{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,6]],"date-time":"2025-12-06T04:53:40Z","timestamp":1764996820687},"publisher-location":"Berlin, Heidelberg","reference-count":2,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540164685"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/3-540-39805-8_3","type":"book-chapter","created":{"date-parts":[[2007,4,14]],"date-time":"2007-04-14T04:09:22Z","timestamp":1176523762000},"page":"31-34","source":"Crossref","is-referenced-by-count":42,"title":["Efficient Factoring Based on Partial Information"],"prefix":"10.1007","author":[{"given":"Ronald L.","family":"Rivest","sequence":"first","affiliation":[]},{"given":"Adi","family":"Shamir","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"3_CR1","doi-asserted-by":"crossref","unstructured":"Blum, Manuel. \u201cHow to exchange secrets,\u201d Proc. 15th Annual ACM STOC Conference (1983), 440\u2013447.","DOI":"10.1145\/800061.808775"},{"key":"3_CR2","unstructured":"Lenstra, H. W., Jr. \u201cInteger programming in a fixed number of variables,\u201d Report 81-03, Mathematisch Institut, Universitat ban Amsterdam (1981)."}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2014 EUROCRYPT\u2019 85"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-39805-8_3.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,17]],"date-time":"2020-11-17T16:05:45Z","timestamp":1605629145000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-39805-8_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540164685"],"references-count":2,"URL":"https:\/\/doi.org\/10.1007\/3-540-39805-8_3","relation":{},"subject":[]}}