{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,28]],"date-time":"2026-02-28T12:57:44Z","timestamp":1772283464551,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":24,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540629757","type":"print"},{"value":"9783540690535","type":"electronic"}],"license":[{"start":{"date-parts":[[1997,1,1]],"date-time":"1997-01-01T00:00:00Z","timestamp":852076800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1997]]},"DOI":"10.1007\/3-540-69053-0_3","type":"book-chapter","created":{"date-parts":[[2007,8,6]],"date-time":"2007-08-06T01:24:05Z","timestamp":1186363445000},"page":"27-36","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":46,"title":["A New Public-Key Cryptosystem"],"prefix":"10.1007","author":[{"given":"David","family":"Naccache","sequence":"first","affiliation":[]},{"given":"Jacques","family":"Stern","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2001,7,13]]},"reference":[{"key":"3_CR1","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"236","DOI":"10.1007\/3-540-44750-4_19","volume-title":"Advances in Cryptology, Proceedings of Crypto\u201995","author":"R. Anderson","year":"1995","unstructured":"R. Anderson, Robustness principles for public-key protocols, LNCS, Advances in Cryptology, Proceedings of Crypto\u201995, Springer-Verlag, pp. 236\u2013247, 1995."},{"key":"3_CR2","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"26","DOI":"10.1007\/BFb0034832","volume-title":"Advances in Cryptology, Proceedings of Asiacrypt\u201996","author":"R. Anderson","year":"1996","unstructured":"R. Anderson & S. Vaudenay, Minding your p\u2019s and q\u2019s, LNCS, Advances in Cryptology, Proceedings of Asiacrypt\u201996, Springer-Velrag, pp. 26\u201335, 1996."},{"key":"3_CR3","unstructured":"P. Camion, An example of implementation in a Galois field and more on the Naccache-Stern public-key cryptosystem, manuscript, October 27\u201329, 1995."},{"key":"3_CR4","doi-asserted-by":"publisher","first-page":"901","DOI":"10.1109\/18.21214","volume":"IT 34","author":"B. Chor","year":"1988","unstructured":"B. Chor & R. Rivest, A knapsack-type public key cryptosystem based on arithmetic on finite fields, IEEE Transactions on Information Theory, vol. IT 34, 1988, pp. 901\u2013909.","journal-title":"IEEE Transactions on Information Theory"},{"key":"3_CR5","unstructured":"T. Cusick, A comparison of RSA and the Naccache-Stern public-key cryptosystem, manuscript, October 31, 1995."},{"key":"3_CR6","unstructured":"D. Denning (Robling), Cryptography and data security, Addison-Wesley Publishing Company, p. 148, 1983."},{"key":"3_CR7","doi-asserted-by":"crossref","first-page":"113","DOI":"10.1007\/978-94-009-2794-0_7","volume":"142","author":"Y. Desmedt","year":"1988","unstructured":"Y. Desmedt, What happened with knapsack cryptographic schemes, Performance limits in communication-theory and practice, NATO ASI series E: Applied sciences, vol. 142, Kluwer Academic Publishers, pp. 113\u2013134, 1988.","journal-title":"Performance limits in communication-theory and practice, NATO ASI series E: Applied sciences"},{"key":"3_CR8","doi-asserted-by":"publisher","first-page":"644","DOI":"10.1109\/TIT.1976.1055638","volume":"IT 22","author":"W. Diffie","year":"1976","unstructured":"W. Diffie & M. Hellman, New directions in cryptography, IEEE Transactions on Information Theory, vol. IT 22 no 6, pp. 644\u2013654, 1976.","journal-title":"IEEE Transactions on Information Theory"},{"key":"3_CR9","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"104","DOI":"10.1007\/3-540-68697-5_9","volume-title":"Advances in Cryptology, Proceedings of Crypto\u201996","author":"P. Kocher","year":"1996","unstructured":"P. Kocher, Timing attacks in implementations of Diffie-Hellman, RSA, DSS and other systems, LNCS, Advances in Cryptology, Proceedings of Crypto\u201996, Springer-Verlag, pp. 104\u2013113, 1996."},{"key":"3_CR10","doi-asserted-by":"publisher","first-page":"149","DOI":"10.1007\/BF00196908","volume":"3","author":"H. Lenstra","year":"1991","unstructured":"H. Lenstra, On the Chor-Rivest knapsack cryptosystem, Journal of Cryptology, vol. 3, pp. 149\u2013155, 1991.","journal-title":"Journal of Cryptology"},{"key":"3_CR11","doi-asserted-by":"publisher","first-page":"525","DOI":"10.1109\/TIT.1978.1055927","volume":"IT 24","author":"R. Merkle","year":"1978","unstructured":"R. Merkle & M. Hellman, Hiding information and signatures in trapdoor knapsacks, IEEE Transactions on Information Theory, vol. IT 24 no 5, pp. 525\u2013530, 1978.","journal-title":"IEEE Transactions on Information Theory"},{"key":"3_CR12","unstructured":"M. Naor, A proposal for a new public-key by Naccache and Stern, presented at the Weizmann Institute Theory of Computation Seminar, November 19, 1995."},{"key":"3_CR13","doi-asserted-by":"publisher","first-page":"594","DOI":"10.1109\/TIT.1984.1056942","volume":"IT 30","author":"A. Odlyzko","year":"1984","unstructured":"A. Odlyzko, Cryptanalytic attacks on the multiplicative knapsack cryptosystem and on Shamir\u2019s fast signature scheme, IEEE Transactions on Information Theory, vol. IT 30, pp. 594\u2013601, 1984.","journal-title":"IEEE Transactions on Information Theory"},{"key":"3_CR14","unstructured":"H. Petersen, On the cardinality of bounded subset products, Technical report TR-95-16-E, University of Technology Chemnitz-Zwickau, 1995."},{"key":"3_CR15","doi-asserted-by":"publisher","first-page":"106","DOI":"10.1109\/TIT.1978.1055817","volume":"24","author":"S. Pohlig","year":"1978","unstructured":"S. Pohlig & M. Hellman, An improved algorithm for computing logarithms over GF(q) and its cryptographic significance, IEEE Transactions on Information Theory, vol. 24, pp. 106\u2013110, 1978.","journal-title":"IEEE Transactions on Information Theory"},{"key":"3_CR16","series-title":"Lect Notes Comput Sci","first-page":"318","volume-title":"Advances in Cryptology, Proceedings of Eurocrypt\u201994","author":"D. Pointcheval","year":"1995","unstructured":"D. Pointcheval, A new identification scheme based on the perceptrons problem, LNCS, Advances in Cryptology, Proceedings of Eurocrypt\u201994, Springer-Verlag, pp. 318\u2013328, 1995."},{"key":"3_CR17","doi-asserted-by":"crossref","first-page":"120","DOI":"10.1145\/359340.359342","volume":"21","author":"R. Rivest","year":"1978","unstructured":"R. Rivest, A. Shamir & L. Adleman, A method for obtaining digital signatures and public-key cryptosystems, CACM, vol. 21, no. 2, pp. 120\u2013126, 1978.","journal-title":"CACM"},{"key":"3_CR18","first-page":"66","volume":"23","author":"A. Salomaa","year":"1990","unstructured":"A. Salomaa, Public-key cryptography, EATCS Monographs on theoretical computer science, vol. 23, Springer-Verlag, page 66, 1990.","journal-title":"EATCS Monographs on theoretical computer science"},{"key":"3_CR19","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"606","DOI":"10.1007\/0-387-34805-0_54","volume-title":"Advances in Cryptology, Proceedings of Crypto\u201989","author":"A. Shamir","year":"1990","unstructured":"A. Shamir, An efficient identification scheme based on permuted kernels, LNCS, Advances in Cryptology, Proceedings of Crypto\u201989, Springer-Verlag, pp. 606\u2013609."},{"key":"3_CR20","unstructured":"G. Simmons, Contemporary cryptology: The science of information integrity, IEEE Press, pp. 257\u2013258, 1992."},{"key":"3_CR21","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"13","DOI":"10.1007\/3-540-48329-2_2","volume-title":"Advances in Cryptology, Proceedings of Crypto\u201993","author":"J. Stern","year":"1994","unstructured":"J. Stern, A new identification scheme based on syndrome decoding, LNCS, Advances in Cryptology, Proceedings of Crypto\u201993, Springer-Verlag, pp. 13\u201321, 1994."},{"key":"3_CR22","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"164","DOI":"10.1007\/3-540-48658-5_18","volume-title":"Advances in Cryptology, Proceedings of Crypto\u201994","author":"J. Stern","year":"1994","unstructured":"J. Stern, Designing identification schemes with keys of short size, LNCS, Advances in Cryptology, Proceedings of Crypto\u201994, Springer-Verlag, pp. 164\u2013173, 1994."},{"key":"3_CR23","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"332","DOI":"10.1007\/3-540-68339-9_29","volume-title":"Advances in Cryptology, Proceedings of Eurocrypt\u201996","author":"P. Oorschot van","year":"1996","unstructured":"P. van Oorschot & M. Wiener, On Diffie-Hellman key agreement with short exponents, LNCS, Advances in Cryptology, Proceedings of Eurocrypt\u201996, Springer-Verlag, pp. 332\u2013343, 1996."},{"key":"3_CR24","doi-asserted-by":"publisher","first-page":"553","DOI":"10.1109\/18.54902","volume":"36","author":"M. Wiener","year":"1990","unstructured":"M. Wiener, Cryptanalysis of short RSA secret exponents, IEEE Transactions on Information Theory, vol. 36, no. 3, pp. 553\u2013558, 1990.","journal-title":"IEEE Transactions on Information Theory"}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2014 EUROCRYPT \u201997"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-69053-0_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,19]],"date-time":"2019-05-19T13:55:33Z","timestamp":1558274133000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-69053-0_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1997]]},"ISBN":["9783540629757","9783540690535"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/3-540-69053-0_3","relation":{},"ISSN":["0302-9743"],"issn-type":[{"value":"0302-9743","type":"print"}],"subject":[],"published":{"date-parts":[[1997]]},"assertion":[{"value":"13 July 2001","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}