{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T17:56:39Z","timestamp":1725558999389},"publisher-location":"Berlin, Heidelberg","reference-count":9,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540191025"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/3-540-39118-5_10","type":"book-chapter","created":{"date-parts":[[2010,7,13]],"date-time":"2010-07-13T15:51:38Z","timestamp":1279036298000},"page":"95-105","source":"Crossref","is-referenced-by-count":16,"title":["The RSA Cryptography Processor"],"prefix":"10.1007","author":[{"given":"Holger","family":"Sedlak","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"10_CR1","first-page":"92","volume":"10","author":"M.E. Hellmann","year":"1979","unstructured":"Hellmann, M.E., Die Mathematik neuer Verschl\u00fcsselungssysteme, Spektrum der Wissenschaft 10, 1979, 92\u2013101.","journal-title":"Spektrum der Wissenschaft"},{"key":"10_CR2","volume-title":"Cryptography-A new Dimension in Computer Data Security","author":"C.H. Meyer","year":"1982","unstructured":"Meyer, C.H., Matyas, S.M., Cryptography-A new Dimension in Computer Data Security, Cryptography Competence Center, IBM, Kingston, New York, Wiley-Interscience Publication, 1982."},{"key":"10_CR3","doi-asserted-by":"publisher","first-page":"97","DOI":"10.1007\/BF03022861","volume":"3","author":"C. Pomerance","year":"1981","unstructured":"Pomerance, C., Recent Developments in Primality Testing, The Mathematical Intelligencer 3, 1981, 97\u2013104.","journal-title":"The Mathematical Intelligencer"},{"key":"10_CR4","unstructured":"Rivest, R.L., RSA Chips (Past\/Present\/Future), in \u201cAdvances in Cryptology\u201d, Proc. Eurocrypt 84, Paris, France, 1984, 160\u2013164."},{"key":"10_CR5","unstructured":"Pailles, J.C., Girault, M., The security processor C.R.I.P.T., Information Security: The Challenge, Preprints of the Fourth IFIP Security on Information Systems Security, Monte-Carlo, December 2\u20134, 1986."},{"key":"10_CR6","unstructured":"A Hash function for use in digital signature and authentication (Exclusive OR and squaring), Working Document-First Draft, Secr\u00e9tariat ISO\/TC 97\/SC 20\/WG 2 N75, Paris, France, 1986."},{"key":"10_CR7","unstructured":"TeleTrusT\/OSIS, The TeleTrusT\/OSIS Hash-Function, TeleTrusT\/OSIS-WG1 Security Aspects, GMD, Damstadt, Germany, 1986."},{"key":"10_CR8","volume-title":"Konzept und Entwurf eines Public-Key-Code Kryptographie-Prozessors","author":"H. Sedlak","year":"1985","unstructured":"Sedlak, H., Konzept und Entwurf eines Public-Key-Code Kryptographie-Prozessors, Institut f\u00fcr Theoretische und Praktische Informatik, Technische Universit\u00e4t Braunschweig, Germany, 1985."},{"key":"10_CR9","unstructured":"Sedlak, H., Theory and Single-Chip Implementation of a Cryptography Processor, Institut f\u00fcr Theoretische Informatik, Technische Universit\u00e4t Braunschweig, Germany, to be submitted as a PhD-Thesis."}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2014 EUROCRYPT \u201987"],"original-title":[],"language":"en","deposited":{"date-parts":[[2019,2,16]],"date-time":"2019-02-16T13:22:12Z","timestamp":1550323332000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-39118-5_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540191025"],"references-count":9,"URL":"https:\/\/doi.org\/10.1007\/3-540-39118-5_10","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[]}}