{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,29]],"date-time":"2026-03-29T15:16:33Z","timestamp":1774797393739,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":9,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540164630","type":"print"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/3-540-39799-x_10","type":"book-chapter","created":{"date-parts":[[2007,2,28]],"date-time":"2007-02-28T12:25:31Z","timestamp":1172665531000},"page":"104-107","source":"Crossref","is-referenced-by-count":7,"title":["Cheating at Mental Poker"],"prefix":"10.1007","author":[{"given":"Don","family":"Coppersmith","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"10_CR1","doi-asserted-by":"crossref","unstructured":"L.M. Adleman, \u201cA subexponential algorithm for the discrete logarithm problem with applications to cryptography,\u201d Proc. 20th IEEE Found. Comp. Sci. Symp. (1979), 55\u201360.","DOI":"10.1109\/SFCS.1979.2"},{"key":"10_CR2","series-title":"Research Report","volume-title":"Discrete Logarithms in GF(p)","author":"D. Coppersmith","year":"1985","unstructured":"D. Coppersmith, A.M. Odlyzko and R. Schroeppel, \u201cDiscrete Logarithms in GF(p),\u201d Research Report RC 10985, IBM T.J. Watson Research Center, Yorktown Heights, N.Y., 10598, February 14, 1985."},{"key":"10_CR3","doi-asserted-by":"crossref","unstructured":"R.A. DeMillo, G.I. Davida, D.P. Dobkin, M.A. Harrison and R.J. Lipton, Applied Cryptology, Cryptographic Protocols, and Computer Security Models, vol. 29, Proceedings of Symposia in Applied Mathematics, American Mathematical Society, 1983. Chapter 4.11, \u201cCompromising Protocols.\u201d","DOI":"10.1090\/psapm\/029"},{"key":"10_CR4","doi-asserted-by":"crossref","unstructured":"S. Goldwasser and S. Micali, \u201cProbabilistic Encryption & How To Play Mental Poker Keeping Secret All Partial Information,\u201d Proc. 14th ACM Symposium on Theory of Computing (1982), 365\u2013377.","DOI":"10.1145\/800070.802212"},{"key":"10_CR5","first-page":"289","volume-title":"Advances in Cryptology, Proceedings of Crypto 83","author":"J.C. Lagarias","year":"1983","unstructured":"J.C. Lagarias, \u201cKnapsack Public Key Cryptosystems and Diophantine Approximation (Extended Abstract),\u201d Advances in Cryptology, Proceedings of Crypto 83, (Ed.: D. Chaum), Plenum Press, New York, 1983, 289\u2013301."},{"key":"10_CR6","doi-asserted-by":"publisher","first-page":"515","DOI":"10.1007\/BF01457454","volume":"261","author":"A.K. Lenstra","year":"1982","unstructured":"A.K. Lenstra, H.W. Lenstra, Jr. and L. Lovasz, \u201cFactoring Polynomials with Rational Coefficients,\u201d Math. Annalen. 261 (1982), 515\u2013534.","journal-title":"Math. Annalen."},{"key":"10_CR7","doi-asserted-by":"publisher","first-page":"106","DOI":"10.1109\/TIT.1978.1055817","volume":"IT-24","author":"S.C. Pohlig","year":"1978","unstructured":"S.C. Pohlig and M. Hellman, \u201cAn improved algorithm for computing logarithms over GF(p) and its cryptographic significance,\u201d IEEE Trans. Inform. Theory IT-24 (1978), 106\u2013110.","journal-title":"IEEE Trans. Inform. Theory"},{"key":"10_CR8","volume-title":"Mental Poker","author":"A. Shamir","year":"1979","unstructured":"A. Shamir, R.L. Rivest and L.M. Adleman, \u201cMental Poker,\u201d MIT\/LCS\/TM-125, Laboratory for Computer Science, Massachusetts Institute of Technology, 545 Technology Square, Cambridge, MA 02139, February 1979."},{"key":"10_CR9","unstructured":"A.E. Western and J.C.P. Miller, Tables of Indices and Primitive Roots, Royal Society Mathematical Tables, vol. 9, Cambridge Univ. Press, 1968."}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2014 CRYPTO \u201985 Proceedings"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-39799-X_10.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,28]],"date-time":"2021-04-28T01:22:33Z","timestamp":1619572953000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-39799-X_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540164630"],"references-count":9,"URL":"https:\/\/doi.org\/10.1007\/3-540-39799-x_10","relation":{},"subject":[]}}