{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T00:01:35Z","timestamp":1740096095213,"version":"3.37.3"},"publisher-location":"Berlin, Heidelberg","reference-count":25,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642219689"},{"type":"electronic","value":"9783642219696"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-21969-6_16","type":"book-chapter","created":{"date-parts":[[2011,6,28]],"date-time":"2011-06-28T15:41:28Z","timestamp":1309275688000},"page":"260-277","source":"Crossref","is-referenced-by-count":1,"title":["Analyzing Standards for RSA Integers"],"prefix":"10.1007","author":[{"given":"Daniel","family":"Loebenberger","sequence":"first","affiliation":[]},{"given":"Michael","family":"N\u00fcsken","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"16_CR1","unstructured":"Accredited Standards Committee X9, ANSI X9.44-2007: Public Key Cryptography Using Reversible Algorithms for the Financial Services Industry: Transport of Symmetric Algorithm Keys Using RSA. Technical report, American National Standards Institute, American Bankers Association (2007)"},{"key":"16_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"358","DOI":"10.1007\/3-540-48071-4_26","volume-title":"Advances in Cryptology - CRYPTO \u201992","author":"J. Brandt","year":"1992","unstructured":"Brandt, J., Damg\u00e5rd, I.B.: On generation of probable primes by incremental search. In: Brickell, E.F. (ed.) CRYPTO 1992. LNCS, vol.\u00a0740, pp. 358\u2013370. Springer, Heidelberg (1992), http:\/\/dx.doi.org\/10.1007\/3-540-48071-4_26"},{"key":"16_CR3","unstructured":"Cocks, C.C.: A note on \u2019non-secret encryption\u2019. CESG Memo (1973) http:\/\/www.cesg.gov.uk\/publications\/media\/notense.pdf (last download May 12, 2009)"},{"key":"16_CR4","unstructured":"Cox, M.J., Engelschall, R., Henson, S., Laurie, B.: OpenSSL 0.9.8j. Open source implementation (2009), http:\/\/www.openssl.org\/ Refer to, http:\/\/www.openssl.org\/ (last download April 21, 2009)"},{"key":"16_CR5","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1007\/s00025-008-0285-5","volume":"52","author":"A. Decker","year":"2008","unstructured":"Decker, A., Moree, P.: Counting RSA-integers. Results in Mathematics\u00a052, 35\u201339 (2008), http:\/\/dx.doi.org\/10.1007\/s00025-008-0285-5","journal-title":"Results in Mathematics"},{"key":"16_CR6","unstructured":"Ellis, J.H.: The possibility of secure non-secret digital encryption (1970), http:\/\/cryptocellar.web.cern.ch\/cryptocellar\/cesg\/possnse.pdf (last download May 12, 2009)"},{"key":"16_CR7","unstructured":"Free Software Foundation, GNU Crypto. Open source implementation (2009), http:\/\/www.gnu.org\/software\/gnu-crypto\/ Refer to gnu-crypto-2.0.1.tar.bz2 (last download April 21, 2009)"},{"key":"16_CR8","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511546891","volume-title":"Foundations of Cryptography : Basic Tools","author":"O. Goldreich","year":"2001","unstructured":"Goldreich, O.: Foundations of Cryptography: Basic Tools, vol.\u00a01. Cambridge University Press, Cambridge (2001) ISBN 0-521-79172-3"},{"key":"16_CR9","unstructured":"IEEE working group 2000. IEEE 1363-2000: Standard Specifications For Public Key Cryptography. IEEE standard, IEEE, New York, NY 10017, http:\/\/grouper.ieee.org\/groups\/1363\/P1363\/"},{"key":"16_CR10","unstructured":"Information Technology Laboratory, FIPS 186-3: Digital Signature Standard (DSS). Technical report, National Institute of Standards and Technology (2009)"},{"key":"16_CR11","unstructured":"International Organization for Standards, ISO\/IEC 18033-2, Encryption algorithms \u2014 Part 2: Asymmetric ciphers. Technical report, International Organization for Standards (2006)"},{"key":"16_CR12","unstructured":"Jonsson, J., Kaliski, B.: Public-Key Cryptography Standards (PKCS) #1: RSA Cryptography Specifications Version 2.1 (2003), http:\/\/tools.ietf.org\/html\/rfc3447 RFC 3447"},{"key":"16_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"160","DOI":"10.1007\/11894063_13","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2006","author":"M. Joye","year":"2006","unstructured":"Joye, M., Paillier, P.: Fast generation of prime numbers on portable devices: An update. In: Goubin, L., Matsui, M. (eds.) CHES 2006. LNCS, vol.\u00a04249, pp. 160\u2013173. Springer, Heidelberg (2006) ISBN 978-3-540-46559-1. ISSN 0302-9743, http:\/\/dx.doi.org\/10.1007\/11894063_13"},{"key":"16_CR14","volume-title":"The Art of Computer Programming, Seminumerical Algorithms","author":"D.E. Knuth","year":"1998","unstructured":"Knuth, D.E.: The Art of Computer Programming, Seminumerical Algorithms, 3rd edn., vol.\u00a02. Addison-Wesley, Reading (1998) ISBN 0-201-89684-2, 1st edn. (1969)","edition":"3"},{"key":"16_CR15","unstructured":"Loebenberger, D., N\u00fcsken, M.: Coarse-grained integers. e-print arXiv:1003.2165v1 (2010), http:\/\/arxiv.org\/abs\/1003.2165"},{"key":"16_CR16","unstructured":"Loebenberger, D., N\u00fcsken, M.: Analyzing standards for RSA integers \u2013 extended version. e-print arXiv:1104.4356v2 (2011), http:\/\/www.arxiv.org\/abs\/1104.4356"},{"issue":"3","key":"16_CR17","doi-asserted-by":"publisher","first-page":"123","DOI":"10.1007\/BF00202269","volume":"8","author":"U.M. Maurer","year":"1995","unstructured":"Maurer, U.M.: Fast Generation of Prime Numbers and Secure Public-Key Cryptographic Parameters. Journal of Cryptology\u00a08(3), 123\u2013155 (1995), http:\/\/dx.doi.org\/10.1007\/BF00202269","journal-title":"Journal of Cryptology"},{"key":"16_CR18","unstructured":"NESSIE working group, NESSIE D20 - NESSIE security report. Technical report, NESSIE (2003)"},{"key":"16_CR19","unstructured":"von Neumann, J.: Various techniques used in connection with random digits. Monte Carlo methods. National Bureau of Standards, Applied Mathematics Series, vol.\u00a012, pp. 36\u201338 (1951)"},{"key":"16_CR20","unstructured":"de\u00a0Raadt, T., Provos, N., Friedl, M., Beck, B., Campbell, A., Song, D.: OpenSSH 2.1.1. Open source implementation (2009), http:\/\/www.openssh.org\/ , Refer to openssh-2.1.1p4.tar.gz (last download April 21,2009)"},{"key":"16_CR21","doi-asserted-by":"crossref","unstructured":"Rivest, R.L., Shamir, A., Adleman, L.M.: A Method for Obtaining Digital Signatures and Public-Key Cryptosystems. Technical Report MIT\/LCS\/TM-82, Massachusetts Institute of Technology, Laboratory for Computer Science, Cambridge, Massachusetts (1977)","DOI":"10.21236\/ADA606588"},{"issue":"2","key":"16_CR22","doi-asserted-by":"publisher","first-page":"120","DOI":"10.1145\/359340.359342","volume":"21","author":"R.L. Rivest","year":"1978","unstructured":"Rivest, R.L., Shamir, A., Adleman, L.M.: A Method for Obtaining Digital Signatures and Public-Key Cryptosystems. Communications of the ACM\u00a021(2), 120\u2013126 (1978)","journal-title":"Communications of the ACM"},{"key":"16_CR23","unstructured":"RSA Laboratories :RSAES-OAEP Encryption Scheme. Algorithm specification and supporting documentation, RSA Security Inc., Bedford, MA 01730 USA (2000), ftp:\/\/ftp.rsasecurity.com\/pub\/rsalabs\/rsa_algorithm\/rsa-oaep_spec.pdf"},{"key":"16_CR24","unstructured":"Skala, M., Roth, M., Hernaeus, N., Guyomarch, R., Koch, W.: GnuPG. Open source implementation (2009), http:\/\/www.gnupg.org Refer to gnupg-2.0.9.tar.bz2 (last download April 21, 2009)"},{"key":"16_CR25","first-page":"346","volume":"13","author":"P. Wohlmacher","year":"2009","unstructured":"Wohlmacher, P.: Bekanntmachung zur elektronischen Signatur nach dem Signaturgesetz und der Signaturverordnung (\u00dcbersicht \u00fcber geeignete Algorithmen). Bundesanzeiger\u00a013, 346\u2013350 (2009), http:\/\/www.bundesnetzagentur.de\/media\/archive\/14953.pdf","journal-title":"Bundesanzeiger"}],"container-title":["Lecture Notes in Computer Science","Progress in Cryptology \u2013 AFRICACRYPT 2011"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-21969-6_16","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,12]],"date-time":"2019-06-12T09:32:17Z","timestamp":1560331937000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-21969-6_16"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642219689","9783642219696"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-21969-6_16","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2011]]}}}