{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T14:58:40Z","timestamp":1725548320218},"publisher-location":"Berlin, Heidelberg","reference-count":25,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642041167"},{"type":"electronic","value":"9783642041174"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-04117-4_2","type":"book-chapter","created":{"date-parts":[[2010,2,22]],"date-time":"2010-02-22T11:44:00Z","timestamp":1266839040000},"page":"21-34","source":"Crossref","is-referenced-by-count":3,"title":["Public-Key Cryptography"],"prefix":"10.1007","author":[{"given":"Jonathan","family":"Katz","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"key":"2_CR1","doi-asserted-by":"crossref","DOI":"10.1201\/9781420010756","volume-title":"Introduction to Modern Cryptography","author":"J. Katz","year":"2007","unstructured":"J.\u00a0Katz, Y.\u00a0Lindell: Introduction to Modern Cryptography (Chapman & Hall\/CRS Press, Boca Raton, FL, USA 2007)"},{"issue":"2","key":"2_CR2","doi-asserted-by":"publisher","first-page":"120","DOI":"10.1145\/359340.359342","volume":"21","author":"R.L. Rivest","year":"1978","unstructured":"R.L.\u00a0Rivest, A.\u00a0Shamir, L.M.\u00a0Adleman: A method for obtaining digital signature and public-key cryptosystems, Commun. ACM, 21(2), 120\u2013126 (1978)","journal-title":"Commun. ACM"},{"key":"2_CR3","doi-asserted-by":"publisher","first-page":"469","DOI":"10.1109\/TIT.1985.1057074","volume":"31","author":"T. Gamal El","year":"1985","unstructured":"T.\u00a0El Gamal: A public key cryptosystem and a signature scheme based on discrete logarithms, Trans. Inf. Theory 31, 469\u2013472 (1985)","journal-title":"Trans. Inf. Theory"},{"key":"2_CR4","unstructured":"PKCS #1 version 1.5: RSA cryptography standard (RSA Data Security, Inc., 1991), available at http:\/\/www.rsa.com\/rsalabs"},{"key":"2_CR5","series-title":"Lecture Notes in Computer Science","first-page":"1","volume-title":"Advances in Cryptology \u2013 Crypto \u201998","author":"D. Bleichenbacher","year":"1998","unstructured":"D.\u00a0Bleichenbacher: Chosen ciphertext attacks against protocols based on the RSA encryption standard PKCS #1. In: Advances in Cryptology \u2013 Crypto \u201998, Lecture Notes in Computer Science, Vol. 1462, ed. by H.\u00a0Krawczyk (Springer, Heidelberg, Germany 1998) pp. 1\u201312"},{"key":"2_CR6","unstructured":"PKCS #1 version 2.1: RSA cryptography standard (RSA Data Security, Inc., 1998), available at http:\/\/www.rsa.com\/rsalabs"},{"key":"2_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"92","DOI":"10.1007\/BFb0053428","volume-title":"Advances in Cryptology \u2013 Eurocrypt \u201994","author":"M. Bellare","year":"1994","unstructured":"M.\u00a0Bellare, P.\u00a0Rogaway: Optimal asymmetric encryption. In: Advances in Cryptology \u2013 Eurocrypt \u201994, Lecture Notes in Computer Science, Vol. 950, ed. by A.\u00a0De Santis (Springer, Heidelberg, Germany 1994) pp. 92\u2013111"},{"issue":"2","key":"2_CR8","doi-asserted-by":"publisher","first-page":"81","DOI":"10.1007\/s00145-002-0204-y","volume":"17","author":"E. Fujisaki","year":"2004","unstructured":"E.\u00a0Fujisaki, T.\u00a0Okamoto, D.\u00a0Pointcheval, J.\u00a0Stern: RSA-OAEP is secure under the RSA assumption, J. Cryptol. 17(2), 81\u2013104 (2004)","journal-title":"J. Cryptol."},{"key":"2_CR9","doi-asserted-by":"crossref","unstructured":"M.\u00a0Bellare, P.\u00a0Rogaway: Random oracles are practical: A paradigm for designing efficient protocols, 1st ACM Conference on Computer and Communications Security (ACM Press, 1993) pp. 62\u201373","DOI":"10.1145\/168588.168596"},{"issue":"1","key":"2_CR10","doi-asserted-by":"publisher","first-page":"167","DOI":"10.1137\/S0097539702403773","volume":"33","author":"R. Cramer","year":"2003","unstructured":"R.\u00a0Cramer, V.\u00a0Shoup: Design and analysis of practical public-key encryption schemes secure against adaptive chosen ciphertext attack, SIAM J. Comput. 33(1), 167\u2013226 (2003)","journal-title":"SIAM J. Comput."},{"key":"2_CR11","unstructured":"Digital signature standard (dss). National Institute of Standards and Technology (NIST), FIPS PUB #186-2, Department of Commerce, 2000"},{"key":"2_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"399","DOI":"10.1007\/3-540-68339-9_34","volume-title":"Advances in Cryptology \u2013 Eurocrypt \u201996","author":"M. Bellare","year":"1996","unstructured":"M.\u00a0Bellare, P.\u00a0Rogaway: The exact security of digital signatures: How to sign with RSA and Rabin. In: Advances in Cryptology \u2013 Eurocrypt \u201996, Lecture Notes in Computer Science, Vol. 1070, ed. by U.M.\u00a0Maurer (Springer, Heidelberg, Germany 1996) pp. 399\u2013416"},{"key":"2_CR13","doi-asserted-by":"crossref","DOI":"10.1017\/CBO9780511546891","volume-title":"Foundations of Cryptography, Vol. 1: Basic Tools","author":"O. Goldreich","year":"2001","unstructured":"O.\u00a0Goldreich: Foundations of Cryptography, Vol. 1: Basic Tools (Cambridge University Press, Cambridge, UK 2001)"},{"key":"2_CR14","doi-asserted-by":"crossref","DOI":"10.1017\/CBO9780511721656","volume-title":"Foundations of Cryptography, Vol. 2: Basic Applications","author":"O. Goldreich","year":"2004","unstructured":"O.\u00a0Goldreich: Foundations of Cryptography, Vol. 2: Basic Applications (Cambridge University Press, Cambridge, UK 2004)"},{"key":"2_CR15","doi-asserted-by":"crossref","DOI":"10.1201\/9781420057133","volume-title":"Cryptography: Theory and Practice","author":"D.R. Stinson","year":"2005","unstructured":"D.R.\u00a0Stinson: Cryptography: Theory and Practice, 3rd edn. (Chapman & Hall\/CRC Press, Boca Raton, FL, USA 2005)","edition":"3"},{"key":"2_CR16","unstructured":"M. Bellare, P. Rogaway: Introduction to modern cryptography: Lecture notes (2003), available at http:\/\/www.cs.ucsd.edu\/users\/mihir\/cse207\/classnotes.html"},{"key":"2_CR17","volume-title":"Applied Cryptography","author":"B. Schneier","year":"1996","unstructured":"B.\u00a0Schneier: Applied Cryptography, 2nd edn. (Wiley, New York, NY, USA 1996)","edition":"2"},{"key":"2_CR18","doi-asserted-by":"crossref","DOI":"10.1201\/9781439821916","volume-title":"Handbook of Applied Cryptography","author":"A.J. Menezes","year":"1996","unstructured":"A.J.\u00a0Menezes, P.C.\u00a0van Oorschot, S.A.\u00a0Vanstone: Handbook of Applied Cryptography (CRC Press, Boca Raton, FL, USA 1996)"},{"issue":"6","key":"2_CR19","doi-asserted-by":"publisher","first-page":"644","DOI":"10.1109\/TIT.1976.1055638","volume":"22","author":"W. Diffie","year":"1976","unstructured":"W.\u00a0Diffie, M.E.\u00a0Hellman: New directions in cryptography, IEEE Trans. Inf. Theory 22(6), 644\u2013654 (1976)","journal-title":"IEEE Trans. Inf. Theory"},{"key":"2_CR20","unstructured":"M.O.\u00a0Rabin: Digital signatures and public key functions as intractable as factorization. Technical Report MIT\/LCS\/TR-212 (Massachusetts Institute of Technology, January 1979)"},{"issue":"2","key":"2_CR21","doi-asserted-by":"publisher","first-page":"270","DOI":"10.1016\/0022-0000(84)90070-9","volume":"28","author":"S. Goldwasser","year":"1984","unstructured":"S.\u00a0Goldwasser, S.\u00a0Micali: Probabilistic encryption, J. Comput. Syst. Sci. 28(2), 270\u2013299 (1984)","journal-title":"J. Comput. Syst. Sci."},{"key":"2_CR22","doi-asserted-by":"crossref","unstructured":"M.\u00a0Naor, M.\u00a0Yung: Public-key cryptosystems provably secure against chosen ciphertext attacks, 22nd Annual ACM Symposium on Theory of Computing (ACM Press, 1990)","DOI":"10.1145\/100216.100273"},{"key":"2_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"433","DOI":"10.1007\/3-540-46766-1_35","volume-title":"Advances in Cryptology \u2013 Crypto \u201991","author":"C. Rackoff","year":"1992","unstructured":"C.\u00a0Rackoff, D.R.\u00a0Simon: Non-interactive zero-knowledge proof of knowledge and chosen ciphertext attack. In: Advances in Cryptology \u2013 Crypto \u201991, Lecture Notes in Computer Science, Vol. 576, ed. by J.\u00a0Feigenbaum (Springer, Heidelberg, Germany 1992) pp. 433\u2013444"},{"key":"2_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"289","DOI":"10.1007\/3-540-39568-7_23","volume-title":"Advances in Cryptology \u2013 Crypto \u201984","author":"M. Blum","year":"1985","unstructured":"M.\u00a0Blum, S.\u00a0Goldwasser: An efficient probabilistic public-key encryption scheme which hides all partial information. In: Advances in Cryptology \u2013 Crypto \u201984, Lecture Notes in Computer Science, Vol. 196, ed. by G.R.\u00a0Blakley, D.\u00a0Chaum (Springer, Heidelberg, Germany 1985) pp. 289\u2013302"},{"issue":"2","key":"2_CR25","doi-asserted-by":"publisher","first-page":"281","DOI":"10.1137\/0217017","volume":"17","author":"S. Goldwasser","year":"1988","unstructured":"S.\u00a0Goldwasser, S.\u00a0Micali, R.L.\u00a0Rivest: A digital signature scheme secure against adaptive chosen-message attacks, SIAM J. Comput. 17(2), 281\u2013308 (1988)","journal-title":"SIAM J. Comput."}],"container-title":["Handbook of Information and Communication Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-04117-4_2.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,10,23]],"date-time":"2021-10-23T14:01:33Z","timestamp":1634997693000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-04117-4_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642041167","9783642041174"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-04117-4_2","relation":{},"subject":[],"published":{"date-parts":[[2010]]}}}