{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,11]],"date-time":"2026-03-11T13:53:43Z","timestamp":1773237223724,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":15,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540424567","type":"print"},{"value":"9783540446477","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2001]]},"DOI":"10.1007\/3-540-44647-8_16","type":"book-chapter","created":{"date-parts":[[2007,11,13]],"date-time":"2007-11-13T14:28:14Z","timestamp":1194964094000},"page":"260-274","source":"Crossref","is-referenced-by-count":133,"title":["RSA-OAEP Is Secure under the RSA Assumption"],"prefix":"10.1007","author":[{"given":"Eiichiro","family":"Fujisaki","sequence":"first","affiliation":[]},{"given":"Tatsuaki","family":"Okamoto","sequence":"additional","affiliation":[]},{"given":"David","family":"Pointcheval","sequence":"additional","affiliation":[]},{"given":"Jacques","family":"Stern","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2001,8,2]]},"reference":[{"key":"16_CR1","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"26","DOI":"10.1007\/BFb0055718","volume-title":"Crypto\u2019 98","author":"M. Bellare","year":"1998","unstructured":"M. Bellare, A. Desai, D. Pointcheval, and P. Rogaway. Relations among Notions of Security for Public-Key Encryption Schemes. In Crypto\u2019 98, LNCS 1462, pages 26\u201345. Springer-Verlag, Berlin, 1998."},{"key":"16_CR2","first-page":"62","volume-title":"Proc. of the 1st CCS","author":"M. Bellare","year":"1993","unstructured":"M. Bellare and P. Rogaway. Random Oracles Are Practical: a Paradigm for Designing Efficient Protocols. In Proc. of the 1st CCS, pages 62\u201373. ACM Press, New York, 1993."},{"key":"16_CR3","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"92","DOI":"10.1007\/BFb0053428","volume-title":"Eurocrypt\u2019 94","author":"M. Bellare","year":"1995","unstructured":"M. Bellare and P. Rogaway. Optimal Asymmetric Encryption-How to Encrypt with RSA. In Eurocrypt\u2019 94, LNCS 950, pages 92\u2013111. Springer-Verlag, Berlin, 1995."},{"key":"16_CR4","series-title":"Lect Notes Comput Sci","first-page":"1","volume-title":"Crypto\u2019 98","author":"D. Bleichenbacher","year":"1998","unstructured":"D. Bleichenbacher. A Chosen Ciphertext Attack against Protocols based on the RSA Encryption Standard PKCS #1. In Crypto\u2019 98, LNCS 1462, pages 1\u201312. Springer-Verlag, Berlin, 1998."},{"key":"16_CR5","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"155","DOI":"10.1007\/3-540-68339-9_14","volume-title":"Eurocrypt\u2019 96","author":"D. Coppersmith","year":"1996","unstructured":"D. Coppersmith. Finding a Small Root of a Univariate Modular Equation. In Eurocrypt\u2019 96, LNCS 1070, pages 155\u2013165. Springer-Verlag, Berlin, 1996."},{"issue":"2","key":"16_CR6","doi-asserted-by":"publisher","first-page":"391","DOI":"10.1137\/S0097539795291562","volume":"30","author":"D. Dolev","year":"2000","unstructured":"D. Dolev, C. Dwork, and M. Naor. Non-Malleable Cryptography. SIAM Journal on Computing, 30(2):391\u2013437, 2000.","journal-title":"SIAM Journal on Computing"},{"key":"16_CR7","doi-asserted-by":"publisher","first-page":"270","DOI":"10.1016\/0022-0000(84)90070-9","volume":"28","author":"S. Goldwasser","year":"1984","unstructured":"S. Goldwasser and S. Micali. Probabilistic Encryption. Journal of Computer and System Sciences, 28:270\u2013299, 1984.","journal-title":"Journal of Computer and System Sciences"},{"key":"16_CR8","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"2","DOI":"10.1007\/978-3-540-47942-0_2","volume-title":"Proc. of ICICS\u201999","author":"C. Hall","year":"1999","unstructured":"C. Hall, I. Goldberg, and B. Schneier. Reaction Attacks Against Several Public-Key Cryptosystems. In Proc. of ICICS\u201999, LNCS, pages 2\u201312. Springer-Verlag, 1999."},{"key":"16_CR9","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"208","DOI":"10.1007\/3-540-45353-9_16","volume-title":"CT-RSA\u2019 2001","author":"M. Joye","year":"2001","unstructured":"M. Joye, J. J. Quisquater, and M. Yung. On the Power of Misbehaving Adversaries and Security Analysis of the Original EPOC. In CT-RSA\u2019 2001, LNCS 2020, pages 208\u2013222. Springer-Verlag, Berlin, 2001."},{"key":"16_CR10","first-page":"427","volume-title":"Proc. of the 22nd STOC","author":"M. Naor","year":"1990","unstructured":"M. Naor and M. Yung. Public-Key Cryptosystems Provably Secure against Chosen Ciphertext Attacks. In Proc. of the 22nd STOC, pages 427\u2013437. ACM Press, New York, 1990."},{"key":"16_CR11","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"159","DOI":"10.1007\/3-540-45353-9_13","volume-title":"CT-RSA\u2019 2001","author":"T. Okamoto","year":"2001","unstructured":"T. Okamoto and D. Pointcheval. REACT: Rapid Enhanced-security Asymmetric Cryptosystem Transform. In CT-RSA\u2019 2001, LNCS 2020, pages 159\u2013175. Springer-Verlag, Berlin, 2001."},{"key":"16_CR12","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"433","DOI":"10.1007\/3-540-46766-1_35","volume-title":"Crypto\u2019 91","author":"C. Rackoff","year":"1992","unstructured":"C. Rackoff and D. R. Simon. Non-Interactive Zero-Knowledge Proof of Knowledge and Chosen Ciphertext Attack. In Crypto\u2019 91, LNCS 576, pages 433\u2013444. Springer-Verlag, Berlin, 1992."},{"issue":"2","key":"16_CR13","doi-asserted-by":"crossref","first-page":"120","DOI":"10.1145\/359340.359342","volume":"21","author":"R. Rivest","year":"1978","unstructured":"R. Rivest, A. Shamir, and L. Adleman. A Method for Obtaining Digital Signatures and Public Key Cryptosystems. Communications of the ACM, 21(2):120\u2013126, February 1978.","journal-title":"Communications of the ACM"},{"key":"16_CR14","unstructured":"RSA Data Security, Inc. Public Key Cryptography Standards-PKCS."},{"key":"16_CR15","series-title":"Lect Notes Comput Sci","volume-title":"Crypto\u2019 2001","author":"V. Shoup","year":"2001","unstructured":"V. Shoup. OAEP Reconsidered. In Crypto\u2019 2001, LNCS. Springer-Verlag, Berlin, 2001."}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2014 CRYPTO 2001"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-44647-8_16","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,2,25]],"date-time":"2019-02-25T01:25:55Z","timestamp":1551057955000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-44647-8_16"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2001]]},"ISBN":["9783540424567","9783540446477"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/3-540-44647-8_16","relation":{},"ISSN":["0302-9743"],"issn-type":[{"value":"0302-9743","type":"print"}],"subject":[],"published":{"date-parts":[[2001]]}}}