Technical report, TR-212. MIT Laboratory for Computer Science (1979)"},{"key":"24_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"344","DOI":"10.1007\/3-540-68339-9_30","volume-title":"Advances in Cryptology - EUROCRYPT \u201996","author":"V. Shoup","year":"1996","unstructured":"Shoup, V.: On the security of a practical identification scheme. In: Maurer, U.M. (ed.) EUROCRYPT 1996. LNCS, vol.\u00a01070, pp. 344\u2013353. Springer, Heidelberg (1996)"},{"key":"24_CR15","doi-asserted-by":"crossref","unstructured":"Vazirani, U.V., Vazirani, V.V.: Efficient and Secure Pseudo-Random Number Generation. In: Proceedings 25th Symposium on Foundations of Computing Science IEEE, pp. 458\u2013463 (1984)","DOI":"10.1109\/SFCS.1984.715948"},{"key":"24_CR16","doi-asserted-by":"crossref","unstructured":"Yao, A.C.: Theory and Application of Trapdoor Functions. In: Proceedings of IEEE Symposium on Foundations of Computer Science, pp. 80\u201391 (1982)","DOI":"10.1109\/SFCS.1982.45"}],"container-title":["Lecture Notes in Computer Science","Cryptography and Coding"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11586821_24.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T06:47:17Z","timestamp":1619506037000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11586821_24"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005]]},"ISBN":["9783540302766","9783540324188"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/11586821_24","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2005]]}}}