{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,28]],"date-time":"2026-04-28T10:34:02Z","timestamp":1777372442633,"version":"3.51.4"},"publisher-location":"Berlin, Heidelberg","reference-count":13,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540611868","type":"print"},{"value":"9783540683391","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1996]]},"DOI":"10.1007\/3-540-68339-9_1","type":"book-chapter","created":{"date-parts":[[2007,8,5]],"date-time":"2007-08-05T21:31:14Z","timestamp":1186349474000},"page":"1-9","source":"Crossref","is-referenced-by-count":34,"title":["Low-Exponent RSA with Related Messages"],"prefix":"10.1007","author":[{"given":"Don","family":"Coppersmith","sequence":"first","affiliation":[]},{"given":"Matthew","family":"Franklin","sequence":"additional","affiliation":[]},{"given":"Jacques","family":"Patarin","sequence":"additional","affiliation":[]},{"given":"Michael","family":"Reiter","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2001,7,13]]},"reference":[{"key":"1_CR1","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"92","DOI":"10.1007\/BFb0053428","volume-title":"Advances in Cryptology\u2014EUROCRYPT\u2019 94","author":"M. Bellare","year":"1995","unstructured":"M. Bellare and P. Rogaway. Optimal asymmetric encryption. In Advances in Cryptology\u2014EUROCRYPT\u2019 94 (Lecture Notes in Computer Science 950), A. De Santis, Ed. 1995, pp. 92\u2013111, Springer-Verlag."},{"key":"1_CR2","doi-asserted-by":"crossref","unstructured":"D. Coppersmith. Finding a small root of a univariate modular equation. In Advances in Cryptology\u2014EUROCRYPT\u2019 96, U. Maurer, Ed. 1996, Springer-Verlag.","DOI":"10.1007\/3-540-68339-9_14"},{"key":"1_CR3","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"50","DOI":"10.1007\/3-540-49264-X_5","volume-title":"Advances in Cryptology\u2014EUROCRYPT\u2019 95","author":"M. K. Franklin","year":"1995","unstructured":"M. K. Franklin and M. K. Reiter. Verifiable signature sharing. In Advances in Cryptology\u2014EUROCRYPT\u2019 95 (Lecture Notes in Computer Science 921), L. C. Guillou and J. Quisquater, Eds. 1995, pp. 50\u201363, Springer-Verlag."},{"key":"1_CR4","unstructured":"M. K. Franklin and M. K. Reiter. A linear protocol failure for RSA with exponent three. Presented at the CRYPTO\u2019 95 Rump Session, Aug. 1995."},{"key":"1_CR5","doi-asserted-by":"publisher","first-page":"336","DOI":"10.1137\/0217019","volume":"17","author":"J. Hastad","year":"1988","unstructured":"J. Hastad. Solving simultaneous modular equations of low degree. SIAM Journal of Computing 17:336\u2013341, 1988.","journal-title":"SIAM Journal of Computing"},{"key":"1_CR6","doi-asserted-by":"crossref","unstructured":"J. H. Moore. Protocol failures in cryptosystems. Proceedings of the IEEE 76(5), May 1988.","DOI":"10.1109\/5.4444"},{"key":"1_CR7","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"461","DOI":"10.1007\/3-540-48285-7_42","volume-title":"Advances in Cryptology\u2014EUROCRYPT\u2019 93","author":"C. Park","year":"1994","unstructured":"C. Park, K. Kurosawa, T. Okamoto, and S. Tsujii. On key distribution and authentication in mobile radio networks. In Advances in Cryptology\u2014EUROCRYPT\u2019 93 (Lecture Notes in Computer Science 765), T. Helleseth, Ed. 1994, pp. 461\u2013465, Springer-Verlag."},{"issue":"2","key":"1_CR8","doi-asserted-by":"publisher","first-page":"120","DOI":"10.1145\/359340.359342","volume":"21","author":"R. L. Rivest","year":"1978","unstructured":"R. L. Rivest, A. Shamir and L. Adleman. A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM 21(2):120\u2013126, Feb. 1978.","journal-title":"Communications of the ACM"},{"issue":"11","key":"1_CR9","doi-asserted-by":"publisher","first-page":"612","DOI":"10.1145\/359168.359176","volume":"22","author":"A. Shamir","year":"1979","unstructured":"A. Shamir. How to share a secret. Communications of the ACM 22(11):612\u2013613, Nov. 1979.","journal-title":"Communications of the ACM"},{"key":"1_CR10","doi-asserted-by":"publisher","first-page":"180","DOI":"10.1080\/0161-118391857900","volume":"7","author":"G. Simmons","year":"1983","unstructured":"G. Simmons. A \u201cweak\u201d privacy protocol using the RSA cryptoalgorithm. Cryptologia 7:180\u2013182, 1983.","journal-title":"Cryptologia"},{"key":"1_CR11","doi-asserted-by":"publisher","first-page":"69","DOI":"10.1007\/BF00197941","volume":"7","author":"G. Simmons","year":"1994","unstructured":"G. Simmons. Proof of soundness (integrity) of cryptographic protocols. Journal of Cryptology 7:69\u201377, 1994.","journal-title":"Journal of Cryptology"},{"issue":"1","key":"1_CR12","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1137\/0212001","volume":"12","author":"V. Strassen","year":"1983","unstructured":"V. Strassen. The computational complexity of continued fractions. SIAM Journal of Computing 12(1):1\u201327, 1983.","journal-title":"SIAM Journal of Computing"},{"key":"1_CR13","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"324","DOI":"10.1007\/0-387-34805-0_30","volume-title":"Advances in Cryptology\u2014CRYPTO\u2019 89","author":"M. Tatebayashi","year":"1990","unstructured":"M. Tatebayashi and N. Matsuzakai and D. B. Newman. Key distribution protocol for digital mobile communication systems. In Advances in Cryptology\u2014CRYPTO\u2019 89 (Lecture Notes in Computer Science 435), G. Brassard, Ed. 1990, pp. 324\u2013333, Springer-Verlag."}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2014 EUROCRYPT \u201996"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-68339-9_1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,2,20]],"date-time":"2019-02-20T16:50:02Z","timestamp":1550681402000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-68339-9_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1996]]},"ISBN":["9783540611868","9783540683391"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/3-540-68339-9_1","relation":{},"ISSN":["0302-9743"],"issn-type":[{"value":"0302-9743","type":"print"}],"subject":[],"published":{"date-parts":[[1996]]}}}