{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T17:29:23Z","timestamp":1725470963914},"publisher-location":"Berlin, Heidelberg","reference-count":13,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540383413"},{"type":"electronic","value":"9783540383437"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1007\/11836810_15","type":"book-chapter","created":{"date-parts":[[2006,10,3]],"date-time":"2006-10-03T10:36:57Z","timestamp":1159871817000},"page":"203-216","source":"Crossref","is-referenced-by-count":3,"title":["A Partial Key Exposure Attack on RSA Using a 2-Dimensional Lattice"],"prefix":"10.1007","author":[{"given":"Ellen","family":"Jochemsz","sequence":"first","affiliation":[]},{"given":"Benne","family":"de Weger","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"2","key":"15_CR1","doi-asserted-by":"publisher","first-page":"129","DOI":"10.1093\/qmath\/20.1.129","volume":"20","author":"A. Baker","year":"1969","unstructured":"Baker, A., Davenport, H.: The equations 3 x\n                           2\u2009\u2212\u20092\u2009=\u2009y\n                           2 and 8 x\n                           2\u2009\u2212\u20097\u2009=\u2009z\n                           2 \u201d. Quarterly Journal of Mathematics (Oxford)\u00a020(2), 129\u2013137 (1969)","journal-title":"Quarterly Journal of Mathematics (Oxford)"},{"key":"15_CR2","first-page":"203","volume":"46","author":"D. Boneh","year":"1999","unstructured":"Boneh, D.: Twenty years of Attacks on the RSA Cryptosystem. Notices of the American Mathematical Society\u00a046, 203\u2013213 (1999)","journal-title":"Notices of the American Mathematical Society"},{"key":"15_CR3","doi-asserted-by":"publisher","first-page":"1339","DOI":"10.1109\/18.850673","volume":"46","author":"D. Boneh","year":"2000","unstructured":"Boneh, D., Durfee, G.: Cryptanalysis of RSA with Private Key d less than N\n                           0.292. IEEE Transactions on Information Theory\u00a046, 1339\u20131349 (2000)","journal-title":"IEEE Transactions on Information Theory"},{"key":"15_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1007\/3-540-49649-1_3","volume-title":"Advances in Cryptology - ASIACRYPT\u201998","author":"D. Boneh","year":"1998","unstructured":"Boneh, D., Durfee, G., Frankel, Y.: An Attack on RSA Given a Small Fraction of the Private Key Bits. In: Ohta, K., Pei, D. (eds.) ASIACRYPT 1998. LNCS, vol.\u00a01514, pp. 25\u201334. Springer, Heidelberg (1998)"},{"key":"15_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"27","DOI":"10.1007\/978-3-540-45146-4_2","volume-title":"Advances in Cryptology - CRYPTO 2003","author":"J. Bl\u00f6mer","year":"2003","unstructured":"Bl\u00f6mer, J., May, A.: New Partial Key Exposure Attacks on RSA. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol.\u00a02729, pp. 27\u201343. Springer, Heidelberg (2003)"},{"key":"15_CR6","doi-asserted-by":"publisher","first-page":"233","DOI":"10.1007\/s001459900030","volume":"10","author":"D. Coppersmith","year":"1997","unstructured":"Coppersmith, D.: Small Solutions to Polynomial Equations, and Low Exponent RSA Vulnerabilities. Journal of Cryptology\u00a010, 233\u2013260 (1997)","journal-title":"Journal of Cryptology"},{"key":"15_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"371","DOI":"10.1007\/11426639_22","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2005","author":"M. Ernst","year":"2005","unstructured":"Ernst, M., Jochemsz, E., May, A., de Weger, B.: Partial Key Exposure Attacks on RSA up to Full Size Exponents. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol.\u00a03494, pp. 371\u2013386. Springer, Heidelberg (2005)"},{"key":"15_CR8","doi-asserted-by":"publisher","first-page":"515","DOI":"10.1007\/BF01457454","volume":"261","author":"A. Lenstra","year":"1982","unstructured":"Lenstra, A., Lenstra Jr., H., Lov\u00e1sz, L.: Factoring Polynomials with Rational Coefficients. Mathematische Annalen\u00a0261, 515\u2013534 (1982)","journal-title":"Mathematische Annalen"},{"key":"15_CR9","unstructured":"May, A.: New RSA Vulnerabilities Using Lattice Reduction Methods, PhD Thesis, University of Paderborn (2003)"},{"key":"15_CR10","unstructured":"Shoup, V.: Online Number Theory Library, \n                    \n                      http:\/\/www.shoup.net\/ntl"},{"key":"15_CR11","doi-asserted-by":"publisher","first-page":"425","DOI":"10.1007\/s002000050082","volume":"8","author":"E. Verheul","year":"1997","unstructured":"Verheul, E., van Tilborg, H.: Cryptanalysis of \u2019less short\u2019 RSA Secret Exponents. Applicable Algebra in Engineering, Communication and Computing\u00a08, 425\u2013435 (1997)","journal-title":"Applicable Algebra in Engineering, Communication and Computing"},{"key":"15_CR12","unstructured":"de Weger, B.: Algorithms for Diophantine Equations, CWI Tract 65, Centre for Mathematics and Computer Science, Amsterdam (1989)"},{"key":"15_CR13","doi-asserted-by":"publisher","first-page":"553","DOI":"10.1109\/18.54902","volume":"36","author":"M. Wiener","year":"1990","unstructured":"Wiener, M.: Cryptanalysis of Short RSA Secret Exponents. IEEE Transactions on Information Theory\u00a036, 553\u2013558 (1990)","journal-title":"IEEE Transactions on Information Theory"}],"container-title":["Lecture Notes in Computer Science","Information Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11836810_15","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,3,11]],"date-time":"2019-03-11T02:13:55Z","timestamp":1552270435000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11836810_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"ISBN":["9783540383413","9783540383437"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/11836810_15","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2006]]}}}