{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,3,31]],"date-time":"2022-03-31T10:32:58Z","timestamp":1648722778505},"reference-count":11,"publisher":"Springer Science and Business Media LLC","issue":"12","license":[{"start":{"date-parts":[[2006,12,1]],"date-time":"2006-12-01T00:00:00Z","timestamp":1164931200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["DuD"],"published-print":{"date-parts":[[2006,12]]},"DOI":"10.1007\/s11623-006-0236-9","type":"journal-article","created":{"date-parts":[[2007,1,23]],"date-time":"2007-01-23T08:53:04Z","timestamp":1169542384000},"page":"763-767","source":"Crossref","is-referenced-by-count":0,"title":["Aktuelle Entwicklungen bei RSA-Signaturen"],"prefix":"10.1007","volume":"30","author":[{"given":"Ulrich","family":"K\u00fchn","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2006,12,1]]},"reference":[{"key":"236_CR1","doi-asserted-by":"crossref","unstructured":"Bleichenbacher, Daniel. Chosen Ciphertext Attacks against Protocols Based on RSA Encryption Standard PKCS #1, Crypto\u2019 98, Lecture Notes in Computer Science 1462, Seiten 1\u201312, 1998.","DOI":"10.1007\/BFb0055716"},{"key":"236_CR2","doi-asserted-by":"crossref","unstructured":"Coron, Jean-S\u00e9bastien; Naccache, David; Stern, Julien P. On the security of RSA padding. Crypto\u2019 99, Lecture Notes in Computer Science 1666, Seiten 1\u201318, 1999.","DOI":"10.1007\/3-540-48405-1_1"},{"key":"236_CR3","doi-asserted-by":"crossref","unstructured":"Dierks, T.; Rescorla, E. The Transport Layer Security (TLS) Protocol Version 1.1. RFC 4346, 2006.","DOI":"10.17487\/rfc4346"},{"key":"236_CR4","doi-asserted-by":"crossref","unstructured":"Eastlake, D. RSA\/SHA-1 SIGs and RSA KEYs in the Domain Name System (DNS), RFC 3110, 2001.","DOI":"10.17487\/rfc3110"},{"key":"236_CR5","unstructured":"Finney, Hal. Bleichenbacher\u2019s RSA signature forgery based on implementation error. Nachricht am 30. August 2006 auf der Liste cryptography@metzdowd.com, online unter http:\/\/www.mail-archive.com\/cryptography@metzdowd.com\/msg06537.html"},{"key":"236_CR6","unstructured":"Finney, Hal. Re: Why the exponent 3 error happened. Nachricht am 17. September 2006 auf der Liste cryptography@metzdowd.com, online unter http:\/\/www.mail-archive.com\/cryptography@metzdowd.com\/msg06693.html"},{"key":"236_CR7","unstructured":"Laurie, Ben. Exponent 3 damage spreads... Nachricht am 09. September 2006 auf der Liste cryptography@metzdowd.com, online unter http:\/\/www.mail-archive.com\/cryptography@metzdowd.com\/msg06588.html"},{"key":"236_CR8","unstructured":"RSA Laboratories. PKCS #1 v2.1: RSA Cryptography Standard. 14. Juni 2002."},{"key":"236_CR9","doi-asserted-by":"crossref","unstructured":"Rivest, Ronald L.; Shamir, Adi; Adleman, Leonard. A Method for obtaining Digital Signatures and Public Key Cryptosystems. Communications of the ACM, Vol. 21(2), Seiten 120\u2013126, 1978.","DOI":"10.1145\/359340.359342"},{"key":"236_CR10","unstructured":"Tews, Erik; May, Alexander; Weinmann, Ralf-Philip. Secure your browser. Online unter http:\/\/www.cdc.informatik.tudarmstadt.de\/securebrowser"},{"key":"236_CR11","unstructured":"Whyte, William. Re: Exponent 3 damage spreads... Nachricht am 21. September 2006 auf der Liste cryptography@metzdowd.com, online unter http:\/\/www.mail-archive.com\/cryptography@metzdowd.com\/msg06721.html"}],"container-title":["Datenschutz und Datensicherheit - DuD"],"original-title":[],"language":"de","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-006-0236-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11623-006-0236-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-006-0236-9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T14:08:20Z","timestamp":1559398100000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11623-006-0236-9"}},"subtitle":["Implementierungsfehler beim PKCS#1-Padding"],"short-title":[],"issued":{"date-parts":[[2006,12]]},"references-count":11,"journal-issue":{"issue":"12","published-print":{"date-parts":[[2006,12]]}},"alternative-id":["236"],"URL":"https:\/\/doi.org\/10.1007\/s11623-006-0236-9","relation":{},"ISSN":["1614-0702","1862-2607"],"issn-type":[{"value":"1614-0702","type":"print"},{"value":"1862-2607","type":"electronic"}],"subject":[],"published":{"date-parts":[[2006,12]]}}}