{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,6]],"date-time":"2025-12-06T04:56:27Z","timestamp":1764996987468},"publisher-location":"Berlin, Heidelberg","reference-count":21,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642406621"},{"type":"electronic","value":"9783642406638"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-40663-8_13","type":"book-chapter","created":{"date-parts":[[2013,8,19]],"date-time":"2013-08-19T21:03:57Z","timestamp":1376946237000},"page":"119-131","source":"Crossref","is-referenced-by-count":4,"title":["Lattice Attacks on DSA Schemes Based on Lagrange\u2019s Algorithm"],"prefix":"10.1007","author":[{"given":"Konstantinos","family":"Draziotis","sequence":"first","affiliation":[]},{"given":"Dimitrios","family":"Poulakis","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"13_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"277","DOI":"10.1007\/BFb0052242","volume-title":"Advances in Cryptology - CRYPTO \u201997","author":"M. Bellare","year":"1997","unstructured":"Bellare, M., Goldwasser, S., Micciancio, D.: \u201cPseudo-random\u201d number generation within cryptographic algorithms: The DSS case. In: Kaliski Jr., B.S. (ed.) CRYPTO 1997. LNCS, vol.\u00a01294, pp. 277\u2013291. Springer, Heidelberg (1997)"},{"doi-asserted-by":"crossref","unstructured":"Blake, I.F., Seroussi, G., Smart, N.: Elliptic Curves in Cryptography. Cambridge University Press (2000)","key":"13_CR2","DOI":"10.1017\/CBO9781107360211"},{"issue":"1-3","key":"13_CR3","doi-asserted-by":"publisher","first-page":"87","DOI":"10.1023\/A:1016549024113","volume":"26","author":"I.F. Blake","year":"2002","unstructured":"Blake, I.F., Garefalakis, T.: On the security of the digital signature algorithm. Des. Codes Cryptogr.\u00a026(1-3), 87\u201396 (2002)","journal-title":"Des. Codes Cryptogr."},{"key":"13_CR4","doi-asserted-by":"publisher","first-page":"364","DOI":"10.1137\/0215025","volume":"15","author":"L. Blum","year":"1986","unstructured":"Blum, L., Blum, M., Shub, M.: A Simple Unpredictable Pseudo-Random Number Generator. SIAM Journal on Computing\u00a015, 364\u2013383 (1986)","journal-title":"SIAM Journal on Computing"},{"key":"13_CR5","doi-asserted-by":"publisher","first-page":"469","DOI":"10.1109\/TIT.1985.1057074","volume":"31","author":"T. ElGamal","year":"1985","unstructured":"ElGamal, T.: A public key cryptosystem and a signature scheme based on discrete logarithm. IEEE Transactions on Information Theory\u00a031, 469\u2013472 (1985)","journal-title":"IEEE Transactions on Information Theory"},{"unstructured":"FIPS PUB 186-3: Federal Information Processing Standards Publication, Digital Signature Standard (DSS)","key":"13_CR6"},{"unstructured":"Girault, M., Poupard, G., Stern, J.: Global Payment System (GPS): un protocole de signature \u00e0 la vol\u00e9e. In: Proceedings of Trusting Electronic Trade (1999)","key":"13_CR7"},{"key":"13_CR8","doi-asserted-by":"crossref","first-page":"36","DOI":"10.1007\/s102070100002","volume":"1","author":"D. Johnson","year":"2001","unstructured":"Johnson, D., Menezes, A.J., Vanstone, S.A.: The elliptic curve digital signature algorithm (ECDSA). Intern. J. of Information Security\u00a01, 36\u201363 (2001)","journal-title":"Intern. J. of Information Security"},{"doi-asserted-by":"crossref","unstructured":"Hoffstein, J., Pipher, J., Silverman, J.: An Introduction to Mathematical Cryptography. Springer (2008)","key":"13_CR9","DOI":"10.1007\/978-0-387-77993-5_6"},{"key":"13_CR10","doi-asserted-by":"publisher","first-page":"283","DOI":"10.1023\/A:1011214926272","volume":"23","author":"N.A. Howgrave-Graham","year":"2001","unstructured":"Howgrave-Graham, N.A., Smart, N.P.: Lattice Attacks on Digital Signature Schemes. Des. Codes Cryptogr.\u00a023, 283\u2013290 (2001)","journal-title":"Des. Codes Cryptogr."},{"key":"13_CR11","doi-asserted-by":"publisher","first-page":"173","DOI":"10.1023\/A:1008354106356","volume":"19","author":"N. Koblitz","year":"2000","unstructured":"Koblitz, N., Menezes, A.J., Vanstone, S.A.: The state of elliptic curve cryptography. Des. Codes Cryptogr.\u00a019, 173\u2013193 (2000)","journal-title":"Des. Codes Cryptogr."},{"issue":"4","key":"13_CR12","doi-asserted-by":"publisher","first-page":"599","DOI":"10.1137\/S0036144503439190","volume":"46","author":"N. Koblitz","year":"2004","unstructured":"Koblitz, N., Menezes, A.J.: A survey of Public-Key Cryptosystems. SIAM Review\u00a046(4), 599\u2013634 (2004)","journal-title":"SIAM Review"},{"key":"13_CR13","doi-asserted-by":"publisher","first-page":"513","DOI":"10.1007\/BF01457454","volume":"261","author":"A.K. Lenstra","year":"1982","unstructured":"Lenstra, A.K., Lenstra Jr., H.W., Lov\u00e1sz, L.: Factoring polynomials with rational coefficients. Math. Ann.\u00a0261, 513\u2013534 (1982)","journal-title":"Math. Ann."},{"key":"13_CR14","volume-title":"Handbook of Applied Cryptography","author":"A.J. Menezes","year":"1997","unstructured":"Menezes, A.J., van Oorschot, P.C., Vanstone, S.A.: Handbook of Applied Cryptography. CRC Press, Boca Raton (1997)"},{"issue":"4","key":"13_CR15","doi-asserted-by":"crossref","first-page":"46","DOI":"10.1145\/1597036.1597050","volume":"5","author":"P.Q. Nguyen","year":"2009","unstructured":"Nguyen, P.Q., Stehl\u00e9, D.: Low-Dimensional Lattice Basis Reduction Revisited. ACM Transactions on Algorithms\u00a05(4), Article 46 (2009)","journal-title":"ACM Transactions on Algorithms"},{"key":"13_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"146","DOI":"10.1007\/3-540-44670-2_12","volume-title":"Cryptography and Lattices","author":"P.Q. Nguy\u00ean","year":"2001","unstructured":"Nguy\u00ean, P.Q., Stern, J.: The Two Faces of Lattices in Cryptology. In: Silverman, J.H. (ed.) CaLC 2001. LNCS, vol.\u00a02146, pp. 146\u2013180. Springer, Heidelberg (2001)"},{"key":"13_CR17","doi-asserted-by":"publisher","first-page":"151","DOI":"10.1007\/s00145-002-0021-3","volume":"15","author":"P.Q. Nguyen","year":"2002","unstructured":"Nguyen, P.Q., Shparlinski, I.E.: The Insecurity of the Digital Signature Algorithm with Partially Known Nonces. J. Cryptology\u00a015, 151\u2013176 (2002)","journal-title":"J. Cryptology"},{"key":"13_CR18","doi-asserted-by":"publisher","first-page":"201","DOI":"10.1023\/A:1025436905711","volume":"30","author":"P.Q. Nguyen","year":"2003","unstructured":"Nguyen, P.Q., Shparlinski, I.E.: The Insecurity of the Elliptic Curve Digital Signature Algorithm with Partially Known Nonces. Des. Codes Cryptogr.\u00a030, 201\u2013217 (2003)","journal-title":"Des. Codes Cryptogr."},{"key":"13_CR19","first-page":"347","volume":"22","author":"D. Poulakis","year":"2011","unstructured":"Poulakis, D.: Some Lattice Attacks on DSA and ECDSA Applicable Algebra in Engineering. Communication and Computing\u00a022, 347\u2013358 (2011)","journal-title":"Communication and Computing"},{"unstructured":"Stein, W.A., et al.: Sage Mathematics Software (Version 4.6), The Sage Development Team, http:\/\/www.sagemath.org","key":"13_CR20"},{"unstructured":"Stinson, D.R.: Cryptography, Theory and Practice, 2nd edn. Chapman & Hall\/CRC (2002)","key":"13_CR21"}],"container-title":["Lecture Notes in Computer Science","Algebraic Informatics"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-40663-8_13","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,7,3]],"date-time":"2023-07-03T19:19:11Z","timestamp":1688411951000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-40663-8_13"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642406621","9783642406638"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-40663-8_13","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2013]]}}}