{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T22:32:08Z","timestamp":1725489128529},"publisher-location":"Berlin, Heidelberg","reference-count":8,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540551881"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/3-540-46766-1_15","type":"book-chapter","created":{"date-parts":[[2007,8,11]],"date-time":"2007-08-11T11:03:27Z","timestamp":1186830207000},"page":"204-212","source":"Crossref","is-referenced-by-count":4,"title":["The Cryptanalysis of a New Public-Key Cryptosystem based on Modular Knapsacks"],"prefix":"10.1007","author":[{"given":"Yeow Meng","family":"Chee","sequence":"first","affiliation":[]},{"given":"Antoine","family":"Joux","sequence":"additional","affiliation":[]},{"given":"Jacques","family":"Stern","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"15_CR1","first-page":"303","volume-title":"Advances in Cryptology, Proceedings of CRYPTO\u2019 82","author":"L. Adleman","year":"1983","unstructured":"L. Adleman. On Breaking the Iterated Merkle-Hellman Public Key Cryptosystem, in: Advances in Cryptology, Proceedings of CRYPTO\u2019 82, Plenum Press, New York, 1983, 303\u2013308."},{"key":"15_CR2","unstructured":"A. J. Coster, B. LaMacchia, A. Joux, A. Odlyzko, C. P. Schnorr and J. Stern. Improved Low-Density Subset Sum Algorithms, to appear."},{"key":"15_CR3","doi-asserted-by":"publisher","first-page":"515","DOI":"10.1007\/BF01457454","volume":"261","author":"A. K. Lenstra","year":"1982","unstructured":"A. K. Lenstra, H. W. Lenstra Jr. and L. Lov\u00e1sz. Factoring Polynomials with Rational Coefficients, Mathematische Annalen 261 (1982), 515\u2013534.","journal-title":"Mathematische Annalen"},{"key":"15_CR4","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"405","DOI":"10.1007\/3-540-46877-3_36","volume-title":"Advances in Cryptology, Proceedings of EUROCRYPT\u2019 90","author":"V. Niemi","year":"1991","unstructured":"V. Niemi. A New Trapdoor in Knapsacks, in: Advances in Cryptology, Proceedings of EUROCRYPT\u2019 90, Lecture Notes in Computer Science 473, Springer-Verlag, Berlin, 1991, 405\u2013411."},{"key":"15_CR5","series-title":"Lect Notes Comput Sci","volume-title":"Proceedings of the FCT\u201991","author":"C. P. Schnorr","year":"1991","unstructured":"C. P. Schnorr, M. Euchner. Lattice Basis Reduction: Improved Practical Algorithms and Solving Subset Sum Problems, in: Proceedings of the FCT\u201991, Lecture Notes in Computer Science, Springer-Verlag, Berlin, to appear."},{"key":"15_CR6","first-page":"145","volume-title":"Proceedings of the 23rd IEEE Symposium on Foundations of Computer Science","author":"A. Shamir","year":"1982","unstructured":"A. Shamir. A Polynomial-Time Algorithm for Breaking the Basic Merkle-Hellman Cryptosystem, in: Proceedings of the 23rd IEEE Symposium on Foundations of Computer Science, IEEE, New York, 1982, 145\u2013152."},{"key":"15_CR7","first-page":"421","volume-title":"Proceedings of the 28th IEEE Symposium on Foundations of Computer Science","author":"J. Stern","year":"1987","unstructured":"J. Stern. Secret Linear Congruential Generators are Not Cryptographically Secure, in: Proceedings of the 28th IEEE Symposium on Foundations of Computer Science, IEEE, New York, 1987, 421\u2013426."},{"key":"15_CR8","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"313","DOI":"10.1007\/3-540-46877-3_28","volume-title":"Advances in Cryptology, Proceedings of EUROCRYPT\u2019 90","author":"J. Stern","year":"1991","unstructured":"J. Stern and P. Toffin. Cryptanalysis of a Public-Key Cryptosystem Based on Approximations by Rational Numbers, in: Advances in Cryptology, Proceedings of EUROCRYPT\u2019 90, Lecture Notes in Computer Science 473, Springer-Verlag, Berlin, 1991, 313\u2013317."}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2014 CRYPTO \u201991"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-46766-1_15.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,17]],"date-time":"2020-11-17T16:13:23Z","timestamp":1605629603000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-46766-1_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540551881"],"references-count":8,"URL":"https:\/\/doi.org\/10.1007\/3-540-46766-1_15","relation":{},"subject":[]}}