{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T16:34:23Z","timestamp":1725467663522},"publisher-location":"Berlin, Heidelberg","reference-count":3,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540645184"},{"type":"electronic","value":"9783540697954"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1998]]},"DOI":"10.1007\/bfb0054152","type":"book-chapter","created":{"date-parts":[[2006,7,27]],"date-time":"2006-07-27T09:13:04Z","timestamp":1153991584000},"page":"542-545","source":"Crossref","is-referenced-by-count":2,"title":["Specialized integer factorization"],"prefix":"10.1007","author":[{"given":"Don","family":"Coppersmith","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2006,5,25]]},"reference":[{"key":"40_CR1","first-page":"178","volume":"1070","author":"D. Coppersmith","year":"1996","unstructured":"D. Coppersmith, \u201cFinding a small root of a bivariate integer equation; factoring with high bits known,\u201d Advances in Cryptology \u2014 EUROCRYPT '96, Ueli Maurer (Ed.), Springer LNCS Volume 1070, 1996, pages 178\u2013189.","journal-title":"Springer LNCS"},{"issue":"Number4","key":"40_CR2","doi-asserted-by":"publisher","first-page":"233","DOI":"10.1007\/s001459900030","volume":"10","author":"D. Coppersmith","year":"1997","unstructured":"D. Coppersmith, \u201cSmall Solutions to Polynomial Equations, and Low Exponent RSA Vulnerabilities,\u201d Journal of Cryptology, Volume 10 Number 4, Autumn 1997, pages 233\u2013260.","journal-title":"Journal of Cryptology"},{"key":"40_CR3","doi-asserted-by":"publisher","first-page":"1231","DOI":"10.1109\/18.605586","volume":"IT-43","author":"S. A. Vanstone","year":"1997","unstructured":"S. A. Vanstone and R. J. Zuccherato, \u201cElliptic curve cryptosystems using curves of smooth order over the ring Zn,\u201d IEEE Trans. Inform. Theory, Volume IT-43, 1997, pages 1231\u20131237.","journal-title":"IEEE Trans. Inform. Theory"}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2014 EUROCRYPT'98"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/BFb0054152","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,2,11]],"date-time":"2019-02-11T11:17:56Z","timestamp":1549883876000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/BFb0054152"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1998]]},"ISBN":["9783540645184","9783540697954"],"references-count":3,"URL":"https:\/\/doi.org\/10.1007\/bfb0054152","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[1998]]}}}