{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T00:00:01Z","timestamp":1725494401762},"publisher-location":"Berlin, Heidelberg","reference-count":13,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540615125"},{"type":"electronic","value":"9783540686972"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1996]]},"DOI":"10.1007\/3-540-68697-5_18","type":"book-chapter","created":{"date-parts":[[2007,11,8]],"date-time":"2007-11-08T17:10:00Z","timestamp":1194541800000},"page":"229-236","source":"Crossref","is-referenced-by-count":23,"title":["Improving Implementable Meet-in-the-Middle Attacks by Orders of Magnitude"],"prefix":"10.1007","author":[{"given":"Paul C.","family":"van Oorschot","sequence":"first","affiliation":[]},{"given":"Michael J.","family":"Wiener","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2001,7,13]]},"reference":[{"key":"18_CR1","doi-asserted-by":"crossref","unstructured":"H.R. Amirazizi and M.E. Hellman, \u201cTime-Memory-Processor Trade-Offs\u201d, IEEE Transactions on Information Theory, vol. 34, no. 3, May 1988.","DOI":"10.1109\/18.6030"},{"key":"18_CR2","doi-asserted-by":"publisher","first-page":"163","DOI":"10.1109\/12.262121","volume":"43","author":"J. Burns","year":"1994","unstructured":"J. Burns and C.J. Mitchell, \u201cParameter Selection for Server-Aided RSA Computation Schemes\u201d, IEEE Transactions on Computers, vol. 43, no. 2, Feb. 1994, pp. 163\u2013174.","journal-title":"IEEE Transactions on Computers"},{"key":"18_CR3","unstructured":"\u201cData Encryption Standard\u201d, National Bureau of Standards (U.S.), Federal Information Processing Standards Publication (FIPS PUB) 46, National Technical Information Service, Springfield, Virginia, 1977."},{"key":"18_CR4","unstructured":"D.E. Denning, Cryptography and Data Security, Addison Wesley, 1982."},{"issue":"6","key":"18_CR5","doi-asserted-by":"publisher","first-page":"74","DOI":"10.1109\/C-M.1977.217750","volume":"10","author":"W. Diffie","year":"1977","unstructured":"W. Diffie and M. Hellman, \u201cExhaustive cryptanalysis of the NBS Data Encryption Standard\u201d, Computer vol. 10 no.6 (June 1977) pp. 74\u201384.","journal-title":"Computer"},{"key":"18_CR6","doi-asserted-by":"crossref","unstructured":"S. Even and O. Goldreich, \u201cOn the Power of Cascade Ciphers\u201d, ACM Transactions on Computer Systems, vol. 3, no. 2, May 1985.","DOI":"10.1145\/214438.214442"},{"key":"18_CR7","series-title":"Lect Notes Comput Sci","first-page":"329","volume-title":"Advances in Cryptology \u2014 Eurocrypt\u2019 89 Proceedings","author":"P. Flajolet","year":"1989","unstructured":"P. Flajolet and A.M. Odlyzko, \u201cRandom Mapping Statistics\u201d, Lecture Notes in Computer Science 434: Advances in Cryptology \u2014 Eurocrypt\u2019 89 Proceedings, Springer-Verlag, pp. 329\u2013354."},{"key":"18_CR8","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"454","DOI":"10.1007\/3-540-47555-9_38","volume-title":"Advances in Cryptology \u2014 Eurocrypt\u2019 92","author":"R. Heiman","year":"1992","unstructured":"R. Heiman, \u201cA note on discrete logarithms with special structure\u201d, Lecture Notes in Computer Science 658: Advances in Cryptology \u2014 Eurocrypt\u2019 92, Springer-Verlag, pp. 454\u2013457."},{"key":"18_CR9","doi-asserted-by":"publisher","first-page":"401","DOI":"10.1109\/TIT.1980.1056220","volume":"6","author":"M.E. Hellman","year":"1980","unstructured":"M.E. Hellman, \u201cA cryptanalytic time-memory trade-off\u201d, IEEE Transactions on Information Theory, vol.6 (1980), pp. 401\u2013406.","journal-title":"IEEE Transactions on Information Theory"},{"key":"18_CR10","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"153","DOI":"10.1007\/3-540-47555-9_13","volume-title":"Advances in Cryptology \u2014 Eurocrypt\u2019 92","author":"B. Pfitzmann","year":"1992","unstructured":"B. Pfitzmann and M. Waidner, \u201cAttacks on Protocols for Server-Aided RSA Computation\u201d, Lecture Notes in Computer Science 658: Advances in Cryptology \u2014 Eurocrypt\u2019 92, Springer-Verlag, pp. 153\u2013162."},{"key":"18_CR11","doi-asserted-by":"publisher","first-page":"331","DOI":"10.1007\/BF01933667","volume":"15","author":"J.M. Pollard","year":"1975","unstructured":"J.M. Pollard, \u201cA Monte Carlo method for factorization\u201d, BIT, vol. 15 (1975), pp. 331\u2013334.","journal-title":"BIT"},{"issue":"143","key":"18_CR12","doi-asserted-by":"publisher","first-page":"918","DOI":"10.2307\/2006496","volume":"32","author":"J.M. Pollard","year":"1978","unstructured":"J.M. Pollard, \u201cMonte Carlo Methods for Index Computation (mod p)\u201d, Mathematics of Computation, vol. 32, no. 143, July 1978, pp. 918\u2013924.","journal-title":"Mathematics of Computation"},{"key":"18_CR13","doi-asserted-by":"crossref","unstructured":"P.C. van Oorschot and M.J. Wiener, \u201cParallel Collision Search with Application to Hash Functions and Discrete Logarithms\u201d, 2nd ACM Conference on Computer and Communications Security, Fairfax, Virginia, November 1994, pp. 210\u2013218.","DOI":"10.1145\/191177.191231"}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2014 CRYPTO \u201996"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-68697-5_18","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,2,24]],"date-time":"2019-02-24T21:13:06Z","timestamp":1551042786000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-68697-5_18"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1996]]},"ISBN":["9783540615125","9783540686972"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/3-540-68697-5_18","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[1996]]}}}