{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,13]],"date-time":"2025-05-13T02:43:04Z","timestamp":1747104184234},"publisher-location":"Berlin, Heidelberg","reference-count":13,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540648925"},{"type":"electronic","value":"9783540684626"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1998]]},"DOI":"10.1007\/bfb0055732","type":"book-chapter","created":{"date-parts":[[2006,7,27]],"date-time":"2006-07-27T21:12:36Z","timestamp":1154034756000},"page":"243-256","source":"Crossref","is-referenced-by-count":17,"title":["Cryptanalysis of the Chor-Rivest cryptosystem"],"prefix":"10.1007","author":[{"given":"Serge","family":"Vaudenay","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2006,5,28]]},"reference":[{"key":"17_CR1","first-page":"381","volume-title":"Lectures Notes in Computer Science 1334","author":"P. Camion","year":"1997","unstructured":"P. Camion, H. Chabanne. On the Powerline system. In Advances in Cryptology, ICICS'97, Beijing, China, Lectures Notes in Computer Science 1334, pp. 381\u2013385, Springer-Verlag, 1997."},{"key":"17_CR2","first-page":"54","volume-title":"Lectures Notes in Computer Science","author":"B. Chor","year":"1985","unstructured":"B. Chor, R.L. Rivest. A knapsack-type public key cryptosystem based on arithmetic in finite fields. In Advances in Cryptology CRYPTO'84, Santa Barbara, California, U.S.A., Lectures Notes in Computer Science, pp. 54\u201365, Springer-Verlag, 1985."},{"key":"17_CR3","doi-asserted-by":"publisher","first-page":"901","DOI":"10.1109\/18.21214","volume":"IT-34","author":"B. Chor","year":"1988","unstructured":"B. Chor, R.L. Rivest. A knapsack-type public key cryptosystem based on arithmetic in finite fields. IEEE Transactions on Information Theory, vol. IT-34, pp. 901\u2013909, 1988.","journal-title":"IEEE Transactions on Information Theory"},{"key":"17_CR4","doi-asserted-by":"publisher","first-page":"207","DOI":"10.1007\/s001459900028","volume":"10","author":"D. Coppersmith","year":"1997","unstructured":"D. Coppersmith, J. Stern, S. Vaudenay. The security of the birational permutation signature schemes. Journal of Cryptology, vol. 10, pp. 207\u2013221, 1997.","journal-title":"Journal of Cryptology"},{"issue":"no.23","key":"17_CR5","doi-asserted-by":"crossref","first-page":"2130","DOI":"10.1049\/el:19911319","volume":"27","author":"K. Huber","year":"1991","unstructured":"K. Huber. Specialised attack on Chor-Rivest public key cryptosystem. Electronics Letters, vol. 27, no. 23, pp. 2130, 1991.","journal-title":"Electronics Letters"},{"key":"17_CR6","unstructured":"A. Joux, J. Stern. Lattice Reduction: a Toolbox for the Cryptanalyst. To appear in Journal of Cryptology."},{"key":"17_CR7","doi-asserted-by":"crossref","unstructured":"N. Koblitz. A Course in Number Theory and Cryptography, 2nd Edition, Graduate Texts in Mathematics 114, Springer-Verlag, 1994.","DOI":"10.1007\/978-1-4419-8592-7"},{"key":"17_CR8","doi-asserted-by":"publisher","first-page":"149","DOI":"10.1007\/BF00196908","volume":"3","author":"H.W. Lenstra Jr.","year":"1991","unstructured":"H.W. Lenstra, Jr. On the Chor-Rivest Knapsack Cryptosystem. Journal of Cryptology, vol. 3, pp. 149\u2013155, 1991.","journal-title":"Journal of Cryptology"},{"key":"17_CR9","doi-asserted-by":"publisher","first-page":"515","DOI":"10.1007\/BF01457454","volume":"261","author":"A.K. Lenstra","year":"1982","unstructured":"A.K. Lenstra, H.W. Lenstra Jr., L. Lov\u00e1sz. Factoring polynomials with rational coefficients. Math. Ann., vol. 261, pp. 515\u2013534, 1982.","journal-title":"Math. Ann."},{"key":"17_CR10","doi-asserted-by":"publisher","first-page":"525","DOI":"10.1109\/TIT.1978.1055927","volume":"IT-24","author":"R.C. Merkle","year":"1978","unstructured":"R.C. Merkle, M. Hellman. Hiding information and signatures in trap-door knap-sacks. IEEE Transactions on Information Theory, vol. IT-24, pp. 525\u2013530, 1978.","journal-title":"IEEE Transactions on Information Theory"},{"key":"17_CR11","doi-asserted-by":"publisher","first-page":"106","DOI":"10.1109\/TIT.1978.1055817","volume":"IT-24","author":"S. Pohlig","year":"1978","unstructured":"S. Pohlig, M. Hellman. An improved algorithm for computing logarithms over GF(q) and its cryptographic significance. IEEE Transactions on Information Theory, vol. IT-24, pp. 106\u2013110, 1978.","journal-title":"IEEE Transactions on Information Theory"},{"key":"17_CR12","first-page":"145","volume-title":"A polynomial time algorithm for breaking the basic Merkle-Hellman cryptosystem","author":"A. Shamir","year":"1982","unstructured":"A. Shamir. A polynomial time algorithm for breaking the basic Merkle-Hellman cryptosystem. In Proceedings of the 23rd IEEE Symposium on Foundations of Computer Science, Chicago, Illinois, U.S.A., pp. 145\u2013152, IEEE, 1982."},{"key":"17_CR13","first-page":"1","volume-title":"Lectures Notes in Computer Science 921","author":"C.P. Schnorr","year":"1995","unstructured":"C.P. Schnorr, H.H. H\u00f6rner. Attacking the Chor-Rivest Cryptosystem by improved lattice reduction. In Advances in Cryptology EUROCRYPT'95, Saint-Malo, France, Lectures Notes in Computer Science 921, pp. 1\u201312, Springer-Verlag, 1995."}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2014 CRYPTO '98"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/BFb0055732","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,2,11]],"date-time":"2019-02-11T18:51:15Z","timestamp":1549911075000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/BFb0055732"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1998]]},"ISBN":["9783540648925","9783540684626"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/bfb0055732","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[1998]]}}}