{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T23:06:55Z","timestamp":1725664015145},"publisher-location":"Berlin, Heidelberg","reference-count":16,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540572206"},{"type":"electronic","value":"9783540479765"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1993]]},"DOI":"10.1007\/3-540-57220-1_64","type":"book-chapter","created":{"date-parts":[[2012,2,26]],"date-time":"2012-02-26T07:20:59Z","timestamp":1330240859000},"page":"217-230","source":"Crossref","is-referenced-by-count":0,"title":["Secure addition sequence and its applications on the server-aided secret computation protocols"],"prefix":"10.1007","author":[{"given":"Chi-Sung","family":"Laih","sequence":"first","affiliation":[]},{"given":"Sung-Ming","family":"Yen","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2005,5,31]]},"reference":[{"key":"18_CR1","doi-asserted-by":"crossref","first-page":"120","DOI":"10.1145\/359340.359342","volume":"21","author":"R.L. Rivest","year":"1978","unstructured":"R.L. Rivest, A. Shamir, and L. Adleman, \u201dA method for obtaining digital signatures and public-key cryptosystem,\u201d Commun. ACM, Vol. 21, pp.120\u2013126, Feb. 1978.","journal-title":"Commun. ACM"},{"key":"18_CR2","doi-asserted-by":"crossref","first-page":"644","DOI":"10.1109\/TIT.1976.1055638","volume":"IT-22","author":"W. Diffie","year":"1976","unstructured":"Diffie, W., and Hellman, M.E., \u201dNew directions in cryptography,\u201d IEEE Trans. on Inform. Theory, vol.IT-22, pp.644\u2013654, 1976.","journal-title":"IEEE Trans. on Inform. Theory"},{"key":"18_CR3","unstructured":"T.Matsumoto and H. Imai, \u201dHow to use servers without releasing Privacy-Making IC cards more powerful,\u201d IEICE Technical Report, Rep. ISEC88-33."},{"key":"18_CR4","doi-asserted-by":"crossref","unstructured":"T.Matsumoto, K. Kato, and H. Imai, \u201dSpeeding up secret computations with insecure auxiliary devices,\u201d Proc. of CRYPTO'88, pp.497\u2013506, 1988.","DOI":"10.1007\/0-387-34799-2_35"},{"key":"18_CR5","unstructured":"S. Kawamura and A. Shimbo, \u201dComputation methods for RSA with the aid of powerful terminals,\u201d 1989 Sym.on Cryptography and Inf. Security, Gotemba, Japan (Feb. 2\u20134 1989)."},{"key":"18_CR6","unstructured":"S. Kawamura and A. Shimbo, \u201dA method for computing an RSA signature with the aid of an auxiliary termimal,\u201d 1989 IEICE Autumn Natl. Conv. Rec. A-105."},{"key":"18_CR7","unstructured":"J.J. Quisquater and M. De Soete, \u201dSpeeding up smart card RSA computations with insecure coprocessors,\u201d Proc. SMART CARD 2000. Amsterdam (Oct. 1989)."},{"issue":"No.7","key":"18_CR8","first-page":"1073","volume":"E73","author":"S. Kawamura","year":"1990","unstructured":"S. Kawamura and A. Shimbo, \u201dPerformance analysis of Server-Aided Secret Computation protocols for the RSA cryptosystem,\u201d The Trans. of the IEICE, vol. E73, No. 7, pp. 1073\u20131080, Jul. 1990.","journal-title":"The Trans. of the IEICE"},{"key":"18_CR9","volume-title":"The art of computer programming, Vol. II: Seminumerical algorithms","author":"D.E. Knuth","year":"1969","unstructured":"D.E. Knuth, The art of computer programming, Vol. II: Seminumerical algorithms. Reading, Addison Wesley, 1969."},{"key":"18_CR10","doi-asserted-by":"crossref","unstructured":"J. Bos, M. Coster, \u201dAddition Chain Heuristics,\u201d Proceedings CRYPTO'89, Springer-Verlag Lecture Notes in Computer Science, pp.400\u2013407.","DOI":"10.1007\/0-387-34805-0_37"},{"key":"18_CR11","doi-asserted-by":"crossref","first-page":"638","DOI":"10.1137\/0210047","volume":"3","author":"P. Downey","year":"1981","unstructured":"P. Downey B. Leony and R. Sethi, \u201dComputing sequences with addition chains,\u201d Siam Journal Comput. 3 (1981) pp.638\u2013696.","journal-title":"Siam Journal Comput."},{"key":"18_CR12","doi-asserted-by":"crossref","unstructured":"Andrew Yao, \u201dOn the evaluation of powers,\u201d Siam. J. Comput. 5, (1976).","DOI":"10.1137\/0205008"},{"key":"18_CR13","doi-asserted-by":"crossref","unstructured":"C.S. Laih, S.M. Yen and L. Harn, \u201dTwo Efficient Server-Aided Secret Computation Protocols Based on the Addition Sequence,\u201d Proc. of the ASIACRYPT'91 and to be appeared in The Lecture Notes in Computer Science by Springer-Verlag.","DOI":"10.1007\/3-540-57332-1_38"},{"key":"18_CR14","doi-asserted-by":"crossref","unstructured":"B. Pfitzmann and M. Waidner, \u201dAttacks on Protocols for Server-Aided RSA Computation,\u201d Proc. of the EUROCRYPT'92.","DOI":"10.1007\/3-540-47555-9_13"},{"issue":"No.17","key":"18_CR15","doi-asserted-by":"crossref","first-page":"1387","DOI":"10.1049\/el:19900891","volume":"26","author":"A. Shimbo","year":"1990","unstructured":"A. Shimbo and S. Kawamura, \u201dFactorization Attack on Certain Server-Aided Computation Protocols for the RSA Secret Transformation,\u201d Electronics Letters, Vol. 26, No. 17, pp. 1387\u20131388, 1990.","journal-title":"Electronics Letters"},{"key":"18_CR16","unstructured":"T. Matsumoto, H. Imai, C. S. Laih, and S. M. Yen, \u201dOn Verifiable Implicit Asking Protocals for RSA Computation,\u201d Proc. of the AUSCRYPT'92."}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2014 AUSCRYPT '92"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-57220-1_64.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,17]],"date-time":"2020-11-17T16:09:35Z","timestamp":1605629375000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-57220-1_64"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1993]]},"ISBN":["9783540572206","9783540479765"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/3-540-57220-1_64","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[1993]]}}}