{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T22:05:07Z","timestamp":1743113107180,"version":"3.40.3"},"publisher-location":"Boston, MA","reference-count":10,"publisher":"Springer US","isbn-type":[{"type":"print","value":"9781441959058"},{"type":"electronic","value":"9781441959065"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-1-4419-5906-5_515","type":"book-chapter","created":{"date-parts":[[2011,10,27]],"date-time":"2011-10-27T13:52:10Z","timestamp":1319723530000},"page":"1167-1168","source":"Crossref","is-referenced-by-count":0,"title":["Security Reduction"],"prefix":"10.1007","author":[{"given":"Mehdi","family":"Tibouchi","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"515_CR1_515","first-page":"62","volume-title":"Random oracles are practical: a paradigm for designing efficient protocols","author":"M Bellare","year":"1993","unstructured":"Bellare M, Rogaway P (1993) Random oracles are practical: a paradigm for designing efficient protocols. In ACM Conference on Computer and Communications Security, pp 62\u201373"},{"key":"515_CR2_515","first-page":"92","volume-title":"EUROCRYPT","author":"M Bellare","year":"1994","unstructured":"Bellare M, Rogaway P (1994) Optimal asymmetric encryption. In EUROCRYPT, pp 92\u2013111"},{"key":"515_CR3_515","first-page":"399","volume-title":"EUROCRYPT","author":"M Bellare","year":"1996","unstructured":"Bellare M, Rogaway P (1996) The exact security of digital signatures \u2013 how to sign with rsa and rabin. In EUROCRYPT, pp 399\u2013416"},{"issue":"2","key":"515_CR4_515","doi-asserted-by":"publisher","first-page":"270","DOI":"10.1016\/0022-0000(84)90070-9","volume":"28","author":"S Goldwasser","year":"1984","unstructured":"Goldwasser S, Micali S (1984) Probabilistic encryption. J Comput Syst Sci 28(2):270\u2013299","journal-title":"J Comput Syst Sci"},{"key":"515_CR5_515","doi-asserted-by":"publisher","first-page":"644","DOI":"10.1109\/TIT.1976.1055638","volume":"22","author":"M Hellman","year":"1976","unstructured":"Hellman M, Diffie W (1976) New directions in cryptography. IEEE Trans Inf Theory 22:644\u2013654","journal-title":"IEEE Trans Inf Theory"},{"key":"515_CR6_515","volume-title":"PKCS#1: RSA encryption standard, version 1.5","author":"B Kaliski","year":"1993","unstructured":"Kaliski B (1993) PKCS#1: RSA encryption standard, version 1.5. Technical report, RSA Laboratories"},{"issue":"1","key":"515_CR7_515","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/s00145-005-0432-z","volume":"20","author":"N Koblitz","year":"2007","unstructured":"Koblitz N, Menezes A (2007) Another look at \u201cprovable security\u201d. J Cryptol 20(1):3\u201337","journal-title":"J Cryptol"},{"key":"515_CR8_515","first-page":"133","volume-title":"Provable security for public key schemes, pp 133\u2013189. Advanced Courses in Mathematics \u2013 CRM Barcelona","author":"D Pointcheval","year":"2005","unstructured":"Pointcheval D (2005) Provable security for public key schemes, pp 133\u2013189. Advanced Courses in Mathematics \u2013 CRM Barcelona. Birkh\u00e4user Basel"},{"key":"515_CR9_515","volume-title":"Digitalized signatures and public-key functions as intractable as factorization","author":"MO Rabin","year":"1979","unstructured":"Rabin MO (1979) Digitalized signatures and public-key functions as intractable as factorization. Technical Report MIT\/LCS\/TR-212, MIT Laboratory for Computer Science"},{"key":"515_CR10_515","series-title":"Lecture notes in computer science","doi-asserted-by":"crossref","first-page":"449","DOI":"10.1007\/3-540-39200-9_28","volume-title":"EUROCRYPT","author":"J Stern","year":"2003","unstructured":"Stern J (2003) Why provable security matters? In: Biham E (ed) EUROCRYPT. Lecture notes in computer science, vol 2656. Springer, pp 449\u2013461"}],"container-title":["Encyclopedia of Cryptography and Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-1-4419-5906-5_515","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,6,2]],"date-time":"2020-06-02T00:15:20Z","timestamp":1591056920000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-1-4419-5906-5_515"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9781441959058","9781441959065"],"references-count":10,"URL":"https:\/\/doi.org\/10.1007\/978-1-4419-5906-5_515","relation":{},"subject":[],"published":{"date-parts":[[2011]]}}}