{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,5]],"date-time":"2025-10-05T04:29:13Z","timestamp":1759638553843,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":24,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642341281"},{"type":"electronic","value":"9783642341298"}],"license":[{"start":{"date-parts":[[2012,1,1]],"date-time":"2012-01-01T00:00:00Z","timestamp":1325376000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-34129-8_4","type":"book-chapter","created":{"date-parts":[[2012,10,17]],"date-time":"2012-10-17T11:15:22Z","timestamp":1350472522000},"page":"33-44","source":"Crossref","is-referenced-by-count":11,"title":["Cryptanalysis of Multi-Prime RSA with Small Prime Difference"],"prefix":"10.1007","author":[{"given":"Hatem M.","family":"Bahig","sequence":"first","affiliation":[]},{"given":"Ashraf","family":"Bhery","sequence":"additional","affiliation":[]},{"given":"Dieaa I.","family":"Nassr","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"4_CR1","unstructured":"Alison, C., Paix\u00e3o, M.: An efficient variant of the RSA cryptosystem, \n                      \n                        http:\/\/eprint.iacr.org\/2003\/159"},{"key":"4_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-540-24632-9_1","volume-title":"Public Key Cryptography \u2013 PKC 2004","author":"J. Bl\u00f6mer","year":"2004","unstructured":"Bl\u00f6mer, J., May, A.: A Generalized Wiener Attack on RSA. In: Bao, F., Deng, R., Zhou, J. (eds.) PKC 2004. LNCS, vol.\u00a02947, pp. 1\u201313. Springer, Heidelberg (2004)"},{"issue":"2","key":"4_CR3","first-page":"203","volume":"46","author":"D. Boneh","year":"1999","unstructured":"Boneh, D.: Twenty years of attacks on the RSA cryptosystem. Notices of the American Mathematical Society\u00a046(2), 203\u2013213 (1999)","journal-title":"Notices of the American Mathematical Society"},{"issue":"4","key":"4_CR4","doi-asserted-by":"publisher","first-page":"1339","DOI":"10.1109\/18.850673","volume":"46","author":"D. Boneh","year":"2000","unstructured":"Boneh, D., Durfee, G.: Cryptanalysis of RSA with private key d less than N\n                    0.292. IEEE Trans. on Information Theory\u00a046(4), 1339\u20131349 (2000)","journal-title":"IEEE Trans. on Information Theory"},{"issue":"1","key":"4_CR5","first-page":"1","volume":"5","author":"D. Boneh","year":"2002","unstructured":"Boneh, D., Shacham, H.: Fast Variants of RSA. CryptoBytes\u00a05(1), 1\u20139 (2002)","journal-title":"CryptoBytes"},{"key":"4_CR6","unstructured":"Ciet, M., Koeune, F., Laguillaumie, F., Quisquater, J.-J.: Short private exponent attacks on fast variants of RSA. UCL Crypto Group Technical Report Series CG-2003\/4, Universite Catholique de Louvain (2003)"},{"key":"4_CR7","unstructured":"Collins, T., Hopkins, D., Langford, S., Sabin, M.: Public key cryptographic apparatus and method. US patent #5, 848, 149 (January 1997)"},{"issue":"4","key":"4_CR8","doi-asserted-by":"publisher","first-page":"223","DOI":"10.1007\/s001459900030","volume":"10","author":"D. Coppersmith","year":"1997","unstructured":"Coppersmith, D.: Small solutions to polynomial equations and low exponent vulnerabilities. Journal of Cryptology\u00a010(4), 223\u2013260 (1997)","journal-title":"Journal of Cryptology"},{"key":"4_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"14","DOI":"10.1007\/3-540-44448-3_2","volume-title":"Advances in Cryptology - ASIACRYPT 2000","author":"G. Durfee","year":"2000","unstructured":"Durfee, G., Nguyen, P.: Cryptanalysis of the RSA Schemes with Short Secret Exponent from Asiacrypt 99. In: Okamoto, T. (ed.) ASIACRYPT 2000. LNCS, vol.\u00a01976, pp. 14\u201329. Springer, Heidelberg (2000)"},{"issue":"2","key":"4_CR10","doi-asserted-by":"publisher","first-page":"117","DOI":"10.1515\/JMC.2008.006","volume":"2","author":"M.J. Hinek","year":"2008","unstructured":"Hinek, M.J.: On the security of multi-prime RSA. Journal of Mathematical Cryptology\u00a02(2), 117\u2013147 (2008)","journal-title":"Journal of Mathematical Cryptology"},{"key":"4_CR11","doi-asserted-by":"crossref","unstructured":"Hinek, M.J.: Cryptanalysis of RSA and its variants. Chapman & Hall\/CRC (2010)","DOI":"10.1201\/9781420075199"},{"key":"4_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"385","DOI":"10.1007\/3-540-36492-7_25","volume-title":"Selected Areas in Cryptography","author":"M.J. Hinek","year":"2003","unstructured":"Hinek, M.J., Low, M.K., Teske, E.: On Some Attacks on Multi-prime RSA. In: Nyberg, K., Heys, H.M. (eds.) SAC 2002. LNCS, vol.\u00a02595, pp. 385\u2013404. Springer, Heidelberg (2003)"},{"key":"4_CR13","doi-asserted-by":"publisher","first-page":"513","DOI":"10.1007\/BF01457454","volume":"261","author":"A.K. Lenstra","year":"1982","unstructured":"Lenstra, A.K., Lenstra, H.W., Lovasz, L.: Factoring polynomials with rational coefficients. Mathematische Annalen\u00a0261, 513\u2013534 (1982)","journal-title":"Mathematische Annalen"},{"key":"4_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"283","DOI":"10.1007\/3-540-44495-5_25","volume-title":"Progress in Cryptology - INDOCRYPT 2000","author":"S. Lim","year":"2000","unstructured":"Lim, S., Kim, S., Yie, I., Lee, H.: A Generalized Takagi-Cryptosystem with a Modulus of the Form p\n                    \n                      r\n                    \n                    q\n                    \n                      s\n                    . In: Roy, B., Okamoto, E. (eds.) INDOCRYPT 2000. LNCS, vol.\u00a01977, pp. 283\u2013294. Springer, Heidelberg (2000)"},{"key":"4_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"228","DOI":"10.1007\/978-3-540-85886-7_16","volume-title":"Information Security","author":"S. Maitra","year":"2008","unstructured":"Maitra, S., Sarkar, S.: Revisiting Wiener\u2019s Attack \u2013 New Weak Keys in RSA. In: Wu, T.-C., Lei, C.-L., Rijmen, V., Lee, D.-T. (eds.) ISC 2008. LNCS, vol.\u00a05222, pp. 228\u2013243. Springer, Heidelberg (2008)"},{"key":"4_CR16","unstructured":"May, A.: New RSA Vulnerabilities using Lattics Reduction Methods. Ph.D. Dissertation. University of Paderborn (2003)"},{"key":"4_CR17","doi-asserted-by":"crossref","unstructured":"Nassr, D., Bahig, H.M., Bhery, A., Dauod, S.: A New RSA Vulnerability Using Continued Fractions. In: Proceeding of the Sixth IEEE\/ACS International Conference on Computer Systems and Applications (Security and Information Assurance Track), April 31- May 4, pp. 694\u2013701 (2008)","DOI":"10.1109\/AICCSA.2008.4493604"},{"key":"4_CR18","doi-asserted-by":"publisher","first-page":"120","DOI":"10.1145\/359340.359342","volume":"21","author":"R. Rivest","year":"1978","unstructured":"Rivest, R., Shamir, A., Adleman, L.: A method for obtaining digital signatures and public-key cryptosystems. Communication of ACM\u00a021, 120\u2013126 (1978)","journal-title":"Communication of ACM"},{"key":"4_CR19","volume-title":"Elementary Number Theory","author":"K.H. Rosen","year":"1984","unstructured":"Rosen, K.H.: Elementary Number Theory. Addison-Wesley, Reading Mass (1984)"},{"key":"4_CR20","unstructured":"Shoup, V.: NTL: A Library for doing Number Theory, \n                      \n                        http:\/\/www.shoup.net\/ntl\/index.html"},{"key":"4_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"184","DOI":"10.1007\/978-3-540-30580-4_13","volume-title":"Public Key Cryptography - PKC 2005","author":"R. Steinfeld","year":"2005","unstructured":"Steinfeld, R., Contini, S., Pieprzyk, J., Wang, H.: Converse Results to the Wiener Attack on RSA. In: Vaudenay, S. (ed.) PKC 2005. LNCS, vol.\u00a03386, pp. 184\u2013198. Springer, Heidelberg (2005)"},{"key":"4_CR22","doi-asserted-by":"publisher","first-page":"425","DOI":"10.1007\/s002000050082","volume":"8","author":"E.R. Verheul","year":"1997","unstructured":"Verheul, E.R., van Tilborg, H.C.A.: Cryptanalysis of \u2018less short\u2019 RSA secret exponents. Applicable Algebra in Engineering, Communication and Computing\u00a08, 425\u2013435 (1997)","journal-title":"Applicable Algebra in Engineering, Communication and Computing"},{"issue":"1","key":"4_CR23","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1007\/s002000100088","volume":"13","author":"B. Weger de","year":"2002","unstructured":"de Weger, B.: Cryptanalysis of RSA with small prime difference. Applicable Algebra in Engineering, Communication and Computing\u00a013(1), 17\u201328 (2002)","journal-title":"Applicable Algebra in Engineering, Communication and Computing"},{"key":"4_CR24","doi-asserted-by":"publisher","first-page":"553","DOI":"10.1109\/18.54902","volume":"36","author":"M. Wiener","year":"1990","unstructured":"Wiener, M.: Cryptanalysis of short RSA secret exponents. IEEE Transactions on Information Theory\u00a036, 553\u2013558 (1990)","journal-title":"IEEE Transactions on Information Theory"}],"container-title":["Lecture Notes in Computer Science","Information and Communications Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-34129-8_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,25]],"date-time":"2019-08-25T20:21:32Z","timestamp":1566764492000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-34129-8_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642341281","9783642341298"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-34129-8_4","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2012]]}}}