{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,30]],"date-time":"2025-07-30T15:18:23Z","timestamp":1753888703166},"publisher-location":"Berlin, Heidelberg","reference-count":6,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540593393"},{"type":"electronic","value":"9783540492368"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1995]]},"DOI":"10.1007\/bfb0000449","type":"book-chapter","created":{"date-parts":[[2005,10,7]],"date-time":"2005-10-07T15:27:29Z","timestamp":1128698849000},"page":"376-383","source":"Crossref","is-referenced-by-count":10,"title":["Low exponent attack against elliptic curve RSA"],"prefix":"10.1007","author":[{"given":"Kaoru","family":"Kurosawa","sequence":"first","affiliation":[]},{"given":"Koji","family":"Okada","sequence":"additional","affiliation":[]},{"given":"Shigeo","family":"Tsujii","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2005,9,8]]},"reference":[{"key":"30_CR1","first-page":"403","volume":"85","author":"J.Hastad","year":"1985","unstructured":"J.Hastad: On using RSA with low exponent in a public key network. Proc. of Crypto'85, pp.403\u2013408 (1985)","journal-title":"Proc. of Crypto'"},{"key":"30_CR2","unstructured":"K.Koyama, U.M.Maurer, T.Okamoto and S.A.Vanstone: New public-key schemes based on elliptic curves over the ring Z n . Proc. of Crypto'91 (1991)"},{"key":"30_CR3","unstructured":"N.Demytko: A new elliptic curve based analogue of RSA. Proc. of Eurocrypt'93, pp.39\u201348, May 24 (1993)"},{"key":"30_CR4","doi-asserted-by":"crossref","unstructured":"D.M.Bressoud: Factorization and primality testing. Springer-Verlag (1989)","DOI":"10.1007\/978-1-4612-4544-5"},{"key":"30_CR5","doi-asserted-by":"crossref","unstructured":"K.Kurosawa and S.Tsujii: Low exponent attack against elliptic curve RSA. Technical Report of IEICE, ISEC94-2, pp.11\u201317 (1994)","DOI":"10.1007\/BFb0000449"},{"key":"30_CR6","doi-asserted-by":"crossref","unstructured":"H.Kuwakado and K.Koyama: On the security of RSA-type schemes over cubic curves against the Hastad attack. Technical report of IEICE, ISEC94-10, pp.23\u201330 (1994)","DOI":"10.1049\/el:19941252"}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2014 ASIACRYPT'94"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/BFb0000449","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,4,10]],"date-time":"2020-04-10T06:18:06Z","timestamp":1586499486000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/BFb0000449"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1995]]},"ISBN":["9783540593393","9783540492368"],"references-count":6,"URL":"https:\/\/doi.org\/10.1007\/bfb0000449","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[1995]]}}}