{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,19]],"date-time":"2026-02-19T14:59:52Z","timestamp":1771513192677,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":12,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540648925","type":"print"},{"value":"9783540684626","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1998]]},"DOI":"10.1007\/bfb0055716","type":"book-chapter","created":{"date-parts":[[2006,7,27]],"date-time":"2006-07-27T21:12:36Z","timestamp":1154034756000},"page":"1-12","source":"Crossref","is-referenced-by-count":240,"title":["Chosen ciphertext attacks against protocols based on the RSA encryption standard PKCS #1"],"prefix":"10.1007","author":[{"given":"Daniel","family":"Bleichenbacher","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2006,5,28]]},"reference":[{"issue":"2","key":"1_CR1","doi-asserted-by":"publisher","first-page":"194","DOI":"10.1137\/0217013","volume":"17","author":"W. Alexi","year":"1988","unstructured":"W. Alexi, B. Chor, O. Goldreich, and P. Schnorr. Bit security of RSA and Rabin functions. SIAM Journal of computing, 17(2):194\u2013209, Apr. 1988.","journal-title":"SIAM Journal of computing"},{"key":"1_CR2","doi-asserted-by":"crossref","unstructured":"M. Bellare, A. Desai, D. Pointcheval, and P. Rogaway. Relations among notions of security for public-key encryptions schemes. In H. Krawczyk, editor, Advances in Cryptology \u2014 CRYPTO '98, Lecture Notes in Computer Science. Springer Verlag, (in press).","DOI":"10.1007\/BFb0055718"},{"key":"1_CR3","first-page":"92","volume-title":"volume 950 of Lecture Notes in Computer Science","author":"M. Bellare","year":"1995","unstructured":"M. Bellare and P. Rogaway. Optimal asymmetric encryption. In A. D. Santis, editor, Advances in Cryptology \u2014 EUROCRYPT '94, volume 950 of Lecture Notes in Computer Science, pages 92\u2013111, Berlin, 1995. Springer Verlag."},{"key":"1_CR4","doi-asserted-by":"crossref","unstructured":"R. Cramer and V. Shoup. A practical public key cryptosystem provably secure against adaptive chosen ciphertext attack. In H. Krawczyk, editor, Advances in Cryptology \u2014 CRYPTO '98, Lecture Notes in Computer Science. Springer Verlag, (in press).","DOI":"10.1007\/BFb0055717"},{"key":"1_CR5","volume-title":"Technical Report TR-CS-82-2","author":"G. I. Davida","year":"1982","unstructured":"G. I. Davida. Chosen signature cryptanalysis of the RSA (MIT) public key cryptosystem. Technical Report TR-CS-82-2, Departement of Electrical Engineering and Computer Science, University of Wisconsin, Milwaukee, 1982."},{"key":"1_CR6","unstructured":"H. Finney. personal communication."},{"key":"1_CR7","unstructured":"A. O. Freier, P. Karlton, and P. C. Kocher. The SSL Protocol, Version 3.0. Netscape, Mountain View, CA, 96."},{"key":"1_CR8","doi-asserted-by":"crossref","unstructured":"S. Goldwasser, S. Micali, and P. Tong. Why and how to establish a private code on a public network. In Proc. 23rd IEEE Symp. on Foundations of Comp. Science, pages 134\u2013144, Chicago, 1982.","DOI":"10.1109\/SFCS.1982.100"},{"key":"1_CR9","unstructured":"J. H\u00e5stad and M. N\u00e4slund. The security of individual ESA bits, manusrcipt, 1998."},{"key":"1_CR10","first-page":"104","volume-title":"volume 1109 of Lecture Notes in Computer Science","author":"P. C. Kocher","year":"1996","unstructured":"P. C. Kocher. Timing attacks on implementations of Diffie-Hellman RSA, DSS, and other systems. In N. Koblitz, editor, Advances in Cryptology \u2014 CRYPTO '96, volume 1109 of Lecture Notes in Computer Science, pages 104\u2013113, Berlin, 1996. Springer Verlag."},{"key":"1_CR11","unstructured":"RSA Data Security, Inc. PKCS #1: RSA Encryption Standard. Redwood City, CA, Nov. 1993. Version 1.5."},{"key":"1_CR12","unstructured":"E. A. Young. SSLeay 0.8.1. url = http:\/\/www.cryptsoft.com\/"}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2014 CRYPTO '98"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/BFb0055716","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,2,11]],"date-time":"2019-02-11T17:44:02Z","timestamp":1549907042000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/BFb0055716"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1998]]},"ISBN":["9783540648925","9783540684626"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/bfb0055716","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[1998]]}}}