{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T22:39:11Z","timestamp":1725489551724},"publisher-location":"Berlin, Heidelberg","reference-count":18,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540602217"},{"type":"electronic","value":"9783540447504"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1995]]},"DOI":"10.1007\/3-540-44750-4_23","type":"book-chapter","created":{"date-parts":[[2007,8,16]],"date-time":"2007-08-16T08:39:53Z","timestamp":1187253593000},"page":"287-296","source":"Crossref","is-referenced-by-count":6,"title":["Cryptanalysis of the Immunized LL Public Key Systems"],"prefix":"10.1007","author":[{"given":"Yair","family":"Frankel","sequence":"first","affiliation":[]},{"given":"Moti","family":"Yung","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2001,7,13]]},"reference":[{"key":"23_CR1","doi-asserted-by":"crossref","unstructured":"W. Alexi, B. Chor, O. Goldreich and C. P. Schnorr, RSA and Rabin functions: certain parts are as secure as the whole, SIAM J. Computing vol. 17(2). 1988.","DOI":"10.1137\/0217013"},{"key":"23_CR2","volume-title":"Introduction to analytic number theory","author":"T. M. Apostol","year":"1976","unstructured":"T. M. Apostol Introduction to analytic number theory, Springer-Verlag, New York, 1976."},{"key":"23_CR3","doi-asserted-by":"crossref","unstructured":"M. Bellare and P. Rogaway, Random Oracles are Practical: a paradigm for designing efficient protocols, ACM, 1-st Comp. and Com. Sec. 1993.","DOI":"10.1145\/168588.168596"},{"key":"23_CR4","unstructured":"I. Damg\u00e5rd, Towards practical public key cryptosystems secure against chosen ciphertext attacks, Advances in Cryptology-Proc. of Crypto\u2019 91."},{"key":"23_CR5","doi-asserted-by":"crossref","unstructured":"Y. Desmedt, Society and group oriented cryptography: a new concept, Advances in Cryptology, Proc. of Crypto\u2019 87, Springer-Verlag, 1988.","DOI":"10.1007\/3-540-48184-2_8"},{"key":"23_CR6","unstructured":"Y. Desmedt and Y. Frankel, Threshold cryptosystems, Advances in Cryptology, Proc. of Crypto\u2019 89 Springer-Verlag, 1990."},{"issue":"6","key":"23_CR7","doi-asserted-by":"publisher","first-page":"644","DOI":"10.1109\/TIT.1976.1055638","volume":"22","author":"W. Diffie","year":"1976","unstructured":"W. Diffie and M. Hellman, New Directions in Cryptography, IEEE Trans. on Information Theory 22(6), 1976, pp. 644\u2013654.","journal-title":"IEEE Trans. on Information Theory"},{"key":"23_CR8","doi-asserted-by":"crossref","unstructured":"D. Dolev, C. Dwork and M. Naor, Non-Malleable Cryptography, Proc. of the 23rd Annual ACM Symposium on the Theory of Computing, 1991, pp. 542\u2013560.","DOI":"10.1145\/103418.103474"},{"key":"23_CR9","doi-asserted-by":"publisher","first-page":"465","DOI":"10.1109\/TIT.1985.1057073","volume":"31","author":"T. Gamal El","year":"1985","unstructured":"T. El Gamal, A Public key cryptosystem and a signature scheme based on discrete logarithm, IEEE Trans. on Information Theory 31, 465\u2013472, 1985.","journal-title":"IEEE Trans. on Information Theory"},{"key":"23_CR10","unstructured":"M.K. Franklin and M.K. Reiter, Adaptive Chosen Ciphertext Security for RSA from G-Q Signatures, Preliminary manuscript."},{"key":"23_CR11","doi-asserted-by":"publisher","first-page":"792","DOI":"10.1145\/6490.6503","volume":"33","author":"O. Goldreich","year":"1986","unstructured":"O. Goldreich S. Goldwasser and S. Micali, How to Construct Random Functions, J. of the ACM 33 (1986), pp. 792\u2013807.","journal-title":"J. of the ACM"},{"key":"23_CR12","doi-asserted-by":"publisher","first-page":"270","DOI":"10.1016\/0022-0000(84)90070-9","volume":"28","author":"S. Goldwasser","year":"1984","unstructured":"S. Goldwasser and S. Micali, Probabilistic Encryption, J. Com. Sys. Sci. 28 (1984), pp 270\u2013299.","journal-title":"J. Com. Sys. Sci."},{"key":"23_CR13","unstructured":"C. H. Lim and P. J. Lee, Another method for attaining security against adaptive chosen ciphertext attacks, Advances in Cryptology-Proc. of Crypto\u2019 93."},{"key":"23_CR14","doi-asserted-by":"crossref","unstructured":"M. Naor and M. Yung, Public-key cryptosystem provably secure against chosen ciphertext attack, Proc. of the 22nd Annual Symposium on the Theory of Computing, 1990, pp. 427\u2013437.","DOI":"10.1145\/100216.100273"},{"key":"23_CR15","unstructured":"M. O. Rabin, Digital Signatures and Public Key Functions as Intractable as Factoring, Technical Memo TM-212, Lab. for Computer Science, MIT, 1979."},{"key":"23_CR16","unstructured":"C. Rackoff, and D. Simon, Non-Interactive Zero-Knowledge Proof of Knowledge and Chosen Ciphertext Attacks, Advances in Cryptology-Proc. of Crypto\u2019 91."},{"key":"23_CR17","doi-asserted-by":"publisher","first-page":"120","DOI":"10.1145\/359340.359342","volume":"21","author":"R. Rivest","year":"1978","unstructured":"R. Rivest, A. Shamir and L. Adleman, A Method for Obtaining Digital Signature and Public Key Cryptosystems, Comm. of ACM, 21 (1978), pp 120\u2013126.","journal-title":"Comm. of ACM"},{"issue":"5","key":"23_CR18","doi-asserted-by":"publisher","first-page":"715","DOI":"10.1109\/49.223871","volume":"11","author":"Y. Zheng","year":"1993","unstructured":"Y. Zheng and J. Seberry, Immunizing public key cryptosystems against chosen ciphertext attacks, IEEE Jour. on Selected Areas in Communications, 11(5), 1993, pp. 715\u2013724. (Also in: Advances in Cryptology-Proc. of Crypto\u2019 92).","journal-title":"IEEE Jour. on Selected Areas in Communications"}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2014 CRYPT0\u2019 95"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-44750-4_23","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,2]],"date-time":"2019-05-02T04:18:43Z","timestamp":1556770723000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-44750-4_23"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1995]]},"ISBN":["9783540602217","9783540447504"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/3-540-44750-4_23","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[1995]]}}}