{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,11]],"date-time":"2026-03-11T13:33:33Z","timestamp":1773236013317,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":15,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540436775","type":"print"},{"value":"9783540478706","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2002]]},"DOI":"10.1007\/3-540-47870-1_12","type":"book-chapter","created":{"date-parts":[[2007,5,21]],"date-time":"2007-05-21T11:16:44Z","timestamp":1179746204000},"page":"192-200","source":"Crossref","is-referenced-by-count":6,"title":["A Cryptanalysis of the High-Bandwidth Digital Content Protection System"],"prefix":"10.1007","author":[{"given":"Scott","family":"Crosby","sequence":"first","affiliation":[]},{"given":"Ian","family":"Goldberg","sequence":"additional","affiliation":[]},{"given":"Robert","family":"Johnson","sequence":"additional","affiliation":[]},{"given":"Dawn","family":"Song","sequence":"additional","affiliation":[]},{"given":"David","family":"Wagner","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2002,5,7]]},"reference":[{"key":"12_CR1","unstructured":"A. Shamir. Identity-based cyrptosystems and signature schemes. In Crypto\u201984, 1984."},{"key":"12_CR2","unstructured":"Y. Desmedt and J. Quisquater. Public-key systems based on the difficulty of tampering. In Crypto\u201986, 1986."},{"key":"12_CR3","doi-asserted-by":"crossref","unstructured":"H. Tanaka. A realization scheme for the identity-based cryptosystem. In Crypto\u201987, 1987.","DOI":"10.1007\/3-540-48184-2_29"},{"key":"12_CR4","doi-asserted-by":"crossref","unstructured":"S. Tsuji and T. Itoh. An ID-based cryptosystem based on the discrete logarithm problem. In IEEE Journal of Selected Areas in Communication, volume 7, 1989.","DOI":"10.1109\/49.17709"},{"key":"12_CR5","doi-asserted-by":"crossref","unstructured":"Dan Boneh and Matthew Franklin. Identity-based encryption from the Weil pairing. In CRYPTO\u20192001, 2001.","DOI":"10.1007\/3-540-44647-8_13"},{"key":"12_CR6","unstructured":"David Barth. Personal communication. September 2001."},{"key":"12_CR7","doi-asserted-by":"crossref","unstructured":"Rolf Blom. An optimal class of symmetric key generation systems. In T. Beth, N. Cot, and I. Ingemarsson, editors, Proc. EUROCRYPT 84, pages 335\u2013338. Springer-Verlag, 1985.","DOI":"10.1007\/3-540-39757-4_22"},{"key":"12_CR8","doi-asserted-by":"crossref","unstructured":"Rolf Blom. Non-public key distribution. In R. L. Rivest, A. Sherman, and D. Chaum, editors, Proc. CRYPTO 82, pages 231\u2013236, New York, 1983. Plenum Press.","DOI":"10.1007\/978-1-4757-0602-4_22"},{"key":"12_CR9","unstructured":"Scott Crosby. Apparent HDCP authentication protocol weaknesses. http:\/\/cryptome.org\/hdcp-weakness.htm , May 2001."},{"key":"12_CR10","unstructured":"Keith Irwin. Four simple cryptographic attacks on HDCP. http:\/\/www.angelfire.com\/realm\/keithirwin\/HDCPAttacks.html , July 2001."},{"key":"12_CR11","unstructured":"Niels Ferguson. Censorship in action: Silenced by the DMCA. http:\/\/www.macfergus.com\/niels\/dmca\/index.html , August 2001."},{"key":"12_CR12","unstructured":"Intel Corporation. High-Bandwidth Digital Content Protection System, 1.00 edition, February 2000."},{"key":"12_CR13","unstructured":"Hitachi, Ltd. and Intel Corporation and Matsushita Electronic Industrial Co., Ltd. and Sony Corporation and Toshiba Corporation. Digital Transmission Content Protection System, Volume 1, July 2001."},{"key":"12_CR14","unstructured":"Semiconductor Design Solutions. RSA2048A RSA coprocessor data sheet. http:\/\/www.sidsa.com\/datasheets\/RSA\/ds_rsa2048a_short.html ."},{"key":"12_CR15","unstructured":"3GPP Security Algorithms Group of Experts. 3GPP KASUMI evaluation report. Technical report, 3rd Generation Partnership Project, Oct 2000."}],"container-title":["Lecture Notes in Computer Science","Security and Privacy in Digital Rights Management"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-47870-1_12","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,4,28]],"date-time":"2019-04-28T06:25:01Z","timestamp":1556432701000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-47870-1_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2002]]},"ISBN":["9783540436775","9783540478706"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/3-540-47870-1_12","relation":{},"ISSN":["0302-9743"],"issn-type":[{"value":"0302-9743","type":"print"}],"subject":[],"published":{"date-parts":[[2002]]}}}