{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,25]],"date-time":"2026-01-25T04:02:07Z","timestamp":1769313727737,"version":"3.49.0"},"publisher-location":"Berlin, Heidelberg","reference-count":20,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540633846","type":"print"},{"value":"9783540695288","type":"electronic"}],"license":[{"start":{"date-parts":[[1997,1,1]],"date-time":"1997-01-01T00:00:00Z","timestamp":852076800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1997]]},"DOI":"10.1007\/bfb0052239","type":"book-chapter","created":{"date-parts":[[2006,8,17]],"date-time":"2006-08-17T14:37:31Z","timestamp":1155825451000},"page":"235-248","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":15,"title":["On the security of the KMOV public key cryptosystem"],"prefix":"10.1007","author":[{"given":"D.","family":"Bleichenbacher","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2006,5,17]]},"reference":[{"key":"16_CR1","unstructured":"J. Borst. Public key cryptosystems using elliptic curves. Master's thesis, Eindhoven University of Technology, Feb. 1997."},{"key":"16_CR2","doi-asserted-by":"crossref","unstructured":"H. Cohen. A Course in Computational Algebraic Number Theory. Number 138 in Graduate Texts in Mathematics. Springer Verlag, 1993.","DOI":"10.1007\/978-3-662-02945-9"},{"key":"16_CR3","doi-asserted-by":"crossref","unstructured":"D. Coppersmith. Finding a small root of a univariate modular equation. In Advances in Cryptology \u2014 EUROCRYPT '96, volume 1070 of Lecture Notes in Computer Science, pages 155\u2013165. Springer Verlag, 1996.","DOI":"10.1007\/3-540-68339-9_14"},{"key":"16_CR4","doi-asserted-by":"crossref","unstructured":"D. Coppersmith, M. Franklin, J. Patarin, and M. Reiter. Low exponent RSA with related messages. In Advances in Cryptology \u2014 EUROCRYPT '96, volume 1070 of Lecture Notes in Computer Science, pages 1\u20139. Springer Verlag, 1996.","DOI":"10.1007\/3-540-68339-9_1"},{"key":"16_CR5","doi-asserted-by":"crossref","unstructured":"N. Demytko. A new elliptic curve based analogue of RSA. In T. Helleseth, editor, Advances in Cryptology \u2014 EUROCRYPT '93, volume 765 of Lecture notes in computer science, pages 40\u201349. Springer-Verlag, 1994.","DOI":"10.1007\/3-540-48285-7_4"},{"issue":"2","key":"16_CR6","doi-asserted-by":"publisher","first-page":"336","DOI":"10.1137\/0217019","volume":"17","author":"J. H\u00e5stad","year":"1988","unstructured":"J. H\u00e5stad. Solving simultaneous modular equations of low degree. SIAM J. Computing, 17(2):336\u2013341, Apr. 1988.","journal-title":"SIAM J. Computing"},{"key":"16_CR7","unstructured":"M. Joye and J.-J. Quisquater. Overview and security analysis of RSA-type cryptosystems against various attacks. In Proc. of DIMACS workshop on network threats, Nov. 1996."},{"key":"16_CR8","doi-asserted-by":"crossref","unstructured":"M. Joye and J.-J. Quisquater. Protocol failure for RSA-like functions using Lucas sequences and elliptic curves over a ring. In M. Lomas, editor, Security Protocols, volume 1189 of Lecture Notes in Computer Science, pages 93\u2013100. Springer Verlag, 1997.","DOI":"10.1007\/3-540-62494-5_8"},{"issue":"177","key":"16_CR9","doi-asserted-by":"publisher","first-page":"203","DOI":"10.1090\/S0025-5718-1987-0866109-5","volume":"48","author":"N. Koblitz","year":"1987","unstructured":"N. Koblitz. Elliptic curve cryptosystems. Mathematics of Computation, 48(177):203\u2013209, 1987.","journal-title":"Mathematics of Computation"},{"key":"16_CR10","doi-asserted-by":"crossref","unstructured":"K. Koyama. Fast RSA-type schemes based on singular cubic curves y\n                2+axy=x\n                3 (mod n). In Advances in Cryptology \u2014 EUROCRYPT '95, volume 921 of Lecture Notes in Computer Science, pages 329\u2013340. Springer, 1995.","DOI":"10.1007\/3-540-49264-X_27"},{"key":"16_CR11","doi-asserted-by":"crossref","unstructured":"K. Koyama, U. Maurer, T. Okamoto, and S. Vanstone. New public-key schemes based on elliptic curves over the ring Z\n                n. In J. Feigenbaum, editor, Advances in Cryptology \u2014 CRYPTO '91, volume 576, pages 252\u2013266. Springer Verlag, 1992. Lecture Notes in Computer Science.","DOI":"10.1007\/3-540-46766-1_20"},{"key":"16_CR12","doi-asserted-by":"crossref","unstructured":"K. Kurosawa, K. Okada, and S. Tsujii. Low exponent attack against elliptic curve RSA. In Advances in Cryptology \u2014 ASIACRYPT 94, volume 917, pages 376\u2013383. Springer Verlag, 1995.","DOI":"10.1007\/BFb0000449"},{"issue":"8","key":"16_CR13","first-page":"1309","volume":"E77-A","author":"H. Kuwakado","year":"1994","unstructured":"H. Kuwakado and K. Koyama. Efficient cryptosystems over elliptic curves based on a product of form-free primes. IEICE Transactions on fundamentals of electronics, communications and computer sciences, E77-A(8):1309\u20131318, Aug. 1994.","journal-title":"IEICE Transactions on fundamentals of electronics, communications and computer sciences"},{"issue":"22","key":"16_CR14","doi-asserted-by":"publisher","first-page":"1843","DOI":"10.1049\/el:19941252","volume":"30","author":"H. Kuwakado","year":"1994","unstructured":"H. Kuwakado and K. Koyama. Security of RSA-type cryptosystems over elliptic curves against H\u00e5stad attack. Electronic Letters, 30(22):1843\u20131844, Oct. 1994.","journal-title":"Electronic Letters"},{"key":"16_CR15","doi-asserted-by":"crossref","unstructured":"A. Menezes, editor. Elliptic Curve Public Key Cryptosystems. Kluwer Academic Publishers, 1993.","DOI":"10.1007\/978-1-4615-3198-2"},{"key":"16_CR16","doi-asserted-by":"crossref","unstructured":"V. S. Miller. Use of elliptic curves in cryptography. In H. C. Williams, editor, Advances in Cryptology \u2014 CRYPTO '85, volume 218 of Lecture Notes in Computer Science, pages 417\u2013426. Springer, 1986.","DOI":"10.1007\/3-540-39799-X_31"},{"issue":"2","key":"16_CR17","doi-asserted-by":"publisher","first-page":"120","DOI":"10.1145\/359340.359342","volume":"21","author":"L. Rivest","year":"1978","unstructured":"L. Rivest, A. Shamir, and L. Adleman. A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM, 21(2):120\u2013126, 1978.","journal-title":"Communications of the ACM"},{"key":"16_CR18","doi-asserted-by":"crossref","unstructured":"C. P. Schnorr and M. Euchner. Lattice basis reduction: Improved practical algorithms and solving subset sum problems. In L. Budach, editor, Proceedings of Fundamentals of Computation Theory (FCT '91), volume 529 of Lecture Notes in Computer Science, pages 68\u201385. Springer Verlag, Sept. 1991.","DOI":"10.1007\/3-540-54458-5_51"},{"key":"16_CR19","unstructured":"H. Shimizu. On the improvement of the H\u00e5stad bound. In 1996 IEICE Fall Conference, volume A-162, 1996. (In Japanese)."},{"key":"16_CR20","doi-asserted-by":"crossref","unstructured":"T. Takagi and S. Naito. The multi-variable modular polynomial and its applications to cryptography. In 7th International Symposium on Algorithm and Computation, ISAAC'96, volume 1178 of Lecture Notes in Computer Science, pages 386\u2013396. Springer Verlag, 1996.","DOI":"10.1007\/BFb0009515"}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2014 CRYPTO '97"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/BFb0052239","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,1,29]],"date-time":"2020-01-29T22:11:13Z","timestamp":1580335873000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/BFb0052239"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1997]]},"ISBN":["9783540633846","9783540695288"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/bfb0052239","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[1997]]},"assertion":[{"value":"17 May 2006","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}