{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,6]],"date-time":"2026-04-06T10:27:53Z","timestamp":1775471273197,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":10,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540658894","type":"print"},{"value":"9783540489108","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1999]]},"DOI":"10.1007\/3-540-48910-x_1","type":"book-chapter","created":{"date-parts":[[2007,10,10]],"date-time":"2007-10-10T13:57:35Z","timestamp":1192024655000},"page":"1-11","source":"Crossref","is-referenced-by-count":93,"title":["Cryptanalysis of RSA with Private Key d Less than N 0.292"],"prefix":"10.1007","author":[{"given":"Dan","family":"Boneh","sequence":"first","affiliation":[]},{"given":"Glenn","family":"Durfee","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[1999,4,15]]},"reference":[{"key":"1_CR1","doi-asserted-by":"crossref","unstructured":"D. Bleichenbacher, \u201cOn the security of the KMOV public key cryptosystem\u201d, Proc. of Crypto\u2019 97, pp. 235\u2013248.","DOI":"10.1007\/BFb0052239"},{"key":"1_CR2","doi-asserted-by":"publisher","first-page":"233","DOI":"10.1007\/s001459900030","volume":"10","author":"D. Coppersmith","year":"1997","unstructured":"D. Coppersmith, \u201cSmall solutions to polynomial equations, and low exponent RSA vulnerabilities\u201d, J. of Cryptology, Vol. 10, pp. 233\u2013260, 1997.","journal-title":"J. of Cryptology"},{"key":"1_CR3","doi-asserted-by":"publisher","first-page":"336","DOI":"10.1137\/0217019","volume":"17","author":"J. Hastad","year":"1988","unstructured":"J. Hastad, \u201cSolving simultaneous modular equations of low degree\u201d, SIAM Journal of Computing, vol. 17, pp. 336\u2013341, 1988.","journal-title":"SIAM Journal of Computing"},{"key":"1_CR4","doi-asserted-by":"crossref","unstructured":"N. Howgrave-Graham, \u201cFinding small roots of univariate modular equations revisited\u201d, Proc. Of Cryptography and Coding, LNCS 1355, Springer-Verlag, 1997, pp. 131\u2013142.","DOI":"10.1007\/BFb0024458"},{"key":"1_CR5","doi-asserted-by":"crossref","unstructured":"C. Jutla, \u201cOn finding small solutions of modular multivariate polynomial equations\u201d, Proc. of Eurocrypt\u2019 98, pp. 158\u2013170.","DOI":"10.1007\/BFb0054124"},{"key":"1_CR6","doi-asserted-by":"publisher","first-page":"515","DOI":"10.1007\/BF01457454","volume":"261","author":"A. Lenstra","year":"1982","unstructured":"A. Lenstra, H. Lenstra, and L. Lovasz. Factoring polynomial with rational coefficients. Mathematiche Annalen, 261:515\u2013534, 1982.","journal-title":"Mathematiche Annalen"},{"key":"1_CR7","doi-asserted-by":"crossref","unstructured":"L. Lovasz, \u201cAn algorithmic theory of numbers, graphs and convexity\u201d, SIAM lecture series, Vol. 50, 1986.","DOI":"10.1137\/1.9781611970203"},{"key":"1_CR8","doi-asserted-by":"publisher","first-page":"120","DOI":"10.1145\/359340.359342","volume":"21","author":"R. Rivest","year":"1978","unstructured":"R. Rivest, A. Shamir, L. Adleman, \u201cA method for obtaining digital signatures and public-key cryptosystems\u201d, Communications of the ACM, vol. 21, pp. 120\u2013126, 1978.","journal-title":"Communications of the ACM"},{"key":"1_CR9","doi-asserted-by":"publisher","first-page":"425","DOI":"10.1007\/s002000050082","volume":"8","author":"E. Verheul","year":"1997","unstructured":"E. Verheul, H. van Tilborg, \u201cCryptanalysis of less short RSA secret exponents\u201d, Applicable Algebra in Engineering, Communication and Computing, Springer-Verlag, vol. 8, pp. 425\u2013435, 1997.","journal-title":"Applicable Algebra in Engineering, Communication and Computing"},{"issue":"3","key":"1_CR10","doi-asserted-by":"publisher","first-page":"553","DOI":"10.1109\/18.54902","volume":"36","author":"M. Wiener","year":"1990","unstructured":"M. Wiener, \u201cCryptanalysis of short RSA secret exponents\u201d, IEEE Transactions on Info. Th., Vol. 36, No. 3, 1990, pp. 553\u2013558.","journal-title":"IEEE Transactions on Info. Th."}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2014 EUROCRYPT \u201999"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-48910-X_1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,3]],"date-time":"2019-05-03T17:58:50Z","timestamp":1556906330000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-48910-X_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1999]]},"ISBN":["9783540658894","9783540489108"],"references-count":10,"URL":"https:\/\/doi.org\/10.1007\/3-540-48910-x_1","relation":{},"ISSN":["0302-9743"],"issn-type":[{"value":"0302-9743","type":"print"}],"subject":[],"published":{"date-parts":[[1999]]}}}