{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T21:38:00Z","timestamp":1725485880060},"publisher-location":"Berlin, Heidelberg","reference-count":29,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540007166"},{"type":"electronic","value":"9783540365525"}],"license":[{"start":{"date-parts":[[2003,1,1]],"date-time":"2003-01-01T00:00:00Z","timestamp":1041379200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2003]]},"DOI":"10.1007\/3-540-36552-4_25","type":"book-chapter","created":{"date-parts":[[2007,6,6]],"date-time":"2007-06-06T19:22:37Z","timestamp":1181157757000},"page":"359-374","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["A Reject Timing Attack on an IND-CCA2 Public-Key Cryptosystem"],"prefix":"10.1007","author":[{"given":"Kouichi","family":"Sakurai","sequence":"first","affiliation":[]},{"given":"Tsuyoshi","family":"Takagi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2003,3,14]]},"reference":[{"key":"25_CR1","unstructured":"M. Bellare and P. Rogaway, \u201cRandom oracles are practical: a paradigm for designing efficient protocols,\u201d First ACM Conference on Computer and Communications Security, (1993), pp.62\u201373. 369"},{"key":"25_CR2","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"26","DOI":"10.1007\/BFb0055718","volume-title":"Advances in Cryptology-CRYPTO\u201998","author":"M. Bellare","year":"1998","unstructured":"M. Bellare, A. Desai, D. Pointcheval, and P. Rogaway, \u201cRelations among notions of security for public-key encryption schemes,\u201d Advances in Cryptology-CRYPTO\u201998, LNCS 1462, pp.26\u201345, 1998. 359"},{"key":"25_CR3","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"275","DOI":"10.1007\/3-540-44647-8_17","volume-title":"Advances in Cryptology-CRYPTO 2001","author":"D. Boneh","year":"2001","unstructured":"D. Boneh, \u201cSimplified OAEP for the RSA and Rabin Functions,\u201d Advances in Cryptology-CRYPTO 2001, LNCS 2139, pp.275\u2013291, 2001. 371"},{"key":"25_CR4","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"51","DOI":"10.1007\/3-540-45861-1_6","volume-title":"Information Security and Cryptology-ICISC 2001","author":"J. Buchmann","year":"2001","unstructured":"J. Buchmann, K. Sakurai, and T. Takagi, \u201cAn IND-CCA2 Public-Key Cryptosystem with Fast Decryption,\u201d Information Security and Cryptology-ICISC 2001, LNCS 2288, pp.51\u201371, 2001. 371"},{"key":"25_CR5","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1007\/3-540-45664-3_2","volume-title":"Public Key Cryptography 2002","author":"J.-S. Coron","year":"2002","unstructured":"J.-S. Coron, H. Handschuh, M. Joye, P. Paillier, D. Pointcheval, and C. Tymen, \u201cOptimal Chosen-Ciphertext Secure Encryption of Arbitrary-Length Messages,\u201d Public Key Cryptography 2002, LNCS 2274, pp.17\u201333, 2002. 370"},{"key":"25_CR6","series-title":"Lect Notes Comput Sci","first-page":"263","volume-title":"Topics in Cryptology-CT-RSA 2002","author":"J.-S. Coron","year":"2002","unstructured":"J.-S. Coron, H. Handschuh, M. Joye, P. Paillier, D. Pointcheval, and C. Tymen, \u201cGEM: A Generic Chosen-Ciphertext Secure Encryption Method,\u201d Topics in Cryptology-CT-RSA 2002, LNCS2271, pp.263\u2013276, 2002. 370"},{"key":"25_CR7","unstructured":"CRYPTREC, Evaluation of Cryptographic Techniques, IPA. \n                    http:\/\/www.ipa.go.jp\/security\/enc\/CRYPTREC\/\n                    \n                  . 361, 363"},{"issue":"9","key":"25_CR8","doi-asserted-by":"publisher","first-page":"412","DOI":"10.1049\/el:20020288","volume":"38","author":"A. Dent","year":"2002","unstructured":"A. Dent, \u201cAn implementation attack against the EPOC-2 public-key cryptosystem,\u201d Electronics Letters, 38(9), pp.412, 2002. 360, 363, 368","journal-title":"Electronics Letters"},{"key":"25_CR9","unstructured":"A. Dent, \u201cAn evaluation of EPOC-2,\u201d New European Schemes for Signatures, Integrity, and Encryption (NESSIE), \n                    http:\/\/www.cryptonessie.org\/\n                    \n                  . 360, 363, 368"},{"key":"25_CR10","unstructured":"EPOC, Efficient Probabilistic Public-Key Encryption. \n                    http:\/\/info.isl.ntt.co.jp\/epoc\/\n                    \n                   360, 367"},{"key":"25_CR11","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"53","DOI":"10.1007\/3-540-49162-7_5","volume-title":"How to Enhance the Security of Public-Key Encryption at Minimum Cost","author":"E. Fujisaki","year":"1999","unstructured":"E. Fujisaki and T. Okamoto, \u201cHow to Enhance the Security of Public-Key Encryption at Minimum Cost,\u201d 1999 InternationalWorkshop on Practice and Theory in Public Key Cryptography, LNCS 1560, (1999), pp.53\u201368. 369"},{"key":"25_CR12","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"537","DOI":"10.1007\/3-540-48405-1_34","volume-title":"Advances in Cryptology-CRYPTO\u201999","author":"E. Fujisaki","year":"1999","unstructured":"E. Fujisaki and T. Okamoto, \u201cSecure Integration of Asymmetric and Symmetric Encryption Schemes,\u201d Advances in Cryptology-CRYPTO\u201999, LNCS 1666, (1999), pp.537\u2013554. 360, 361, 362, 363, 369, 370"},{"issue":"1","key":"25_CR13","first-page":"179","volume":"E84-A","author":"E. Fujisaki","year":"2001","unstructured":"E. Fujisaki and T. Okamoto, \u201cA Chosen-Cipher Secure Encryption Scheme Tightly as Secure as Factoring,\u201d IEICE Trans. Fundamentals, Vol. E84-A, No.1, (2001), pp.179\u2013187. 360, 361, 362, 363","journal-title":"IEICE Trans. Fundamentals"},{"key":"25_CR14","unstructured":"IEEE P1363, Standard Specifications for Public-Key Cryptography, 2000. Available from \n                    http:\/\/grouper.ieee.org\/groups\/1363\/\n                    \n                  . 361, 362"},{"key":"25_CR15","unstructured":"M. Joye, J.-J. Quisquater, and M. Yung, \u201cThe Policeman in the Middle Attack,\u201d presented at rump session of Eurocrypt\u201998, 1998. 362, 368"},{"key":"25_CR16","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"208","DOI":"10.1007\/3-540-45353-9_16","volume-title":"On the Power of Misbehaving Adversaries and Security Analysis of the Original EPOC","author":"M. Joye","year":"2001","unstructured":"M. Joye, J.-J. Quisquater, and M. Yung, \u201cOn the Power of Misbehaving Adversaries and Security Analysis of the Original EPOC,\u201d Topics in Cryptology-CT-RSA 2001, LNCS 2020, pp.208\u2013222, 2001. 360, 362, 363, 365, 368"},{"key":"25_CR17","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"114","DOI":"10.1007\/3-540-45325-3_11","volume-title":"Strong Adaptive Chosen-Ciphertext Attacks with Memory Dump (or: The Importance of the Order of Decryption and Validation)","author":"S. Kim","year":"2001","unstructured":"S. Kim, J. Cheon, M. Joye, S. Lim, M. Mambo, D. Won, and Y. Zheng, \u201cStrong Adaptive Chosen-Ciphertext Attacks with Memory Dump (or: The Importance of the Order of Decryption and Validation)\u201d, Cryptography and Coding, 8th IMA International Conference, LNCS 2260, pp.114\u2013127, 2001. 360, 369"},{"key":"25_CR18","unstructured":"V. Klima and T. Rosa; \u201cFurther Results and Considerations on Side Channel Attacks on RSA,\u201d Cryptology ePrint Archive: Report 2002\/071, 2002. \n                    http:\/\/eprint.iacr.org\/2002\/071\/\n                    \n                  . 360"},{"key":"25_CR19","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"104","DOI":"10.1007\/3-540-68697-5_9","volume-title":"Advances in Cryptology-CRYPTO\u2019 96","author":"C. Kocher","year":"1996","unstructured":"C. Kocher, \u201cTiming attacks on Implementations of Diffie-Hellman, RSA, DSS, and other Systems\u201d, Advances in Cryptology-CRYPTO\u2019 96, LNCS 1109, pp.104\u2013113, 1996. 360"},{"key":"25_CR20","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"388","DOI":"10.1007\/3-540-48405-1_25","volume-title":"Cryptology-CRYPTO\u2019 99","author":"C. Kocher","year":"1999","unstructured":"C. Kocher, J. Jaffie, and B. Jun, \u201cDifferential Power Analysis\u201d, Advances in Cryptology-CRYPTO\u2019 99, LNCS 1666, pp.388\u2013397, 1999. 360"},{"key":"25_CR21","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"230","DOI":"10.1007\/3-540-44647-8_14","volume-title":"Cryptology-CRYPTO 2001","author":"J. Manger","year":"2001","unstructured":"J. Manger, \u201cA Chosen Ciphertext Attack on RSA Optimal Asymmetric Encryption Padding (OAEP) as Standardized in PKCS #1 v2.0,\u201d Advances in Cryptology-CRYPTO 2001, LNCS 2139, pp.230\u2013238, 2001. 359, 369, 371"},{"key":"25_CR22","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"81","DOI":"10.1007\/3-540-45861-1_8","volume-title":"Information Security and Cryptology-ICISC 2001","author":"M. Nishioka","year":"2001","unstructured":"M. Nishioka, H. Satoh, and K. Sakurai, \u201cDesign and Analysis of Fast Provably Secure Public-Key Cryptosystems Based on a Modular Squaring,\u201d Information Security and Cryptology-ICISC 2001, LNCS 2288, pp.81\u2013102, 2001. 371"},{"key":"25_CR23","unstructured":"NESSIE, New European Schemes for Signatures, Integrity, and Encryption, IST-1999-12324. \n                    http:\/\/www.cosic.esat.kuleuven.ac.be\/nessie\/\n                    \n                   361, 363"},{"key":"25_CR24","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"252","DOI":"10.1007\/3-540-45664-3_18","volume-title":"Public Key Cryptography 2002","author":"R. Novak","year":"2002","unstructured":"R. Novak, \u201cSPA-Based Adaptive Chosen-Ciphertext Attack on RSA Implementation,\u201d Public Key Cryptography 2002, LNCS 2274, pp.252\u2013262, 2002. 360"},{"key":"25_CR25","series-title":"Lect Notes Comput Sci","first-page":"159","volume-title":"REACT: Rapid Enhanced-security Asymmetric Cryptosystem Transform","author":"T. Okamoto","year":"2001","unstructured":"T. Okamoto and D. Pointcheval, \u201cREACT: Rapid Enhanced-security Asymmetric Cryptosystem Transform,\u201d In Proceedings of the Cryptographers\u2019 Track at RSA Conference\u2019 2001, LNCS 2020, (2001), pp.159\u2013175. 369, 370"},{"key":"25_CR26","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"308","DOI":"10.1007\/BFb0054135","volume-title":"Eurocrypt\u201998","author":"T. Okamoto","year":"1998","unstructured":"T. Okamoto and S. Uchiyama; \u201cA New Public-Key Cryptosystem as Secure as Factoring,\u201d Eurocrypt\u201998, LNCS 1403, pp.308\u2013318, 1998. 362, 363, 365, 369"},{"key":"25_CR27","series-title":"Lect Notes Comput Sci","first-page":"223","volume-title":"Eurocrypt\u201999","author":"P. Paillier","year":"1999","unstructured":"P. Paillier, \u201cPublic-Key Cryptosystems based on Composite Degree Residuosity Classes,\u201d Eurocrypt\u201999, LNCS 1592, pp.223\u2013238, 1999. 371"},{"key":"25_CR28","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"129","DOI":"10.1007\/978-3-540-46588-1_10","volume-title":"Public Key Cryptography 2000","author":"D. Pointcheval","year":"2000","unstructured":"D. Pointcheval, \u201cChosen-ciphertext security for any one-way cryptosystem,\u201d Public Key Cryptography 2000, LNCS 1751, pp.129\u2013146, 2000. 369"},{"key":"25_CR29","unstructured":"V. Shoup, \u201cA Proposal for an ISO Standard for Public-Key Encryption (version 2.1),\u201d \n                    http:\/\/www.shoup.net\n                    \n                  . 363"}],"container-title":["Lecture Notes in Computer Science","Information Security and Cryptology \u2014 ICISC 2002"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-36552-4_25","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,19]],"date-time":"2019-05-19T09:45:42Z","timestamp":1558259142000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-36552-4_25"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2003]]},"ISBN":["9783540007166","9783540365525"],"references-count":29,"URL":"https:\/\/doi.org\/10.1007\/3-540-36552-4_25","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[2003]]},"assertion":[{"value":"14 March 2003","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}