{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T23:07:12Z","timestamp":1725664032042},"publisher-location":"Berlin, Heidelberg","reference-count":15,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540572206"},{"type":"electronic","value":"9783540479765"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1993]]},"DOI":"10.1007\/3-540-57220-1_70","type":"book-chapter","created":{"date-parts":[[2012,2,26]],"date-time":"2012-02-26T07:21:25Z","timestamp":1330240885000},"page":"296-307","source":"Crossref","is-referenced-by-count":16,"title":["On verifiable implicit asking protocols for RSA computation"],"prefix":"10.1007","author":[{"given":"Tsutomu","family":"Matsumoto","sequence":"first","affiliation":[]},{"given":"Hideki","family":"Imai","sequence":"additional","affiliation":[]},{"given":"Chi-Sung","family":"Laih","sequence":"additional","affiliation":[]},{"given":"Sung-Ming","family":"Yen","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2005,5,31]]},"reference":[{"key":"24_CR1","unstructured":"Tsutomu Matsumoto, Koki Kato, Hideki Imai, \u201cSmart cards can compute secret heavy functions with powerful terminals,\u201d Proc. of the 10th Symposium on Information Theory and Its Applications, pp.17\u201322, (1987-11)."},{"key":"24_CR2","doi-asserted-by":"crossref","unstructured":"Tsutomu Matsumoto, Koki Kato, Hideki Imai, \u201cSpeeding up secret computation with insecure auxiliary devices,\u201d Advances in Cryptology \u2014 CRYPTO'88, Santa Barbara (1988-08), Lecture Notes in Computer Science No.403, pp.497\u2013506, Springer-Verlag, (1990).","DOI":"10.1007\/0-387-34799-2_35"},{"key":"24_CR3","unstructured":"Tsutomu Matsumoto, Hideki Imai, \u201cHow to ask and verify oracles for speeding up secret computations (Part 2),\u201d IEICE Technical Report, IT89-24, (1989-07)."},{"key":"24_CR4","unstructured":"Shin-ichi Kawamura, Atsushi Shimbo, \u201cA note on checking the faithfulness of the server in client-server systems (II),\u201d IEICE Technical Report, ISEC89-17, (1989-09)."},{"key":"24_CR5","unstructured":"Jean-Jacques Quisquater, Marijk De Soete, \u201cSpeeding up smart card RSA computation with insecure coprocessors,\u201d Smart Card 2000, Amsterdam (1989-10)."},{"issue":"No.7","key":"24_CR6","first-page":"1073","volume":"E73","author":"S. Kawamura","year":"1990","unstructured":"Shin-ichi Kawamura, Atsushi Shimbo, \u201cPerformance analysis of server-aided secret computation protocols,\u201d Transactions of IEICE, Vol.E73, No.7, pp.1073\u20131080, (1990-17).","journal-title":"Transactions of IEICE"},{"issue":"No.17","key":"24_CR7","doi-asserted-by":"crossref","first-page":"1387","DOI":"10.1049\/el:19900891","volume":"26","author":"A. Shimbo","year":"1990","unstructured":"Atsushi Shimbo, Shin-ichi Kawamura, \u201cFactorisation attack on certain server-aided secret computation protocols for the RSA secret transformation,\u201d IEE Electronics Letters, Vol.26, No.17, pp.1387\u20131388, (1990-08).","journal-title":"IEE Electronics Letters"},{"key":"24_CR8","unstructured":"Chi-Sung Laih, Sung-Ming Yen, Lein Harn, \u201cTwo efficient server-aided secret computation protocols based on addition chain sequence,\u201d ASIACRYPT'91 \u2014 Abstracts, pp.270\u2013274, (1991-11)."},{"key":"24_CR9","unstructured":"Shin-ichi Kawamura, Atsushi Shimbo, \u201cA server-aided secret computation based on the addition chain,\u201d Proc. 1992 Symp. on Cryptography and Information Security, SCIS92-12A, (1992-04)."},{"key":"24_CR10","unstructured":"Birgit Pfitzmann, Michael Waidner, \u201cAttacks on protocols for server-aided RSA computation,\u201d to appear in Advances in Cryptology \u2014 EUROCRYPT'92, Balatonf\u00fcred (1992-05), Lecture Notes in Computer Science, Springer-Verlag."},{"issue":"No.15","key":"24_CR11","doi-asserted-by":"crossref","first-page":"1473","DOI":"10.1049\/el:19920937","volume":"28","author":"R. J. Anderson","year":"1992","unstructured":"R. J. Anderson, \u201cAttack on server assisted authentication protocols,\u201d IEE Electronics Letters, Vol.28, No.15, p.1473, (1992-07).","journal-title":"IEE Electronics Letters"},{"key":"24_CR12","doi-asserted-by":"crossref","unstructured":"Tsutomu Matsumoto, Hideki Imai, \u201cOn verifiable implicit asking \u2014 or serveraided secret computation,\u201d IEICE Technical Report, ISEC92-15, (1992-08).","DOI":"10.1007\/3-540-57220-1_70"},{"key":"24_CR13","unstructured":"Chi-Sung Laih, Sung-Ming Yen, \u201cTwo phase server-aided secret computation for RSA,\u201d Technical Report, E.E. Dept. of National Cheng Kung University, (1992)."},{"key":"24_CR14","unstructured":"Atsushi Shimbo, Shin-ichi Kawamura, \u201cEfficient server-aided RSA computation protocols,\u201d Proc. of the 15th Symposium on Information Theory and Its Applications, pp.269\u2013272, (1992-09)."},{"key":"24_CR15","doi-asserted-by":"crossref","unstructured":"Sung-Ming Yen, Chi-Sung Laih, \u201cMore about the active attack on the server-aided secret computation protocol,\u201d submitted to IEE Electronics Letters, (1992).","DOI":"10.1049\/el:19921446"}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2014 AUSCRYPT '92"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-57220-1_70.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,17]],"date-time":"2020-11-17T16:09:37Z","timestamp":1605629377000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-57220-1_70"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1993]]},"ISBN":["9783540572206","9783540479765"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/3-540-57220-1_70","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[1993]]}}}