{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T15:27:19Z","timestamp":1742916439987,"version":"3.40.3"},"publisher-location":"Boston, MA","reference-count":12,"publisher":"Springer US","isbn-type":[{"type":"print","value":"9781441959058"},{"type":"electronic","value":"9781441959065"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-1-4419-5906-5_512","type":"book-chapter","created":{"date-parts":[[2011,10,27]],"date-time":"2011-10-27T13:50:23Z","timestamp":1319723423000},"page":"649-650","source":"Crossref","is-referenced-by-count":0,"title":["ISO-9796 Signature Standards"],"prefix":"10.1007","author":[{"given":"Mehdi","family":"Tibouchi","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"512_CR1_512","doi-asserted-by":"crossref","unstructured":"Bellare M, Rogaway P (1996) The exact security of digital signatures\u00a0\u2013 how to sign with rsa and rabin. In EUROCRYPT, pp 399\u2013416","DOI":"10.1007\/3-540-68339-9_34"},{"issue":"1","key":"512_CR2_512","doi-asserted-by":"crossref","first-page":"27","DOI":"10.1007\/s00145-007-9007-5","volume":"21","author":"D Coppersmith","year":"2008","unstructured":"Coppersmith D, Coron J-S, Grieu F, Halevi S, Jutla CS, Naccache D, Stern JP (2008) Cryptanalysis of iso\/iec 9796-1. J Cryptol 21(1):27\u201351","journal-title":"J Cryptol"},{"key":"#cr-split#-512_CR3_512.1","doi-asserted-by":"crossref","unstructured":"Coron J-S, Naccache D, Stern JP (1999) On the security of rsa padding. In: Wiener MJ","DOI":"10.1007\/3-540-49162-7_15"},{"key":"#cr-split#-512_CR3_512.2","unstructured":"(ed) CRYPTO. Lecture notes in Computer Science, vol 1666. Springer, pp 1-18"},{"key":"512_CR4_512","unstructured":"Coron J-S, Naccache D, Tibouchi M, Weinmann R-P (2009) Practical cryptanalysis of iso\/iec 9796-2 and emv signatures. In:\u00a0Halevi S (ed) CRYPTO. Lecture notes in Computer Science, vol 5677. Springer, pp 428\u2013444"},{"issue":"2","key":"512_CR5_512","doi-asserted-by":"crossref","first-page":"281","DOI":"10.1137\/0217017","volume":"17","author":"S Goldwasser","year":"1988","unstructured":"Goldwasser S, Micali S, Rivest RL (1988) A digital signature scheme secure against adaptive chosen-message attacks. SIAM J Comput 17(2):281\u2013308","journal-title":"SIAM J Comput"},{"key":"512_CR6_512","unstructured":"Guillou L-C, Quisquater J-J, Walker M, Landrock P, Shafer C (1990) Precautions taken against various potential attacks in ISO\/IEC\u00a0DIS\u00a09796. In EUROCRYPT, pp 465\u2013473"},{"key":"512_CR7_512","unstructured":"ISO\/IEC\u00a09796-1 (1999) Information technology\u00a0\u2013 Security techniques\u00a0\u2013 Digital signature schemes giving message recovery\u00a0\u2013 Part 1: Mechanisms using redundancy. ISO, Geneva, Switzerland"},{"key":"512_CR8_512","unstructured":"ISO\/IEC\u00a09796-2 (1997) Information technology\u00a0\u2013 Security techniques\u00a0\u2013 Digital signature schemes giving message recovery\u00a0\u2013 Part 2: Mechanisms using a hash function. ISO, Geneva, Switzerland"},{"key":"512_CR9_512","unstructured":"ISO\/IEC\u00a09796-2:2002 (2002) Information technology\u00a0\u2013 Security techniques\u00a0\u2013 Digital signature schemes giving message recovery\u00a0\u2013 Part 2: Integer factorization based mechanisms. ISO, Geneva, Switzerland"},{"key":"512_CR10_512","unstructured":"Misarsky J-F (1998) How (not) to design rsa signature schemes. In: Imai H, Zheng Y (eds) Public key cryptography. Lecture notes in computer science, vol 1431. Springer, pp 14\u201328"},{"issue":"2","key":"512_CR11_512","doi-asserted-by":"crossref","first-page":"120","DOI":"10.1145\/359340.359342","volume":"21","author":"RL Rivest","year":"1978","unstructured":"Rivest RL, Shamir A, Adleman LM (1978) A method for obtaining digital signatures and public-key cryptosystems. Commun ACM 21(2):120\u2013126","journal-title":"Commun ACM"}],"container-title":["Encyclopedia of Cryptography and Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-1-4419-5906-5_512","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,6,2]],"date-time":"2020-06-02T00:45:15Z","timestamp":1591058715000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-1-4419-5906-5_512"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9781441959058","9781441959065"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/978-1-4419-5906-5_512","relation":{},"subject":[],"published":{"date-parts":[[2011]]}}}