{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,9]],"date-time":"2026-05-09T02:58:08Z","timestamp":1778295488492,"version":"3.51.4"},"publisher-location":"Berlin, Heidelberg","reference-count":16,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540564133","type":"print"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/3-540-47555-9_13","type":"book-chapter","created":{"date-parts":[[2007,8,8]],"date-time":"2007-08-08T23:23:49Z","timestamp":1186615429000},"page":"153-162","source":"Crossref","is-referenced-by-count":33,"title":["Attacks on Protocols for Server-Aided RSA Computation"],"prefix":"10.1007","author":[{"given":"Birgit","family":"Pfitzmann","sequence":"first","affiliation":[]},{"given":"Michael","family":"Waidner","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"1","key":"13_CR1","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1016\/0022-0000(89)90018-4","volume":"39\/","author":"89","year":"1989","unstructured":"89 Martin Abadi, Joan Feigenbaum, Joe Kilian: On Hiding Information from an Oracle; Journal of Computer and System Sciences 39\/1 (1989) 21\u201350.","journal-title":"Journal of Computer and System Sciences"},{"key":"13_CR2","unstructured":"92 Ross Anderson: Personal communication, 26.5.1992; to be submitted to Electronics Letters."},{"key":"13_CR3","series-title":"Lect Notes Comput Sci","first-page":"74","volume-title":"Crypto\u2019 89","author":"90","year":"1990","unstructured":"90 Paul Barrett, Raymund Eisele: The smart diskette \u2014 A universal user token and personal crypto-engine; Crypto\u2019 89, LNCS 435, Springer-Verlag, Heidelberg 1990, 74\u201379."},{"key":"13_CR4","unstructured":"92 Jurjen Bos: Practical Privacy; Proefschrift, Technische Universiteit Eindhoven 1992."},{"key":"13_CR5","series-title":"Lect Notes Comput Sci","first-page":"477","volume-title":"Crypto\u2019 85","author":"86","year":"1986","unstructured":"86 Joan Feigenbaum: Encrypting Problem Instances, Or..., Can You Take Advantage of Someone Without Having to Trust Him?; Crypto\u2019 85, LNCS 218, Springer-Verlag, Berlin 1986, 477\u2013488."},{"issue":"7","key":"13_CR6","first-page":"1073","volume":"E73\/","author":"90","year":"1990","unstructured":"90 Shin-ichi Kawamura, Atsushi Shimbo: Performance Analysis of Server-Aided Secret Computation Protocols for the RSA Cryptosystem; The Transactions of The Institute of Electronics, Information and Communication Engineers IEICE, E73\/7 (1990) 1073\u20131080.","journal-title":"The Transactions of The Institute of Electronics, Information and Communication Engineers IEICE"},{"key":"13_CR7","unstructured":"91 Chi-Sung Laih, Sung-Ming Yen, Lein Harn: Two Efficient Server-Aided Secret Computation Protocols Based on the Addition Sequence; Asiacrypt\u2019 91 \u2014 Abstracts, 270\u2013274."},{"key":"13_CR8","series-title":"Lect Notes Comput Sci","first-page":"409","volume-title":"Eurocrypt\u2019 91","author":"91","year":"1991","unstructured":"91 Tsutomu Matsumoto, Hideki Imai: Human Identification Through Insecure Channel; Eurocrypt\u2019 91, LNCS 547, Springer-Verlag, Berlin 1991, 409\u2013421."},{"key":"13_CR9","series-title":"Lect Notes Comput Sci","first-page":"497","volume-title":"Crypto\u2019 88","author":"90","year":"1990","unstructured":"90 Tsutomu Matsumoto, Koki Kato, Hideki Imai: Speeding up Secret Computations with Insecure Auxiliary Devices; Crypto\u2019 88, LNCS 403, Springer-Verlag, Berlin 1990, 497\u2013506."},{"key":"13_CR10","first-page":"133","volume-title":"SMART CARD 2000 (1987)","author":"89","year":"1989","unstructured":"89 Wyn L. Price, Bernard Chorley: The Intelligent Token or\u2019 super-Smart\u2019 Card; SMART CARD 2000 (1987), North-Holland, Amsterdam 1989, 133\u2013138."},{"issue":"21","key":"13_CR11","doi-asserted-by":"publisher","first-page":"905","DOI":"10.1049\/el:19820617","volume":"18\/","author":"82","year":"1982","unstructured":"82 Jean-Jaques Quisquater, C. Couvreur: Fast Decipherment Algorithm for RSA Public-Key Cryptosystem; Electronics Letters 18\/21 (1982) 905\u2013907.","journal-title":"Electronics Letters"},{"key":"13_CR12","first-page":"191","volume-title":"Proceedings Smart Cards 2000 (1989)","author":"91","year":"1991","unstructured":"91 Jean-Jaques Quisquater, Marijke De Soete: Speeding up Smart Card RSA Computation with Insecure Coprocessors; Proceedings Smart Cards 2000 (1989), North-Holland, Amsterdam 1991, 191\u2013197."},{"key":"13_CR13","first-page":"199","volume-title":"Proceedings Smart Cards 2000 (1989)","author":"91","year":"1991","unstructured":"91 Jean-Jaques Quisquater, Dominique de Waleffe, Jean-Pierre Bournas: Corsair: A chip card with fast RSA capability; Proceedings Smart Cards 2000 (1989), North-Holland, Amsterdam 1991, 199\u2013206."},{"issue":"2","key":"13_CR14","doi-asserted-by":"publisher","first-page":"120","DOI":"10.1145\/359340.359342","volume":"21\/","author":"78","year":"1978","unstructured":"78 Ronald L. Rivest, Adi Shamir, Leonard Adleman: A Method for Obtaining Digital Signatures and Public-Key Cryptosystems; Communications of the ACM 21\/2 (1978) 120\u2013126, reprinted: 26\/1 (1983) 96\u201399.","journal-title":"Communications of the ACM"},{"issue":"17","key":"13_CR15","doi-asserted-by":"publisher","first-page":"1387","DOI":"10.1049\/el:19900891","volume":"26\/","author":"90","year":"1990","unstructured":"90 Atsushi Shimbo, Shin-ichi Kawamura; Factorisation attack on certain server-aided computation protocols for the RSA secret transformation; Electronics Letters 26\/17 (1990) 1387\u20131388.","journal-title":"Electronics Letters"},{"key":"13_CR16","series-title":"Lect Notes Comput Sci","first-page":"502","volume-title":"Crypto\u2019 90","author":"91","year":"1991","unstructured":"91 Dominique de Waleffe, Jean-Jaques Quisquater: CORSAIR: A Smart Card for Public Key Cryptosystems; Crypto\u2019 90, LNCS 537, Springer-Verlag, Berlin 1991, 502\u2013513."}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2014 EUROCRYPT\u2019 92"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-47555-9_13.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,17]],"date-time":"2020-11-17T21:13:53Z","timestamp":1605647633000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-47555-9_13"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540564133"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/3-540-47555-9_13","relation":{},"subject":[]}}