{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T17:56:39Z","timestamp":1725558999389},"publisher-location":"Berlin, Heidelberg","reference-count":11,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540244547"},{"type":"electronic","value":"9783540305804"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005]]},"DOI":"10.1007\/978-3-540-30580-4_16","type":"book-chapter","created":{"date-parts":[[2010,7,5]],"date-time":"2010-07-05T15:51:09Z","timestamp":1278345069000},"page":"234-243","source":"Crossref","is-referenced-by-count":1,"title":["From Fixed-Length to Arbitrary-Length RSA Encoding Schemes Revisited"],"prefix":"10.1007","author":[{"given":"Julien","family":"Cathalo","sequence":"first","affiliation":[]},{"given":"Jean-S\u00e9bastien","family":"Coron","sequence":"additional","affiliation":[]},{"given":"David","family":"Naccache","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"16_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"44","DOI":"10.1007\/3-540-45353-9_4","volume-title":"Topics in Cryptology - CT-RSA 2001","author":"G. Arboit","year":"2001","unstructured":"Arboit, G., Robert, J.-M.: From fixed-length messages to arbitrary-length messages practical RSA signature padding schemes. In: Naccache, D. (ed.) CT-RSA 2001. LNCS, vol.\u00a02020, pp. 44\u201351. Springer, Heidelberg (2001)"},{"key":"16_CR2","doi-asserted-by":"crossref","unstructured":"Bellare, M., Rogaway, P.: Random oracles are practical: a paradigm for designing efficient protocols. In: Proceedings of the First Annual Conference on Computer and Commmunications Security. ACM, New York (1993)","DOI":"10.1145\/168588.168596"},{"key":"16_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"399","DOI":"10.1007\/3-540-68339-9_34","volume-title":"Advances in Cryptology - EUROCRYPT \u201996","author":"M. Bellare","year":"1996","unstructured":"Bellare, M., Rogaway, P.: The exact security of digital signatures - how to sign with RSA and rabin. In: Maurer, U.M. (ed.) EUROCRYPT 1996. LNCS, vol.\u00a01070, pp. 399\u2013416. Springer, Heidelberg (1996)"},{"key":"16_CR4","doi-asserted-by":"crossref","unstructured":"Canetti, R., Goldreich, O., Halevi, S.: The Random Oracle Methodology, Revisited. In: STOC 1998. ACM, New York (1998)","DOI":"10.1145\/276698.276741"},{"key":"16_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"90","DOI":"10.1007\/3-540-44448-3_8","volume-title":"Advances in Cryptology - ASIACRYPT 2000","author":"J.-S. Coron","year":"2000","unstructured":"Coron, J.-S., Koeune, F., Naccache, D.: From fixed-length to arbitrary-length RSA padding schemes. In: Okamoto, T. (ed.) ASIACRYPT 2000. LNCS, vol.\u00a01976, p. 90. Springer, Heidelberg (2000)"},{"issue":"2","key":"16_CR6","doi-asserted-by":"publisher","first-page":"281","DOI":"10.1137\/0217017","volume":"17","author":"S. Goldwasser","year":"1988","unstructured":"Goldwasser, S., Micali, S., Rivest, R.: A digital signature scheme secure against adaptive chosen-message attacks. SIAM Journal of computing\u00a017(2), 281\u2013308 (1988)","journal-title":"SIAM Journal of computing"},{"key":"16_CR7","unstructured":"ISO\/IEC 9796, Information technology - Security techniques - Digital signature scheme giving message recovery, Part 1: Mechanisms using redundancy (1999)"},{"key":"16_CR8","unstructured":"ISO\/IEC 9796-2, Information technology - Security techniques - Digital signature scheme giving message recovery, Part 2: Mechanisms using a hash-function (1997)"},{"key":"16_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"14","DOI":"10.1007\/BFb0054011","volume-title":"Public Key Cryptography","author":"J.-F. Misarsky","year":"1998","unstructured":"Misarsky, J.-F.: How (Not) to design RSA signature schemes. In: Imai, H., Zheng, Y. (eds.) PKC 1998. LNCS, vol.\u00a01431, p. 14. Springer, Heidelberg (1998)"},{"key":"16_CR10","doi-asserted-by":"crossref","unstructured":"Rivest, R., Shamir, A., Adleman, L.: A method for obtaining digital signatures and public key cryptosystems. CACM 21 (1978)","DOI":"10.21236\/ADA606588"},{"key":"16_CR11","unstructured":"RSA Laboratories, pkcs #1: RSA cryptography specifications, version 2.0 (September 1998)"}],"container-title":["Lecture Notes in Computer Science","Public Key Cryptography - PKC 2005"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-30580-4_16.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,18]],"date-time":"2020-11-18T23:24:24Z","timestamp":1605741864000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-30580-4_16"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005]]},"ISBN":["9783540244547","9783540305804"],"references-count":11,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-30580-4_16","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2005]]}}}