{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T19:26:33Z","timestamp":1725564393803},"publisher-location":"Berlin, Heidelberg","reference-count":23,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540205920"},{"type":"electronic","value":"9783540400615"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2003]]},"DOI":"10.1007\/978-3-540-40061-5_17","type":"book-chapter","created":{"date-parts":[[2010,9,5]],"date-time":"2010-09-05T19:06:00Z","timestamp":1283713560000},"page":"287-301","source":"Crossref","is-referenced-by-count":7,"title":["Almost Uniform Density of Power Residues and the Provable Security of ESIGN"],"prefix":"10.1007","author":[{"given":"Tatsuaki","family":"Okamoto","sequence":"first","affiliation":[]},{"given":"Jacques","family":"Stern","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"17_CR1","first-page":"62","volume-title":"Proc. of the 1st CCS","author":"M. Bellare","year":"1993","unstructured":"Bellare, M., Rogaway, P.: Random Oracles Are Practical: a Paradigm for Designing Efficient Protocols. In: Proc. of the 1st CCS, pp. 62\u201373. ACM Press, New York (1993)"},{"key":"17_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"399","DOI":"10.1007\/3-540-68339-9_34","volume-title":"Advances in Cryptology - EUROCRYPT \u201996","author":"M. Bellare","year":"1996","unstructured":"Bellare, M., Rogaway, P.: The Exact Security of Digital Signatures \u2013 How to Sign with RSA and Rabin. In: Maurer, U.M. (ed.) EUROCRYPT 1996. LNCS, vol.\u00a01070, pp. 399\u2013416. Springer, Heidelberg (1996)"},{"key":"17_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"28","DOI":"10.1007\/3-540-39799-X_4","volume-title":"Advances in Cryptology","author":"E. Brickell","year":"1986","unstructured":"Brickell, E., De Laurentis, J.M.: An Attack on a Signature Scheme proposed by Okamoto and Shiraishi. In: Williams, H.C. (ed.) CRYPTO 1985. LNCS, vol.\u00a0218, pp. 28\u201332. Springer, Heidelberg (1986)"},{"key":"17_CR4","doi-asserted-by":"publisher","first-page":"179","DOI":"10.1112\/plms\/s3-12.1.179","volume":"12","author":"D.A. Burgess","year":"1962","unstructured":"Burgess, D.A.: On character sums and primitive roots. Proc. London Math. Soc.\u00a012, 179\u2013192 (1962)","journal-title":"Proc. London Math. Soc."},{"key":"17_CR5","series-title":"Graduate Texts in Mathematics","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4757-5927-3","volume-title":"Multiplicative Number theory","author":"H. Davenport","year":"1980","unstructured":"Davenport, H.: Multiplicative Number theory. Graduate Texts in Mathematics, vol.\u00a074. Springer, Heidelberg (1980)"},{"key":"17_CR6","unstructured":"Ellison, W.J., Mendes France, M.: Les nombres premiers, Hermann, Paris (1975)"},{"key":"17_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"100","DOI":"10.1007\/0-387-34799-2_9","volume-title":"Advances in Cryptology - CRYPTO \u201988","author":"M. Girault","year":"1990","unstructured":"Girault, M., Toffin, P., Vall\u00e9e, B.: Computation of Approximate L-th Roots Modulo n and Application to Cryptography. In: Goldwasser, S. (ed.) CRYPTO 1988. LNCS, vol.\u00a0403, pp. 100\u2013118. Springer, Heidelberg (1990)"},{"issue":"2","key":"17_CR8","doi-asserted-by":"publisher","first-page":"281","DOI":"10.1137\/0217017","volume":"17","author":"S. Goldwasser","year":"1988","unstructured":"Goldwasser, S., Micali, S., Rivest, R.: A Digital Signature Scheme Secure Against Adaptative Chosen-Message Attacks. SIAM Journal of Computing\u00a017(2), 281\u2013308 (1988)","journal-title":"SIAM Journal of Computing"},{"key":"17_CR9","unstructured":"Granboulan, L.: How to repair ESIGN, NESSIE internal document. Docuemnyt NES\/DOC\/ENS\/WP5\/019 (2002), See \n                    \n                      http:\/\/www.cryptonessie.org"},{"key":"17_CR10","unstructured":"IEEE Standard 1363\u20132000. Standard Specifications for Public Key Cryptography. IEEE (August 2000), Available from: \n                    \n                      http:\/\/grouper.ieee.org\/groups\/1363"},{"key":"17_CR11","unstructured":"IEEE P1363a Draft Version 9. Standard Specifications for Public Key Cryptography: Additional Techniques"},{"key":"17_CR12","unstructured":"Jonsson, J.: Security Proofs for RSA\u2013PSS and Its Variants. Cryptology ePrint Archive 2001\/053 (June 2001), Available from: \n                    \n                      http:\/\/eprint.iacr.org\/"},{"key":"17_CR13","first-page":"513","volume":"261","author":"K. Lenstra","year":"1982","unstructured":"Lenstra, K., Lenstra, H.W., Lov\u00e1sz, L.: Factoring polynomials with rational coefficients. Mathematische Ann.\u00a0261, 513\u2013534 (1982)","journal-title":"Mathematische Ann."},{"issue":"1","key":"17_CR14","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1109\/18.50373","volume":"IT\u201336","author":"T. Okamoto","year":"1990","unstructured":"Okamoto, T.: A Fast Signature Scheme Based on Congruential Polynomial Operations. IEEE Transactions on Information Theory\u00a0IT\u201336 (1), 47\u201353 (1990)","journal-title":"IEEE Transactions on Information Theory"},{"key":"17_CR15","unstructured":"Okamoto, T., Fujisaki, E., Morita, H.: TSH-ESIGN: Efficient Digital Signature Scheme Using Trisection Size Hash, Submission to P1363a (1998)"},{"key":"17_CR16","first-page":"123","volume-title":"Proc. of the ACM Symp. Security and Privacy","author":"T. Okamoto","year":"1985","unstructured":"Okamoto, T., Shiraishi, A.: A Fast Signature Scheme Based on Quadratic Inequalities. In: Proc. of the ACM Symp. Security and Privacy, pp. 123\u2013132. ACM Press, New York (1985)"},{"key":"17_CR17","unstructured":"P\u00f3lya, G.: \u00dcber die Verteilung des quadratischen Reste und Nichtreste, G\u00f6ttinger Nachtrichten, 21-26 (1918)"},{"issue":"2","key":"17_CR18","doi-asserted-by":"publisher","first-page":"120","DOI":"10.1145\/359340.359342","volume":"21","author":"R. Rivest","year":"1978","unstructured":"Rivest, R., Shamir, A., Adleman, L.: A Method for Obtaining Digital Signatures and Public Key Cryptosystems. Communications of the ACM\u00a021(2), 120\u2013126 (1978)","journal-title":"Communications of the ACM"},{"key":"17_CR19","unstructured":"Shoup, V.: OAEP Reconsidered. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol.\u00a02139, pp. 239\u2013259. Springer, Heidelberg (2001), Also appeared in the Cryptology ePrint Archive 2000\/060 (November 2000), Available from: \n                    \n                      http:\/\/eprint.iacr.org\/"},{"key":"17_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"93","DOI":"10.1007\/3-540-45708-9_7","volume-title":"Advances in Cryptology - CRYPTO 2002","author":"J. Stern","year":"2002","unstructured":"Stern, J., Pointcheval, D., Malone-Lee, J., Smart, N.: Flaws in Applying Proof Methodologies to Signature Schemes. In: Yung, M. (ed.) CRYPTO 2002. LNCS, vol.\u00a02442, pp. 93\u2013110. Springer, Heidelberg (2002)"},{"key":"17_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"281","DOI":"10.1007\/3-540-45961-8_26","volume-title":"Advances in Cryptology - EUROCRYPT \u201988","author":"B. Vall\u00e9e","year":"1988","unstructured":"Vall\u00e9e, B., Girault, M., Toffin, P.: How to break Okamoto\u2019s Cryptosystem by Reducing Lattice Bases. In: G\u00fcnther, C.G. (ed.) EUROCRYPT 1988. LNCS, vol.\u00a0330, pp. 281\u2013291. Springer, Heidelberg (1988)"},{"key":"17_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"427","DOI":"10.1007\/3-540-51083-4_78","volume-title":"Applied Algebra, Algebraic Algorithms and Error-Correcting Codes","author":"B. Vall\u00e9e","year":"1989","unstructured":"Vall\u00e9e, B., Girault, M., Toffin, P.: How to Guess _th Roots Modulo n by Reducing Lattice Bases. In: Mora, T. (ed.) AAECC 1988. LNCS, vol.\u00a0357, pp. 427\u2013442. Springer, Heidelberg (1989)"},{"key":"17_CR23","first-page":"94","volume":"1","author":"I.M. Vinogradov","year":"1918","unstructured":"Vinogradov, I.M.: Sur la distributions des r\u00e9sidus et des non-r\u00e9sidus des puissances. J. Phys.-Math. Soc. Perm.\u00a01, 94\u201396 (1918)","journal-title":"J. Phys.-Math. Soc. Perm."}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology - ASIACRYPT 2003"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-40061-5_17","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,3,19]],"date-time":"2019-03-19T21:47:09Z","timestamp":1553032029000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-40061-5_17"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2003]]},"ISBN":["9783540205920","9783540400615"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-40061-5_17","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2003]]}}}