{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,12]],"date-time":"2025-04-12T04:22:24Z","timestamp":1744431744234},"reference-count":19,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2004,1,1]],"date-time":"2004-01-01T00:00:00Z","timestamp":1072915200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IJIS"],"published-print":{"date-parts":[[2004,1]]},"DOI":"10.1007\/s10207-003-0030-8","type":"journal-article","created":{"date-parts":[[2004,1,29]],"date-time":"2004-01-29T13:07:00Z","timestamp":1075381620000},"page":"103-109","source":"Crossref","is-referenced-by-count":7,"title":["Generating visible RSA public keys for PKI"],"prefix":"10.1007","volume":"2","author":[{"given":"C.S.","family":"Laih","sequence":"first","affiliation":[]},{"given":"K.Y.","family":"Chen","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2004,1,1]]},"reference":[{"key":"30_CRDSA","unstructured":"ANSI X9.31 (May 1998) American national standard for financial services: digital signatures using reversible public key cryptography for the financial services industry (rDSA)"},{"key":"30_CRdataHiding","doi-asserted-by":"crossref","unstructured":"Bender W, Gruhl D, Morimoto N (1994) Techniques for data hiding. MIT Media Lab, Cambridge, MA. Technical report","DOI":"10.1117\/12.205315"},{"key":"30_CRcoppersmith","doi-asserted-by":"crossref","unstructured":"Coppersmith D (1996) Finding a small root of a bivariate integer equation: faction with high bits known. In: Advances in Cryptology: Proceedings of EUROCRYPT\u201996. Lecture notes in computer science, vol 1070. Springer, Berlin Heidelberg New York, pp 178\u2013189","DOI":"10.1007\/3-540-68339-9_16"},{"key":"30_CRcox","doi-asserted-by":"publisher","first-page":"1673","DOI":"10.1109\/83.650120","volume":"6","author":"Cox","year":"1997","unstructured":"Cox IJ, Killian J, Leighton T, Shannoon T (1997) Secure spread spectrum watermarking for multimedia. IEEE Trans Image Process 6(12):1673\u20131687","journal-title":"IEEE Trans Image Process"},{"key":"30_CRgirault","doi-asserted-by":"crossref","unstructured":"Girault M (1991) Self-certified public keys. In: Advances in Cryptology: Proceedings of EUROCRYPT\u201991. Lecture notes in computer science, vol 0547. Springer, Berlin Heidelberg New York, pp 490\u2013497","DOI":"10.1007\/3-540-46416-6_42"},{"key":"30_CRimai","unstructured":"Imai H (2002) Current trends of cryptology in Japan. In: Proceedings of the 2nd international workshop for Asian public key infrastructure, location, day month 2002, p 89"},{"key":"30_CRX.509","unstructured":"ITU.T X.509 (May 1997) Authentication framework"},{"key":"30_CRECC","doi-asserted-by":"publisher","first-page":"203","DOI":"10.1090\/S0025-5718-1987-0866109-5","volume":"48","author":"Koblitz","year":"1987","unstructured":"Koblitz N (1987) Elliptic curve cryptosystems. Math Comput 48:203\u2013209","journal-title":"Math Comput"},{"key":"30_CRpkcs1","doi-asserted-by":"crossref","unstructured":"Kaliski B, Staddon J (1998) IETF RFC 2437: PKCS #1: RSA Cryptography Specifications version 2.0","DOI":"10.17487\/rfc2437"},{"key":"30_CRLenstra1","unstructured":"Lenstra AK (1996) Generating RSA moduli with a predetermined portion. In: Advances in Cryptology: Proceedings of ASIACRYPT\u201998. Lecture notes in computer science, vol 1514. Springer, Berlin Heidelberg New York, pp 10\u201316"},{"key":"30_CRLenstra2","unstructured":"Lenstra AK (2001) Unbelievable security. Matching AES security using public key systems. In: Advances in Cryptology: Proceedings of ASIACRYPT 2001. Lecture notes in computer science, vol 2248. Springer, Berlin Heidelberg New York, pp 66\u201386"},{"key":"30_CRLenstra3","first-page":"www","volume":"at","author":"Lenstra","year":"2003","unstructured":"Lenstra AK, Verheul ER (2003) Selecting cryptographic key size. J Cryptol (in press). Available at: www.cryptosavvy.com","journal-title":"Available"},{"key":"30_CRaes","unstructured":"National Institute of Standards and Technology. http:\/\/csrc.nist.gov\/encryption\/aes"},{"key":"30_CRImageProcessing","first-page":"representation","volume":"pictures","author":"Netravali","year":"1995","unstructured":"Netravali AN, Haskell BG (1995) Digital pictures: representation, compression, and standards, 2nd edn. Plenum Press, New York","journal-title":"Digital"},{"key":"30_CRlogotype","doi-asserted-by":"crossref","unstructured":"Santesson S, Housley R, Freeman T (2002) Internet X.509 public key infrastructure logotypes in X. 509 certificates","DOI":"10.17487\/rfc3039"},{"key":"30_CRid-based","doi-asserted-by":"crossref","unstructured":"Shamir A (1985) Identity-based cryptosystems and signature schemes. In: Advances in Cryptology: Proceedings of CRYPTO\u201984. Lecture notes in computer science, vol 0196. Springer, Berlin Heidelberg New York, pp 47\u201353","DOI":"10.1007\/3-540-39568-7_5"},{"key":"30_CRJPEG2000","doi-asserted-by":"crossref","unstructured":"Taubman DS, Marcellin MW (2002) JPEG2000 \u2013 image compression fundamentals, standards and practice. Kluwer, Dordrecht","DOI":"10.1007\/978-1-4615-0799-4"},{"key":"30_CRVanstone","doi-asserted-by":"crossref","first-page":"101","DOI":"10.1007\/BF00190758","volume":"volume","author":"Vanstone","year":"1995","unstructured":"Vanstone SA, Zuccherato RJ (1995) Short RSA keys and their generation. J Cryptol volume:101\u2013114","journal-title":"J Cryptol"},{"key":"30_CRPGP","unstructured":"Zimmerman P (1995) PGP Source Code and Internals, MIT Press"}],"container-title":["International Journal of Information Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-003-0030-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10207-003-0030-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-003-0030-8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,6,14]],"date-time":"2021-06-14T04:57:44Z","timestamp":1623646664000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10207-003-0030-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004,1]]},"references-count":19,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2004,1]]}},"alternative-id":["30"],"URL":"https:\/\/doi.org\/10.1007\/s10207-003-0030-8","relation":{},"ISSN":["1615-5262","1615-5270"],"issn-type":[{"value":"1615-5262","type":"print"},{"value":"1615-5270","type":"electronic"}],"subject":[],"published":{"date-parts":[[2004,1]]}}}