{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,29]],"date-time":"2026-03-29T16:30:34Z","timestamp":1774801834323,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":5,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540424567","type":"print"},{"value":"9783540446477","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2001]]},"DOI":"10.1007\/3-540-44647-8_14","type":"book-chapter","created":{"date-parts":[[2007,11,13]],"date-time":"2007-11-13T14:28:14Z","timestamp":1194964094000},"page":"230-238","source":"Crossref","is-referenced-by-count":58,"title":["A Chosen Ciphertext Attack on RSA Optimal Asymmetric Encryption Padding (OAEP) as Standardized in PKCS #1 v2.0"],"prefix":"10.1007","author":[{"given":"James","family":"Manger","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2001,8,2]]},"reference":[{"key":"14_CR1","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/BFb0055716","volume-title":"Advances in Cryptology-CRYPTO\u2019 98","author":"D. Bleichenbacher","year":"1998","unstructured":"D. Bleichenbacher: Chosen Ciphertext Attacks Against Protocols Based on the RSA Encryption Standard PKCS #1. In Hugo Krawczyk (ed.), Advances in Cryptology-CRYPTO\u2019 98, pages 1\u201312, Berlin, Springer, 1998 (Lecture Notes in Computer Science, vol. 1462)."},{"key":"14_CR2","unstructured":"PKCS #1 v2.0: RSA Cryptography Standard, 1 October 1998. http:\/\/www.rsasecurity.com\/rsalabs\/pkcs\/"},{"key":"14_CR3","unstructured":"PKCS #1 v2.1 draft 2: RSA Cryptography Standard, 5 January 2001. http:\/\/www.rsasecurity.com\/rsalabs\/pkcs\/"},{"key":"14_CR4","unstructured":"IEEE 1363 draft 13: Standard Specifications for Public Key Cryptography, 12 November 1999. http:\/\/grouper.ieee.org\/groups\/1363\/"},{"key":"14_CR5","doi-asserted-by":"crossref","unstructured":"M. Bellare and P. Rogaway: Optimal Asymmetric Encryption Padding \u2014 How to Encrypt with RSA. In Advances in Cryptology \u2014 EUROCRYPT\u2019 94, pages 92\u2013111, Springer-Verlag, 1994.","DOI":"10.1007\/BFb0053428"}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2014 CRYPTO 2001"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-44647-8_14","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,4]],"date-time":"2019-05-04T06:21:45Z","timestamp":1556950905000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-44647-8_14"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2001]]},"ISBN":["9783540424567","9783540446477"],"references-count":5,"URL":"https:\/\/doi.org\/10.1007\/3-540-44647-8_14","relation":{},"ISSN":["0302-9743"],"issn-type":[{"value":"0302-9743","type":"print"}],"subject":[],"published":{"date-parts":[[2001]]}}}