{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T11:35:11Z","timestamp":1725708911168},"publisher-location":"Berlin, Heidelberg","reference-count":46,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642349300"},{"type":"electronic","value":"9783642349317"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-34931-7_3","type":"book-chapter","created":{"date-parts":[[2012,12,5]],"date-time":"2012-12-05T22:24:04Z","timestamp":1354746244000},"page":"17-39","source":"Crossref","is-referenced-by-count":10,"title":["Using the Cloud to Determine Key Strengths"],"prefix":"10.1007","author":[{"given":"Thorsten","family":"Kleinjung","sequence":"first","affiliation":[]},{"given":"Arjen K.","family":"Lenstra","sequence":"additional","affiliation":[]},{"given":"Dan","family":"Page","sequence":"additional","affiliation":[]},{"given":"Nigel P.","family":"Smart","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"3_CR1","unstructured":"Amazon Elastic Compute Cloud Limited Beta (July 2007), \n                    \n                      http:\/\/web.archive.org\/web\/20070705164650rn_2\/www.amazon.com\/b?ie=UTF8&node=201590011"},{"key":"3_CR2","unstructured":"Amazon Elastic Compute Cloud Beta (May 2008), \n                    \n                      http:\/\/web.archive.org\/web\/20080501182549rn_2\/www.amazon.com\/EC2-AWS-Service-Pricing\/b?ie=UTF8&node=201590011"},{"key":"3_CR3","unstructured":"Amazon Elastic Compute Cloud (Amazon EC2), \n                    \n                      http:\/\/aws.amazon.com\/ec2\/"},{"key":"3_CR4","unstructured":"Bahr, F., Boehm, M., Franke, J., Kleinjung, T.: Subject: RSA200. Announcement, May 9 (2005)"},{"key":"3_CR5","unstructured":"Bailey, D.V., Batina, L., Bernstein, D.J., Birkner, P., Bos, J.W., Chen, H.-C., Cheng, C.-M., van Damme, G., de Meulenaer, G., Perez, L.J.D., Fan, J., G\u00fcneysu, T., Gurkaynak, F., Kleinjung, T., Lange, T., Mentens, N., Niederhagen, R., Paar, C., Regazzoni, F., Schwabe, P., Uhsadel, L., Van Herrewege, A., Yang, B.-Y.: Breaking ECC2K-130. Cryptology ePrint Archive, Report 2009\/541 (2009), \n                    \n                      http:\/\/eprint.iacr.org\/2009\/541"},{"key":"3_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"260","DOI":"10.1007\/BFb0052352","volume-title":"Fast Software Encryption","author":"E. Biham","year":"1997","unstructured":"Biham, E.: A Fast New DES Implementation in Software. In: Biham, E. (ed.) FSE 1997. LNCS, vol.\u00a01267, pp. 260\u2013272. Springer, Heidelberg (1997)"},{"key":"3_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"231","DOI":"10.1007\/978-3-642-03356-8_14","volume-title":"Advances in Cryptology - CRYPTO 2009","author":"A. Biryukov","year":"2009","unstructured":"Biryukov, A., Khovratovich, D., Nikoli\u0107, I.: Distinguisher and Related-Key Attack on the Full AES-256. In: Halevi, S. (ed.) CRYPTO 2009. LNCS, vol.\u00a05677, pp. 231\u2013249. Springer, Heidelberg (2009)"},{"key":"3_CR8","unstructured":"The BOINC project, \n                    \n                      http:\/\/boinc.berkeley.edu\/"},{"key":"3_CR9","doi-asserted-by":"publisher","first-page":"273","DOI":"10.1007\/BF00154339","volume":"1","author":"T.R. Caron","year":"1988","unstructured":"Caron, T.R., Silverman, R.D.: Parallel implementation of the quadratic sieve. J. Supercomputing\u00a01, 273\u2013290 (1988)","journal-title":"J. Supercomputing"},{"key":"3_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/3-540-45539-6_1","volume-title":"Advances in Cryptology - EUROCRYPT 2000","author":"S. Cavallar","year":"2000","unstructured":"Cavallar, S., Dodson, B., Lenstra, A.K., Lioen, W., Montgomery, P.L., Murphy, B., te Riele, H., Aardal, K., Gilchrist, J., Guillerm, G., Leyland, P., Marchand, J., Morain, F., Muffett, A., Putnam, C., Putnam, C., Zimmermann, P.: Factorization of a 512-Bit RSA Modulus. In: Preneel, B. (ed.) EUROCRYPT 2000. LNCS, vol.\u00a01807, pp. 1\u201318. Springer, Heidelberg (2000)"},{"key":"3_CR11","unstructured":"Certicom Inc. The Certicom ECC Challenge, \n                    \n                      http:\/\/www.certicom.com\/index.php\/the-certicom-ecc-challenge"},{"key":"3_CR12","doi-asserted-by":"publisher","first-page":"169","DOI":"10.1007\/BF00198464","volume":"6","author":"D. Coppersmith","year":"1993","unstructured":"Coppersmith, D.: Modifications to the number field sieve. J. of Cryptology\u00a06, 169\u2013180 (1993)","journal-title":"J. of Cryptology"},{"key":"3_CR13","unstructured":"Hayashi, T., Shimoyama, T., Shinohara, N., Takagi. T.: Breaking pairing-based cryptosystems using \u03b7\n                  \n                    T\n                   pairing over GF(397). Cryptology ePrint Archive, Report 2012\/345 (2012), \n                    \n                      http:\/\/eprint.iacr.org\/2012\/345"},{"key":"3_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"119","DOI":"10.1007\/11545262_9","volume-title":"Cryptographic Hardware and Embedded Systems \u2013 CHES 2005","author":"J. Franke","year":"2005","unstructured":"Franke, J., Kleinjung, T., Paar, C., Pelzl, J., Priplata, C., Stahlke, C.: SHARK: A Realizable Special Hardware Sieving Device for Factoring 1024-Bit Integers. In: Rao, J.R., Sunar, B. (eds.) CHES 2005. LNCS, vol.\u00a03659, pp. 119\u2013130. Springer, Heidelberg (2005)"},{"key":"3_CR15","unstructured":"Gilmore, J. (ed.): Cracking DES: Secrets of Encryption Research, Wiretap Politics & Chip Design. Electronic Frontier Foundation. O\u2019Reilly & Associates (1998)"},{"key":"3_CR16","doi-asserted-by":"publisher","first-page":"1498","DOI":"10.1109\/TC.2008.80","volume":"57","author":"T. G\u00fcneysu","year":"2008","unstructured":"G\u00fcneysu, T., Kasper, T., Novotn\u00fd, M., Paar, C., Rupp, A.: Cryptanalysis with COPACOBANA. IEEE Transactions on Computers\u00a057, 1498\u20131513 (2008)","journal-title":"IEEE Transactions on Computers"},{"key":"3_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"51","DOI":"10.1007\/978-3-642-03317-9_4","volume-title":"Fast Software Encryption","author":"S. Gueron","year":"2009","unstructured":"Gueron, S.: Intel\u2019s New AES Instructions for Enhanced Performance and Security. In: Dunkelman, O. (ed.) FSE 2009. LNCS, vol.\u00a05665, pp. 51\u201366. Springer, Heidelberg (2009)"},{"key":"3_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"333","DOI":"10.1007\/978-3-642-14623-7_18","volume-title":"Advances in Cryptology \u2013 CRYPTO 2010","author":"T. Kleinjung","year":"2010","unstructured":"Kleinjung, T., Aoki, K., Franke, J., Lenstra, A.K., Thom\u00e9, E., Bos, J.W., Gaudry, P., Kruppa, A., Montgomery, P.L., Osvik, D.A., te Riele, H., Timofeev, A., Zimmermann, P.: Factorization of a 768-Bit RSA Modulus. In: Rabin, T. (ed.) CRYPTO 2010. LNCS, vol.\u00a06223, pp. 333\u2013350. Springer, Heidelberg (2010)"},{"key":"3_CR19","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1007\/s10586-010-0149-0","volume":"15","author":"I. Kleinjung","year":"2012","unstructured":"Kleinjung, I., Bos, J.W., Lenstra, A.K., Osvik, D.A., Aoki, K., Contini, S., Franke, J., Thom\u00e9, E., Jermini, P., Thi\u00e9mard, M., Leyland, P., Montgomery, P.L., Timofeev, A., Stockinger, H.: A heterogeneous computing environment to solve the 768-bit RSA challenge. Cluster Computing\u00a015, 53\u201368 (2012)","journal-title":"Cluster Computing"},{"key":"3_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"67","DOI":"10.1007\/3-540-45682-1_5","volume-title":"Advances in Cryptology - ASIACRYPT 2001","author":"A.K. Lenstra","year":"2001","unstructured":"Lenstra, A.K.: Unbelievable Security; Matching AES Security Using Public Key Systems. In: Boyd, C. (ed.) ASIACRYPT 2001. LNCS, vol.\u00a02248, pp. 67\u201386. Springer, Heidelberg (2001)"},{"key":"3_CR21","unstructured":"Lenstra, A.K.: Key Lengths. In: The Handbook of Information Security, ch. 114. Wiley (2005)"},{"key":"3_CR22","doi-asserted-by":"crossref","unstructured":"Lenstra, A.K., Lenstra Jr., H.W. (eds.): The development of the number field sieve. Lecture Notes in Math., vol.\u00a01554. Springer (1993)","DOI":"10.1007\/BFb0091534"},{"key":"3_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"355","DOI":"10.1007\/3-540-46885-4_35","volume-title":"Advances in Cryptology - EUROCRYPT \u201989","author":"A.K. Lenstra","year":"1990","unstructured":"Lenstra, A.K., Manasse, M.S.: Factoring by Electronic Mail. In: Quisquater, J.J., Vandewalle, J. (eds.) EUROCRYPT 1989. LNCS, vol.\u00a0434, pp. 355\u2013371. Springer, Heidelberg (1990)"},{"key":"3_CR24","doi-asserted-by":"crossref","first-page":"255","DOI":"10.1007\/s00145-001-0009-4","volume":"14","author":"A.K. Lenstra","year":"2001","unstructured":"Lenstra, A.K., Verheul, E.R.: Selecting Cryptographic Key Sizes. J. of Cryptology\u00a014, 255\u2013293 (2001)","journal-title":"J. of Cryptology"},{"key":"3_CR25","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"121","DOI":"10.1007\/978-3-540-74735-2_9","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2007","author":"M. Matsui","year":"2007","unstructured":"Matsui, M., Nakajima, J.: On the Power of Bitslice Implementation on Intel Core2 Processor. In: Paillier, P., Verbauwhede, I. (eds.) CHES 2007. LNCS, vol.\u00a04727, pp. 121\u2013134. Springer, Heidelberg (2007)"},{"key":"3_CR26","unstructured":"NIST. Secure Hash Signature Standard (SHS) \u2013 FIPS PUB 180-2, \n                    \n                      http:\/\/csrc.nist.gov\/publications\/fips\/fips180-2\/fips180-2.pdf"},{"key":"3_CR27","unstructured":"NIST. Digital Signature Standard (DSS) \u2013 FIPS PUB 186-2, \n                    \n                      http:\/\/csrc.nist.gov\/publications\/fips\/fips186-2\/fips186-2-change1.pdf"},{"key":"3_CR28","unstructured":"NFS@home, \n                    \n                      http:\/\/escatter11.fullerton.edu\/nfs"},{"key":"3_CR29","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/PL00003816","volume":"12","author":"P.C. Oorschot van","year":"1999","unstructured":"van Oorschot, P.C., Wiener, M.J.: Parallel collision search with cryptanalytic applications. J. of Cryptology\u00a012, 1\u201328 (1999)","journal-title":"J. of Cryptology"},{"key":"3_CR30","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1007\/s00145-009-9049-y","volume":"23","author":"D.A. Osvik","year":"2010","unstructured":"Osvik, D.A., Shamir, A., Tromer, E.: Efficient Cache Attacks on AES, and Countermeasures. J. of Cryptology\u00a023, 37\u201371 (2010)","journal-title":"J. of Cryptology"},{"key":"3_CR31","first-page":"918","volume":"32","author":"J. Pollard","year":"1978","unstructured":"Pollard, J.: Monte Carlo methods for index computation mod p. Math. Comp.\u00a032, 918\u2013924 (1978)","journal-title":"Math. Comp."},{"key":"3_CR32","unstructured":"Quisquater, J.-J., Standaert, F.: Exhaustive key search of the DES: Updates and refinements. In: SHARCS 2005 (2005)"},{"key":"3_CR33","doi-asserted-by":"crossref","unstructured":"Quisquater, J.-J., Standaert, F.: Time-memory tradeoffs. In: Encyclopedia of Cryptography and Security, pp. 614\u2013616. Springer (2005)","DOI":"10.1007\/0-387-23483-7_430"},{"key":"3_CR34","doi-asserted-by":"crossref","unstructured":"Rouvroy, G., Standaert, F.-X., Quisquarter, J.-J., Legat, J.-D.: Design strategies and modified descriptions to optimize cipher FPGA implementations: Fact and compact results for DES and Triple-DES. In: ACM\/SIGDA - Symposium on FPGAs, pp. 247\u2013247 (2003)","DOI":"10.1145\/611817.611879"},{"key":"3_CR35","unstructured":"The RSA challenge numbers, formerly on \n                    \n                      http:\/\/www.rsa.com\/rsalabs\/node.asp?id=2093\n                    \n                    \n                  , now on for instance \n                    \n                      http:\/\/en.wikipedia.org\/wiki\/RSA_numbers"},{"key":"3_CR36","unstructured":"SECG. Standards for Efficient Cryptography Group. SEC2: Recommended Elliptic Curve Domain Parameters version 1.0, \n                    \n                      http:\/\/www.secg.org"},{"key":"3_CR37","unstructured":"http:\/\/csrc.nist.gov\/groups\/ST\/hash\/sha-3\/"},{"key":"3_CR38","doi-asserted-by":"crossref","unstructured":"Shamir, A.: Factoring large numbers with the TWINKLE device (2000) (manuscript)","DOI":"10.1007\/3-540-48059-5_2"},{"key":"3_CR39","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-540-45146-4_1","volume-title":"Advances in Cryptology - CRYPTO 2003","author":"A. Shamir","year":"2003","unstructured":"Shamir, A., Tromer, E.: Factoring Large Numbers with the TWIRL Device. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol.\u00a02729, pp. 1\u201326. Springer, Heidelberg (2003)"},{"key":"3_CR40","unstructured":"Smart, N.P. (ed.): ECRYPT II: Yearly report on algorithms and keysizes (2009-2010), \n                    \n                      http:\/\/www.ecrypt.eu.org\/documents\/D.SPA.13.pdf"},{"key":"3_CR41","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"334","DOI":"10.1007\/978-3-540-45238-6_27","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2003","author":"F.-X. Standaert","year":"2003","unstructured":"Standaert, F.-X., Rouvroy, G., Quisquater, J.-J., Legat, J.-D.: Efficient Implementation of Rijndael Encryption in Reconfigurable Hardware: Improvements and Design Tradeoffs. In: Walter, C.D., Ko\u00e7, \u00c7.K., Paar, C. (eds.) CHES 2003. LNCS, vol.\u00a02779, pp. 334\u2013350. Springer, Heidelberg (2003)"},{"key":"3_CR42","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"55","DOI":"10.1007\/978-3-642-03356-8_4","volume-title":"Advances in Cryptology - CRYPTO 2009","author":"M. Stevens","year":"2009","unstructured":"Stevens, M., Sotirov, A., Appelbaum, J., Lenstra, A., Molnar, D., Osvik, D.A., de Weger, B.: Short Chosen-Prefix Collisions for MD5 and the Creation of a Rogue CA Certificate. In: Halevi, S. (ed.) CRYPTO 2009. LNCS, vol.\u00a05677, pp. 55\u201369. Springer, Heidelberg (2009)"},{"key":"3_CR43","unstructured":"Wang, X., Feng, D., Lai, X., Yu, H.: Collisions for Hash Functions MD4, MD5, HAVAL-128 and RIPEMD. Cryptology ePrint Archive, Report 2004\/199 (2004), \n                    \n                      http:\/\/eprint.iacr.org\/2004\/199"},{"key":"3_CR44","doi-asserted-by":"crossref","unstructured":"Wang, X., Yao, A., Yao, F.: New Collision Search for SHA-1. Crypto 2005 Rump session (2005), \n                    \n                      http:\/\/www.iacr.org\/conferences\/crypto2005\/r\/2.pdf","DOI":"10.1007\/11535218_1"},{"key":"3_CR45","series-title":"Lecture Notes in Computer Science","first-page":"17","volume-title":"Advances in Cryptology \u2013 CRYPTO 2005","author":"X. Wang","year":"2005","unstructured":"Wang, X., Yin, Y.L., Yu, H.: Finding Collisions in the Full SHA-1. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol.\u00a03621, pp. 17\u201336. Springer, Heidelberg (2005)"},{"key":"3_CR46","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1007\/11426639_2","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2005","author":"X. Wang","year":"2005","unstructured":"Wang, X., Yu, H.: How to Break MD5 and Other Hash Functions. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol.\u00a03494, pp. 19\u201335. Springer, Heidelberg (2005)"}],"container-title":["Lecture Notes in Computer Science","Progress in Cryptology - INDOCRYPT 2012"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-34931-7_3.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,4]],"date-time":"2021-05-04T13:07:56Z","timestamp":1620133676000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-34931-7_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642349300","9783642349317"],"references-count":46,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-34931-7_3","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2012]]}}}