{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,13]],"date-time":"2025-05-13T02:43:19Z","timestamp":1747104199474},"publisher-location":"Berlin, Heidelberg","reference-count":8,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540209966"},{"type":"electronic","value":"9783540246602"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2004]]},"DOI":"10.1007\/978-3-540-24660-2_10","type":"book-chapter","created":{"date-parts":[[2010,8,2]],"date-time":"2010-08-02T15:18:44Z","timestamp":1280762324000},"page":"126-128","source":"Crossref","is-referenced-by-count":5,"title":["Compressing Rabin Signatures"],"prefix":"10.1007","author":[{"given":"Daniel","family":"Bleichenbacher","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"10_CR1","unstructured":"Bernstein, D.J.: Squeezing Rabin signatures. unpublished"},{"key":"10_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"399","DOI":"10.1007\/3-540-68339-9_34","volume-title":"Advances in Cryptology - EUROCRYPT \u201996","author":"M. Bellare","year":"1996","unstructured":"Bellare, M., Rogaway, P.: The exact security of digital signatures - how to sign with RSA and Rabin. In: Maurer, U.M. (ed.) EUROCRYPT 1996. LNCS, vol.\u00a01070, pp. 399\u2013416. Springer, Heidelberg (1996)"},{"key":"10_CR3","unstructured":"Coron, J.S., Nacacche, D.: Proc\u00e9d\u00e9 de r\u00e9duction de la taille d\u2019une signature RSA ou Rabin. Patent FR28293333 (March 2003)"},{"key":"10_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"155","DOI":"10.1007\/3-540-68339-9_14","volume-title":"Advances in Cryptology - EUROCRYPT \u201996","author":"D. Coppersmith","year":"1996","unstructured":"Coppersmith, D.: Finding a small root of a univariate modular equation. In: Maurer, U.M. (ed.) EUROCRYPT 1996. LNCS, vol.\u00a01070, pp. 155\u2013165. Springer, Heidelberg (1996)"},{"key":"10_CR5","volume-title":"The art of computer programming, Seminumerical Algorithms","author":"D.E. Knuth","year":"1981","unstructured":"Knuth, D.E.: The art of computer programming, Seminumerical Algorithms, 2nd edn., vol.\u00a02. Addison Wesley, Reading (1981)","edition":"2"},{"key":"10_CR6","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4612-4220-8","volume-title":"Introduction to Diophantine Approximations","author":"S. Lang","year":"1995","unstructured":"Lang, S.: Introduction to Diophantine Approximations. Springer, Heidelberg (1995) (new expanded edition)"},{"key":"10_CR7","unstructured":"Rabin, M.O.: Digitalized signatures. Foundation of Secure Computation, 155\u2013169 (1978)"},{"key":"10_CR8","unstructured":"Data Security, R.S.A.: Inc. PKCS #1: RSA Encryption Standard. Redwood City, CA, Version 1.5 (November 1993)"}],"container-title":["Lecture Notes in Computer Science","Topics in Cryptology \u2013 CT-RSA 2004"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-24660-2_10","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,3,17]],"date-time":"2019-03-17T16:19:34Z","timestamp":1552839574000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-24660-2_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004]]},"ISBN":["9783540209966","9783540246602"],"references-count":8,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-24660-2_10","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2004]]}}}