{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T22:38:58Z","timestamp":1725489538505},"publisher-location":"Berlin, Heidelberg","reference-count":16,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540602217"},{"type":"electronic","value":"9783540447504"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1995]]},"DOI":"10.1007\/3-540-44750-4_5","type":"book-chapter","created":{"date-parts":[[2007,8,16]],"date-time":"2007-08-16T04:39:53Z","timestamp":1187239193000},"page":"57-69","source":"Crossref","is-referenced-by-count":22,"title":["Fast Server-Aided RSA Signatures Secure Against Active Attacks"],"prefix":"10.1007","author":[{"given":"Philippe","family":"B\u00e9guin","sequence":"first","affiliation":[]},{"given":"Jean-Jacques","family":"Quisquater","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2001,7,13]]},"reference":[{"key":"5_CR1","volume-title":"The design and analysis of computer algorithms","author":"A. V. Aho","year":"1974","unstructured":"Aho, A. V., Hopcroft, J. E., Ullman, J. D.: The design and analysis of computer algorithms. Addison-Wesley, Reading, Mass. (1974)."},{"key":"5_CR2","doi-asserted-by":"crossref","unstructured":"Anderson, R. J.: Attack on server-assisted authentication protocols. Electronic Letters (1992) p. 1473.","DOI":"10.1049\/el:19920937"},{"key":"5_CR3","doi-asserted-by":"crossref","unstructured":"B\u00e9guin, P., Quisquater, J.-J.: Secure acceleration of DSS signatures using insecure server. In Proceedings of Asiacrypt\u2019 94 (To appear).","DOI":"10.1007\/BFb0000439"},{"key":"5_CR4","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"200","DOI":"10.1007\/3-540-47555-9_18","volume-title":"Advances in Cryptology \u2014 Proceedings of Eurocrypt\u2019 92","author":"E. Brickell","year":"1993","unstructured":"Brickell, E., Gordon, D. M., McCurley, K. S., Wilson, D.: Fast exponentiation with precomputation. In Advances in Cryptology \u2014 Proceedings of Eurocrypt\u2019 92 (1993) Lecture Notes in Computer Science vol. 658 Springer-Verlag pp. 200\u2013207."},{"key":"5_CR5","doi-asserted-by":"publisher","first-page":"163","DOI":"10.1109\/12.262121","volume":"43","author":"J. Burns","year":"1994","unstructured":"Burns, J., Mitchell, C. J.: Parameter selection for server-aided RSA computation schemes. IEEE Transactions on computers 43 (1994) pp. 163\u2013174.","journal-title":"IEEE Transactions on computers"},{"key":"5_CR6","doi-asserted-by":"crossref","unstructured":"Kawamura, S., Shimbo, A.: Fast server-aided secret computation protocols for modular exponentiation. IEEE Journal on selected areas communications 11 (1993).","DOI":"10.1109\/49.223880"},{"key":"5_CR7","doi-asserted-by":"publisher","first-page":"515","DOI":"10.1007\/BF01457454","volume":"261","author":"A. K. Lenstra","year":"1982","unstructured":"Lenstra, A. K., Lenstra, H. W., Lov\u00e1sz, L.: Factoring polynomials with rational coefficients. Math. Ann. 261 (1982), pp. 515\u2013534.","journal-title":"Math. Ann."},{"key":"5_CR8","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"95","DOI":"10.1007\/3-540-48658-5_11","volume-title":"Advances in Cryptology \u2014 Proceedings of Crypto\u2019 94","author":"C. H. Lim","year":"1994","unstructured":"Lim, C. H., Lee, P. J.: More flexible exponentiation with precomputation. In Advances in Cryptology \u2014 Proceedings of Crypto\u2019 94 (1994) vol. Lecture Notes in Computer Science 839 Springer-Verlag pp. 95\u2013107."},{"key":"5_CR9","unstructured":"Lim, C. H., Lee, P. J.: Security and performance of server-aided rsa computation protocols. In this Proceedings."},{"key":"5_CR10","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"296","DOI":"10.1007\/3-540-57220-1_70","volume-title":"Advances in Cryptology \u2014 Proceedings of Auscrypt\u2019 92","author":"T. Matsumoto","year":"1993","unstructured":"Matsumoto, T., Imai, H., Laih, C.-S., Yen, S.-M.: On verifiable implicit asking protocols for RSA computation. In Advances in Cryptology \u2014 Proceedings of Auscrypt\u2019 92 (1993) Lecture Notes in Computer Science vol. 718 Springer-Verlag pp. 296\u2013307."},{"key":"5_CR11","series-title":"Lect Notes Comput Sci","first-page":"497","volume-title":"Advances in Cryptology \u2014 Proceedings of Crypto\u2019 88","author":"T. Matsumoto","year":"1989","unstructured":"Matsumoto, T., Kato, K., Imai, H.: Speeding up secret computation with insecure auxiliary devices. In Advances in Cryptology \u2014 Proceedings of Crypto\u2019 88 (1989) Lecture Notes in Computer Science vol. 403 Springer-Verlag pp. 497\u2013506."},{"key":"5_CR12","unstructured":"NIST: FIPS 186 for Digital Signature Standard (DSS)."},{"key":"5_CR13","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"153","DOI":"10.1007\/3-540-47555-9_13","volume-title":"Advances in Cryptology \u2014 Proceedings of Eurocrypt\u2019 92","author":"B. Pfitzmann","year":"1993","unstructured":"Pfitzmann, B., Waidner, M.: Attacks on protocols for server-aided RSA computation. In Advances in Cryptology \u2014 Proceedings of Eurocrypt\u2019 92 (1993) Lecture Notes in Computer Science vol. 658 Springer-Verlag pp. 153\u2013162."},{"key":"5_CR14","unstructured":"Quisquater, J.-J., De Soete, M.: Speeding up smart card RSA computation with insecure coprocessors. In Proceedings of Smart Cards 2000 (1989) pp. 191\u2013197."},{"key":"5_CR15","doi-asserted-by":"publisher","first-page":"120","DOI":"10.1145\/359340.359342","volume":"21","author":"R. Rivest","year":"1978","unstructured":"Rivest, R., Shamir, A., Adleman, L.: A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM 21 (1978) pp. 120\u2013126.","journal-title":"Communications of the ACM"},{"key":"5_CR16","doi-asserted-by":"crossref","unstructured":"Yen, S.-M., Laih, C.-S.: More about the active attack on the server-aided secret computation protocol. Electronic Letters (1992) p. 2250.","DOI":"10.1049\/el:19921446"}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2014 CRYPT0\u2019 95"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-44750-4_5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,2,21]],"date-time":"2019-02-21T17:58:08Z","timestamp":1550771888000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-44750-4_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1995]]},"ISBN":["9783540602217","9783540447504"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/3-540-44750-4_5","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[1995]]}}}