{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,19]],"date-time":"2025-03-19T11:42:54Z","timestamp":1742384574543},"publisher-location":"Berlin, Heidelberg","reference-count":10,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540414520"},{"type":"electronic","value":"9783540444954"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2000]]},"DOI":"10.1007\/3-540-44495-5_24","type":"book-chapter","created":{"date-parts":[[2007,10,28]],"date-time":"2007-10-28T05:24:06Z","timestamp":1193549046000},"page":"271-282","source":"Crossref","is-referenced-by-count":8,"title":["Generating RSA Keys on a Handheld Using an Untrusted Server"],"prefix":"10.1007","author":[{"given":"Dan","family":"Boneh","sequence":"first","affiliation":[]},{"given":"Nagendra","family":"Modadugu","sequence":"additional","affiliation":[]},{"given":"Michael","family":"Kim","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2002,4,26]]},"reference":[{"issue":"1","key":"24_CR1","doi-asserted-by":"crossref","first-page":"91","DOI":"10.3233\/JCS-1997-5105","volume":"5","author":"N. Asokan","year":"1997","unstructured":"N. Asokan, G. Tsudik and M. Waidner, \u201cServer-Supported Signatures\u201d, Journal of Computer Security, Vol. 5, No. 1, pp. 91\u2013108, 1997.","journal-title":"Journal of Computer Security"},{"key":"24_CR2","unstructured":"D. Balfanz, E. Felten, \u201cHand-Held Computers Can Be Better Smart Cards\u201d, to appear in the 8th USENIX Security Symposium. 271"},{"key":"24_CR3","series-title":"Lect Notes Comput Sci","first-page":"1","volume-title":"Experimenting with electronic commerce on the PalmPilot","author":"D. Boneh","year":"1999","unstructured":"D. Boneh, N. Daswani, \u201cExperimenting with electronic commerce on the PalmPilot\u201d, in proc. of Financial-Crypto\u2019 99, Lecture Notes in Computer Science, Vol. 1648, Springer-Verlag, pp. 1\u201316, 1999. 271"},{"key":"24_CR4","unstructured":"M. Bellare, P. Rogaway, ldOptimal asymmetric encryption-How to encrypt with RSA\u201d, in proc. Eurocrypt\u2019 94. 274, 274"},{"key":"24_CR5","doi-asserted-by":"publisher","first-page":"197","DOI":"10.1016\/S0020-0190(98)00160-4","volume":"68","author":"H. Gilbert","year":"1998","unstructured":"H. Gilbert, D. Gupta, A. M. Odlyzko, and J.-J. Quisquater, \u201cAttacks on Shamir\u015b \u0154SA for paranoids,\u201d Information Processing Letters 68 (1998), pp. 197\u2013199. 274","journal-title":"Information Processing Letters"},{"key":"24_CR6","series-title":"Lect Notes Comput Sci","first-page":"497","volume-title":"Speeding up secret computations with insecure auxiliary devices","author":"T. Matsumoto","year":"1998","unstructured":"T. Matsumoto, K. Kato, H. Imai, \u201cSpeeding up secret computations with insecure auxiliary devices\u201d, In proc. of Crypto\u2019 88, Lecture Notes in Computer Science, Vol. 403, Springer-Verlag, pp. 497\u2013506, 1998."},{"key":"24_CR7","doi-asserted-by":"crossref","unstructured":"A. Menezes, P. van Oorschot and S. Vanstone, \u201cHandbook of Applied Cryptography\u201d, CRC Press, 1996. 277","DOI":"10.1201\/9781439821916"},{"key":"24_CR8","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"372","DOI":"10.1007\/3-540-49649-1_29","volume-title":"The Beguin-Quisquater Server-Aided RSA Protocol from Crypto\u201995 is not secure","author":"P. Nguyen","year":"1998","unstructured":"P. Nguyen, J. Stern, \u201cThe Beguin-Quisquater Server-Aided RSA Protocol from Crypto\u201995 is not secure\u201d, in proc. of AsiaCrypt\u2019 98, Lecture Notes in Computer Science, Vol. 1514, Springer-Verlag, pp. 372\u2013380, 1998."},{"key":"24_CR9","series-title":"Lect Notes Comput Sci","first-page":"625","volume-title":"Finding four million large random primes","author":"R. Rivest","year":"1997","unstructured":"R. Rivest, \u201cFinding four million large random primes\u201d, In proc. of Crypto\u2019 90, Lecture Notes in Computer Science, Vol. 537, Springer-Verlag, pp. 625\u2013626, 1997.273"},{"key":"24_CR10","unstructured":"A. Shamir, \u201cRSA for paranoids\u201d, CryptoBytes, Vol. 1, No. 3, 1995. 274"}],"container-title":["Lecture Notes in Computer Science","Progress in Cryptology \u2014INDOCRYPT 2000"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-44495-5_24","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,2,24]],"date-time":"2019-02-24T17:31:22Z","timestamp":1551029482000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-44495-5_24"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2000]]},"ISBN":["9783540414520","9783540444954"],"references-count":10,"URL":"https:\/\/doi.org\/10.1007\/3-540-44495-5_24","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[2000]]}}}