{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,28]],"date-time":"2026-02-28T13:00:40Z","timestamp":1772283640407,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":8,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540656449","type":"print"},{"value":"9783540491620","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1999]]},"DOI":"10.1007\/3-540-49162-7_15","type":"book-chapter","created":{"date-parts":[[2007,7,31]],"date-time":"2007-07-31T23:51:55Z","timestamp":1185925915000},"page":"197-203","source":"Crossref","is-referenced-by-count":10,"title":["On the Security of RSA Screening"],"prefix":"10.1007","author":[{"given":"Jean -Sebastien","family":"Coron","sequence":"first","affiliation":[]},{"given":"David","family":"Naccache","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[1999,10,29]]},"reference":[{"key":"15_CR1","series-title":"Lect Notes Comput Sci","volume-title":"Advances in Cryptology-eurocrypt\u201998 Proceedings","author":"M. Bellare","year":"1998","unstructured":"M. Bellare, J. Garray and T. Rabin, Fast batch verification for modular exponentiation and digital signatures, Advances in Cryptology-eurocrypt\u201998 Proceedings, Lecture Notes in Computer Science vol. 1403, K. Nyberged., Springer-Verlag, 1998. Full on-line version via http:\/\/www-cse.ucsd.edu\/users\/mihir , 1998."},{"key":"15_CR2","series-title":"Lect Notes Comput Sci","volume-title":"Advances in Cryptology-eurocrypt\u201996 Proceedings","author":"M. Bellare","year":"1996","unstructured":"M. Bellare, P. Rogaway, The exact security of digital signatures: How to sign with RSA and Rabin, Advances in Cryptology-eurocrypt\u201996 Proceedings, Lecture Notes in Computer Science vol. 1070, U. Maurer ed., Springer-Verlag, 1996."},{"key":"15_CR3","doi-asserted-by":"crossref","unstructured":"M. Bellare, P. Rogaway, Random oracles are practical: A paradigm for designing efficient protocols, First ACM Conference on computer and communications security, ACM, 1994.","DOI":"10.1145\/168588.168596"},{"key":"15_CR4","unstructured":"G. Davida, Chosen signature cryptanalysis of the RSA (MIT) public-key cryptosystem, Technical report TR-CS-82-2, Department of EECS, University of Wisconsin, 1982."},{"key":"15_CR5","doi-asserted-by":"publisher","first-page":"1592","DOI":"10.1049\/el:19941112","volume":"30","author":"C. Lim","year":"1994","unstructured":"C. Lim & P. Lee, Security of interactive DSA batch verification, Electronic Letters, vol. 30, no. 19, pp. 1592\u20131593, 1994.","journal-title":"Electronic Letters"},{"key":"15_CR6","unstructured":"D. Naccache, Unless modified Fiat-Shamir is insecure, Proceedings of the third symposium on state and progress of research in cryptography: SPRC\u201993, Fondazione Ugo Bordoni, W. Wolfowiczed., Roma, Italia, pp. 172\u2013180, 1993."},{"key":"15_CR7","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1007\/BFb0053426","volume-title":"Advances in Cryptology-eurocrypt94 Proceedings","author":"D. Naccache","year":"1995","unstructured":"D. Naccache, D. M\u2019ra\u00efhi, S. Vaudenay & D. Raphaeli, Can DSA be improved? Complexity trade-offs with the digital signature standard, Advances in Cryptology-eurocrypt94 Proceedings, Lecture Notes in Computer Science vol. 950, A. de Santised., Springer-Verlag, pp. 77\u201385, 1995."},{"key":"15_CR8","doi-asserted-by":"publisher","first-page":"120","DOI":"10.1145\/359340.359342","volume":"21","author":"R. Rivest","year":"1978","unstructured":"R. Rivest, A. Shamir, L. Adleman, A method for obtaining digital signatures and public-key cryptosystems, Communications of the ACM, vol. 21, pp. 120\u2013126, 1978.","journal-title":"Communications of the ACM"}],"container-title":["Lecture Notes in Computer Science","Public Key Cryptography"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-49162-7_15","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,1]],"date-time":"2019-05-01T16:22:07Z","timestamp":1556727727000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-49162-7_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1999]]},"ISBN":["9783540656449","9783540491620"],"references-count":8,"URL":"https:\/\/doi.org\/10.1007\/3-540-49162-7_15","relation":{},"ISSN":["0302-9743"],"issn-type":[{"value":"0302-9743","type":"print"}],"subject":[],"published":{"date-parts":[[1999]]}}}