{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,9,13]],"date-time":"2023-09-13T17:15:59Z","timestamp":1694625359506},"reference-count":13,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2006,1,1]],"date-time":"2006-01-01T00:00:00Z","timestamp":1136073600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2006,1,1]],"date-time":"2006-01-01T00:00:00Z","timestamp":1136073600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Des Codes Crypt"],"published-print":{"date-parts":[[2006,1]]},"DOI":"10.1007\/s10623-004-5660-y","type":"journal-article","created":{"date-parts":[[2005,12,23]],"date-time":"2005-12-23T15:13:37Z","timestamp":1135350817000},"page":"41-53","source":"Crossref","is-referenced-by-count":5,"title":["Index Calculation Attacks on RSA Signature and Encryption"],"prefix":"10.1007","volume":"38","author":[{"given":"Jean-S\u00e9bastien","family":"Coron","sequence":"first","affiliation":[]},{"given":"David","family":"Naccache","sequence":"additional","affiliation":[]},{"given":"Yvo","family":"Desmedt","sequence":"additional","affiliation":[]},{"given":"Andrew","family":"Odlyzko","sequence":"additional","affiliation":[]},{"given":"Julien P.","family":"Stern","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"5660_CR1","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/0022-314X(83)90002-1","volume":"17","author":"E. R. Canfield","year":"1983","journal-title":"J. Number Th."},{"key":"5660_CR2","unstructured":"D. Coppersmith, S. Halevi and C. Jutla, ISO 9796-1 and the new forgery strategy, Research contribution to P1363, (1999) available at http:\/\/grouper.ieee.org\/groups\/1363\/contrib.html"},{"key":"5660_CR3","doi-asserted-by":"crossref","unstructured":"J. S. Coron, D. Naccache and J. P. Stern, On the security of RSA Padding, In Proceedings of Crypto \u201999, LNCS Vol. 1666 (1999) Springer-Verlag, pp. 1\u201318.","DOI":"10.1007\/3-540-48405-1_1"},{"key":"5660_CR4","doi-asserted-by":"crossref","unstructured":"Y. Desmedt and A. Odlyzko. A chosen text attack on the RSA cryptosystem and some discrete logarithm schemes, In Proceedings of Crypto \u201985, LNCS Vol. 218, pp. 516\u2013522.","DOI":"10.1007\/3-540-39799-X_40"},{"issue":"10","key":"5660_CR5","first-page":"1","volume":"22A","author":"K. Dickman","year":"1930","journal-title":"Arkiv f\u00f6r matematik, astronomi och fysik"},{"key":"5660_CR6","unstructured":"ISO\/IEC 9796, Information technology \u2013 Security techniques \u2013 Digital signature scheme giving message recovery, Part 1: Mechanisms using redundancy (1999)."},{"key":"5660_CR7","unstructured":"ISO\/IEC 9796-2, Information technology \u2013 Security techniques \u2013 Digital signature scheme giving message recovery, Part 2: Mechanisms using a hash-function (1997)."},{"key":"5660_CR8","doi-asserted-by":"crossref","first-page":"255","DOI":"10.6028\/jres.045.026","volume":"45","author":"C. Lanczos","year":"1950","journal-title":"J. Res. Nat. Bur. Standards"},{"key":"5660_CR9","doi-asserted-by":"crossref","DOI":"10.1007\/BFb0091534","volume-title":"The Development of the Number Field Sieve","author":"A. K. Lenstra","year":"1993"},{"issue":"2","key":"5660_CR10","doi-asserted-by":"crossref","first-page":"649","DOI":"10.2307\/1971363","volume":"126","author":"H. Lenstra Jr.","year":"1987","journal-title":"Ann. of Math."},{"key":"5660_CR11","doi-asserted-by":"crossref","unstructured":"J.-F. Misarsky, How (not) to design RSA signature schemes, Public-key cryptography, Lectures Notes in Computer Science, Vol. 1431, Springer-Verlag, (1998) pp. 14\u201328.","DOI":"10.1007\/BFb0054011"},{"key":"5660_CR12","doi-asserted-by":"crossref","unstructured":"C. Pomerance, The Quadratic Sieve Factoring Algorithm, In Advances in Cryptology, Proceedings of Eurocrypt \u201984. Springer-Verlag (1985) pp. 169\u2013182.","DOI":"10.1007\/3-540-39757-4_17"},{"key":"5660_CR13","doi-asserted-by":"crossref","unstructured":"R. Rivest, A. Shamir and L. Adleman, A method for obtaining digital signatures and public key cryptosystems, CACM, Vol. 21 (1978).","DOI":"10.21236\/ADA606588"}],"container-title":["Designs, Codes and Cryptography"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-004-5660-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10623-004-5660-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-004-5660-y","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-004-5660-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,14]],"date-time":"2022-05-14T02:21:40Z","timestamp":1652494900000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10623-004-5660-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006,1]]},"references-count":13,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2006,1]]}},"alternative-id":["5660"],"URL":"https:\/\/doi.org\/10.1007\/s10623-004-5660-y","relation":{},"ISSN":["0925-1022","1573-7586"],"issn-type":[{"value":"0925-1022","type":"print"},{"value":"1573-7586","type":"electronic"}],"subject":[],"published":{"date-parts":[[2006,1]]}}}