{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T22:39:03Z","timestamp":1725489543176},"publisher-location":"Berlin, Heidelberg","reference-count":23,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540602217"},{"type":"electronic","value":"9783540447504"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1995]]},"DOI":"10.1007\/3-540-44750-4_6","type":"book-chapter","created":{"date-parts":[[2007,8,16]],"date-time":"2007-08-16T08:39:53Z","timestamp":1187253593000},"page":"70-83","source":"Crossref","is-referenced-by-count":27,"title":["Security and Performance of Server-Aided RSA Computation Protocols"],"prefix":"10.1007","author":[{"given":"Chae Hoon","family":"Lim","sequence":"first","affiliation":[]},{"given":"Pil Joong","family":"Lee","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2001,7,13]]},"reference":[{"key":"6_CR1","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"497","DOI":"10.1007\/0-387-34799-2_35","volume-title":"Proc. of Crypto\u201988","author":"T. Matsumoto","year":"1990","unstructured":"T. Matsumoto, K. Kato and H. Imai, Speeding up secret computations with insecure auxiliary devices, In Proc. of Crypto\u201988, Springer-Verlag, LNCS 403, 497\u2013506 (1990)."},{"key":"6_CR2","unstructured":"J.J. Quisquater and M. De Soete, Speeding up smart card RSA computation with insecure coprocessors, In Proc. Smart Card 2000, North-Holland, 191\u2013197 (1991)."},{"key":"6_CR3","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"450","DOI":"10.1007\/3-540-57332-1_38","volume-title":"Proc. of Asiacrypt\u201991","author":"C.S. Laih","year":"1993","unstructured":"C.S. Laih, S.M. Yen and L. Harn, Two efficient server-aided secret computation protocols based on addition chain sequence, In Proc. of Asiacrypt\u201991, S.V., LNCS 739, 450\u2013459 (1993)."},{"key":"6_CR4","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"296","DOI":"10.1007\/3-540-57220-1_70","volume-title":"Proc. of Auscrypt\u201992","author":"T. Matsumoto","year":"1993","unstructured":"T. Matsumoto, H. Imai, C.S. Laih and S.M. Yen, On verifiable implicit asking protocols for RSA computation, In Proc. of Auscrypt\u201992, S.V., LNCS 718, 296\u2013307 (1993)."},{"issue":"5","key":"6_CR5","first-page":"778","volume":"11","author":"S. Kawamura","year":"1993","unstructured":"S. Kawamura and A. Shimbo, Fast server-aided secret computation protocols for modular exponentiation, IEEE JSAC, 11(5), 778\u2013784 (1993).","journal-title":"IEEE JSAC"},{"issue":"7","key":"6_CR6","first-page":"1073","volume":"73","author":"S. Kawamura","year":"1990","unstructured":"S. Kawamura and A. Shimbo, Performance analysis of server-aided secret computation protocols, Trans. IEICE, 73(7), 1073\u20131080 (1990).","journal-title":"Trans. IEICE"},{"issue":"17","key":"6_CR7","doi-asserted-by":"publisher","first-page":"1387","DOI":"10.1049\/el:19900891","volume":"26","author":"A. Shimbo","year":"1990","unstructured":"A. Shimbo and S. Kawamura, Factorization attack on certain server-aided secret computation protocols for the RSA secret transformation, Elect. Lett., 26(17), 1387\u20131388 (1990).","journal-title":"Elect. Lett."},{"key":"6_CR8","series-title":"Lect Notes Comput Sci","volume-title":"Proc. of Eurocrypt\u201992","author":"B. Pfitzmann","year":"1993","unstructured":"B. Pfitzmann and M. Waidner, Attacks on protocols for server-aided RSA computation, In Proc. of Eurocrypt\u201992, S.V., LNCS 658 (1993)."},{"issue":"15","key":"6_CR9","doi-asserted-by":"publisher","first-page":"1473","DOI":"10.1049\/el:19920937","volume":"28","author":"R. J. Anderson","year":"1992","unstructured":"R. J. Anderson, Attack on server-aided authentication protocols, Elect. Lett., 28(15), 1473 (1992).","journal-title":"Elect. Lett."},{"issue":"24","key":"6_CR10","doi-asserted-by":"publisher","first-page":"2250","DOI":"10.1049\/el:19921446","volume":"28","author":"S.M. Yen","year":"1992","unstructured":"S.M. Yen and C.S. Laih, More about the active attack on the server-aided secret computation protocol, Elect. Lett., 28(24), 2250 (1992).","journal-title":"Elect. Lett."},{"issue":"2","key":"6_CR11","doi-asserted-by":"publisher","first-page":"163","DOI":"10.1109\/12.262121","volume":"43","author":"J. Burns","year":"1994","unstructured":"J. Burns and C.J. Mitchell, Parameter selection for server-aided RSA computation schemes, IEEE Trans. Computers, 43(2), 163\u2013174 (1994).","journal-title":"IEEE Trans. Computers"},{"issue":"1","key":"6_CR12","first-page":"59","volume":"E78-A","author":"S. Kawamura","year":"1995","unstructured":"S. Kawamura, Information leakage measurement in a distributed computation protocol, IEICE Trans. Fundamentals, E78-A(1), 59\u201366 (1995).","journal-title":"IEICE Trans. Fundamentals"},{"key":"6_CR13","unstructured":"P. B\u00e9guin and J.J. Quisquater, Fast server-aided RSA signatures secure against active attacks, In this proceedings."},{"key":"6_CR14","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"200","DOI":"10.1007\/3-540-47555-9_18","volume-title":"Proc. of Eurocrypt\u201992","author":"E.F. Brickell","year":"1993","unstructured":"E.F. Brickell, D.M. Gordon, K.S. McCurley and D.B. Wilson, Fast exponentiation with precomputation, In Proc. of Eurocrypt\u201992, S.V., LNCS 658, 200\u2013207 (1993)."},{"key":"6_CR15","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"403","DOI":"10.1007\/3-540-39799-X_29","volume-title":"Proc. of Crypto\u201985","author":"J. Hastard","year":"1986","unstructured":"J. Hastard, On using RSA with low exponent in a public key network, In Proc. of Crypto\u201985, S.V., LNCS 218, 403\u2013408 (1986)."},{"key":"6_CR16","unstructured":"T. Matsumoto, K. Kato and H. Imai, How to ask and verify oracles for speeding up secret computations (Part 2), IEICE TR, IT89-24 (1989)."},{"key":"6_CR17","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"239","DOI":"10.1007\/0-387-34805-0_22","volume-title":"Proc. of Crypto\u201989","author":"C.P. Schnorr","year":"1990","unstructured":"C.P. Schnorr, Efficient identification and signatures for smart cards, In Proc. of Crypto\u201989, S.V., LNCS 435, 239\u2013252 (1990)."},{"issue":"3","key":"6_CR18","doi-asserted-by":"publisher","first-page":"161","DOI":"10.1007\/BF00196725","volume":"4","author":"C.P. Schnorr","year":"1991","unstructured":"C.P. Schnorr, Efficient signature generation by smart cards, J. Cryptology 4(3), 161\u2013174 (1991).","journal-title":"J. Cryptology"},{"key":"6_CR19","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"71","DOI":"10.1007\/3-540-46416-6_6","volume-title":"Proc. of Eurocrypt\u201991","author":"P. Rooij de","year":"1991","unstructured":"P. de Rooij, On the security of the Schnorr scheme using preprocessing, In Proc. of Eurocrypt\u201991, S.V., LNCS 547, 71\u201378 (1991)"},{"key":"6_CR20","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"435","DOI":"10.1007\/3-540-48285-7_37","volume-title":"Proc. of Eurocrypt\u201993","author":"P. Rooij de","year":"1994","unstructured":"P. de Rooij, On Schnorr\u2019s preprocessing for digital signature schemes, In Proc. of Eurocrypt\u201993, S.V., LNCS 765, 435\u2013439 (1994)."},{"key":"6_CR21","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"95","DOI":"10.1007\/3-540-48658-5_11","volume-title":"Proc. of Crypto\u201994","author":"C.H. Lim","year":"1994","unstructured":"C.H. Lim and P.J. Lee, More flexible exponentiation with precomputation, In Proc. of Crypto\u201994, S.V., LNCS 839, 95\u2013107 (1994)."},{"key":"6_CR22","doi-asserted-by":"publisher","first-page":"553","DOI":"10.1109\/18.54902","volume":"IT-36","author":"M.J. Wiener","year":"1990","unstructured":"M.J. Wiener, Cryptanalysis of short RSA secret exponents, IEEE Trans. Inform. Theory, IT-36, 553\u2013558 (1990).","journal-title":"IEEE Trans. Inform. Theory"},{"key":"6_CR23","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"230","DOI":"10.1007\/3-540-46877-3_21","volume-title":"Proc. of Eurocrypt\u201990","author":"S.R. Dusse","year":"1991","unstructured":"S.R. Dusse and B.S. Kaliski Jr., A cryptographic library for the Motorola DSP 5600, In Proc. of Eurocrypt\u201990, S.V., LNCS 473, 230\u2013244 (1991)."}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2014 CRYPT0\u2019 95"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-44750-4_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,10,10]],"date-time":"2018-10-10T04:35:34Z","timestamp":1539146134000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-44750-4_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1995]]},"ISBN":["9783540602217","9783540447504"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/3-540-44750-4_6","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[1995]]}}}