{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T22:24:14Z","timestamp":1725488654672},"publisher-location":"Berlin, Heidelberg","reference-count":7,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540564133"},{"type":"electronic","value":"9783540475552"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1993]]},"DOI":"10.1007\/3-540-47555-9_31","type":"book-chapter","created":{"date-parts":[[2007,8,8]],"date-time":"2007-08-08T19:23:49Z","timestamp":1186601029000},"page":"378-389","source":"Crossref","is-referenced-by-count":1,"title":["Which new RSA Signatures can be Computed from RSA Signatures, Obtained in a Specific Interactive Protocol?"],"prefix":"10.1007","author":[{"given":"Jan-Hendrik","family":"Evertse","sequence":"first","affiliation":[]},{"given":"Eug\u00e8ne","family":"van Heyst","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2001,5,18]]},"reference":[{"key":"31_CR1","unstructured":"George Davida, Chosen signature cryptanalysis of the RSA (MIT) public key cryptosystem, Tech. rept. TR-CS-82-2, Dept of Electrical Engineering and Computer Science, Univ. of Wisconsin, October 1982."},{"key":"31_CR2","doi-asserted-by":"publisher","first-page":"388","DOI":"10.1145\/358027.358052","volume":"27","author":"D. Denning","year":"1984","unstructured":"Dorothy Denning, \u201cDigital signatures with RSA and other public-key cryptosystems\u201d, Comm. of the ACM, 27 (1984) pp. 388\u2013392.","journal-title":"Comm. of the ACM"},{"key":"31_CR3","series-title":"Lect Notes Comput Sci","first-page":"516","volume-title":"Advances in Cryptology-CRYPTO 85","author":"Y. Desmedt","year":"1985","unstructured":"Yvo Desmedt and Andrew Odlyzko, \u201cA chosen text attack on the RSA cryptosystem and some discrete logarithm schemes\u201d, Advances in Cryptology-CRYPTO 85, H.C. Williams ed., LNCS 218, Springer-Verlag, pp. 516\u2013522."},{"key":"31_CR4","series-title":"Lect Notes Comput Sci","first-page":"58","volume-title":"Advances in Cryptology-CRYPTO 85","author":"S. Even","year":"1985","unstructured":"Shimon Even, Oded Goldreich and Adi Shamir, \u201cOn the security of ping-pong protocols when implemented using the RSA\u201d, Advances in Cryptology-CRYPTO 85, H.C. Williams ed., LNCS 218, Springer-Verlag, pp. 58\u201372."},{"key":"31_CR5","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1007\/BF00191320","volume":"5","author":"J.-H. Evertse","year":"1992","unstructured":"Jan-Hendrik Evertse, Eug\u00e8ne van Heyst, \u201cWhich new RSA signatures can be computed from certain given RSA signatures?\u201d, Journal of Cryptology, 5 (1992), pp. 41\u201352.","journal-title":"Journal of Cryptology"},{"key":"31_CR6","doi-asserted-by":"publisher","first-page":"499","DOI":"10.1137\/0208040","volume":"8","author":"R. Kannan","year":"1979","unstructured":"R. Kannan and A. Bachem, \u201cPolynomial algorithms for computing the Smith and Hermite normal forms of an integer matrix\u201d, SIAM Journal on Computing, 8 (1979) pp. 499\u2013507.","journal-title":"SIAM Journal on Computing"},{"key":"31_CR7","doi-asserted-by":"publisher","first-page":"120","DOI":"10.1145\/359340.359342","volume":"21","author":"R.L. Rivest","year":"1978","unstructured":"R.L. Rivest, A. Shamir, and L. Adleman, A Method for Obtaining Digital Signatures and Public Key Cryptosystems, Comm. of the ACM\n                  21 (1978) pp. 120\u2013126.","journal-title":"Comm. of the ACM"}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2014 EUROCRYPT\u2019 92"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-47555-9_31","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,1,24]],"date-time":"2019-01-24T16:59:17Z","timestamp":1548349157000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-47555-9_31"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1993]]},"ISBN":["9783540564133","9783540475552"],"references-count":7,"URL":"https:\/\/doi.org\/10.1007\/3-540-47555-9_31","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[1993]]}}}