{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T23:49:03Z","timestamp":1725925743869},"publisher-location":"Cham","reference-count":9,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319725970"},{"type":"electronic","value":"9783319725987"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-72598-7_18","type":"book-chapter","created":{"date-parts":[[2017,12,1]],"date-time":"2017-12-01T12:06:49Z","timestamp":1512130009000},"page":"303-312","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Parallelized Common Factor Attack on RSA"],"prefix":"10.1007","author":[{"given":"Vineet","family":"Kumar","sequence":"first","affiliation":[]},{"given":"Aneek","family":"Roy","sequence":"additional","affiliation":[]},{"given":"Sourya","family":"Sengupta","sequence":"additional","affiliation":[]},{"given":"Sourav","family":"Sen Gupta","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,12,2]]},"reference":[{"issue":"2","key":"18_CR1","doi-asserted-by":"crossref","first-page":"120","DOI":"10.1145\/359340.359342","volume":"21","author":"RL Rivest","year":"1978","unstructured":"Rivest, R.L., Shamir, A., Adleman, L.M.: A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM 21(2), 120\u2013126 (1978)","journal-title":"Commun. ACM"},{"key":"18_CR2","unstructured":"SSL Labs: Trustworthy internet movement - SSL pulse (2017). Accessed 4 Oct 2017"},{"key":"18_CR3","first-page":"1473","volume":"43","author":"C Pomerance","year":"1996","unstructured":"Pomerance, C.: A tale of two sieves. Not. Am. Math. Soc. 43, 1473\u20131485 (1996)","journal-title":"Not. Am. Math. Soc."},{"key":"18_CR4","unstructured":"Heninger, N., Durumeric, Z., Wustrow, E., Halderman, J.A.: Mining your Ps and Qs: detection of widespread weak keys in network devices. In Kohno, T. (ed.) Proceedings of the 21th USENIX Security Symposium, Bellevue, WA, USA, 8\u201310 August 2012, pp. 205\u2013220. USENIX Association (2012)"},{"key":"18_CR5","first-page":"64","volume":"2012","author":"AK Lenstra","year":"2012","unstructured":"Lenstra, A.K., Hughes, J.P., Augier, M., Bos, J.W., Kleinjung, T., Wachter, C.: Ron was wrong, Whit is right. IACR Cryptology ePrint Archive 2012, 64 (2012)","journal-title":"IACR Cryptology ePrint Archive"},{"key":"18_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"341","DOI":"10.1007\/978-3-642-42045-0_18","volume-title":"Advances in Cryptology - ASIACRYPT 2013","author":"DJ Bernstein","year":"2013","unstructured":"Bernstein, D.J., Chang, Y.-A., Cheng, C.-M., Chou, L.-P., Heninger, N., Lange, T., van Someren, N.: Factoring RSA keys from certified smart cards: Coppersmith in the wild. In: Sako, K., Sarkar, P. (eds.) ASIACRYPT 2013. LNCS, vol. 8270, pp. 341\u2013360. Springer, Heidelberg (2013). \nhttps:\/\/doi.org\/10.1007\/978-3-642-42045-0_18"},{"key":"18_CR7","doi-asserted-by":"crossref","unstructured":"Hastings, M., Fried, J., Heninger, N.: Weak keys remain widespread in network devices. In: Gill, P., Heidemann, J.S., Byers, J.W., Govindan, R. (eds.) Proceedings of the 2016 ACM on Internet Measurement Conference, IMC 2016, Santa Monica, CA, USA, 14\u201316 November 2016, pp. 49\u201363. ACM (2016)","DOI":"10.1145\/2987443.2987486"},{"key":"18_CR8","unstructured":"Bernstein, D.J.: How to find smooth parts of integers (2004)"},{"key":"18_CR9","unstructured":"Censys Team, University of Michigan: Internet-wide scan data repository (2016). Accessed 15 Oct 2016"}],"container-title":["Lecture Notes in Computer Science","Information Systems Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-72598-7_18","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,12,1]],"date-time":"2017-12-01T12:16:44Z","timestamp":1512130604000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-72598-7_18"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319725970","9783319725987"],"references-count":9,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-72598-7_18","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]}}}