{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,5]],"date-time":"2026-03-05T19:13:42Z","timestamp":1772738022182,"version":"3.50.1"},"reference-count":19,"publisher":"Informa UK Limited","issue":"2","license":[{"start":{"date-parts":[[2025,6,4]],"date-time":"2025-06-04T00:00:00Z","timestamp":1748995200000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["www.tandfonline.com"],"crossmark-restriction":true},"short-container-title":["Cryptologia"],"published-print":{"date-parts":[[2026,3,4]]},"DOI":"10.1080\/01611194.2025.2496141","type":"journal-article","created":{"date-parts":[[2025,6,5]],"date-time":"2025-06-05T02:04:17Z","timestamp":1749089057000},"page":"129-147","update-policy":"https:\/\/doi.org\/10.1080\/tandf_crossmark_01","source":"Crossref","is-referenced-by-count":0,"title":["RSA+: an RSA variant"],"prefix":"10.1080","volume":"50","author":[{"given":"S\u00f6ren","family":"Kleine","sequence":"first","affiliation":[{"name":"Institut f\u20acur Anwendungssicherheit, Universit\u20acat der Bundeswehr M\u20acunchen","place":["Werner-Heisenberg-Weg 39, Germany"]}]},{"given":"Andreas","family":"Nickel","sequence":"additional","affiliation":[{"name":"Institut f\u20acur Anwendungssicherheit, Universit\u20acat der Bundeswehr M\u20acunchen","place":["Werner-Heisenberg-Weg 39, Germany"]}]},{"given":"Torben","family":"Ritter","sequence":"additional","affiliation":[{"name":"Institut f\u20acur Anwendungssicherheit, Universit\u20acat der Bundeswehr M\u20acunchen","place":["Werner-Heisenberg-Weg 39, Germany"]}]},{"given":"Krishnan","family":"Shankar","sequence":"additional","affiliation":[{"name":"Institut f\u20acur Anwendungssicherheit, Universit\u20acat der Bundeswehr M\u20acunchen","place":["Werner-Heisenberg-Weg 39, Germany"]}]}],"member":"301","published-online":{"date-parts":[[2025,6,4]]},"reference":[{"key":"e_1_3_5_2_1","doi-asserted-by":"publisher","DOI":"10.1007\/BFb0053428"},{"key":"e_1_3_5_3_1","doi-asserted-by":"publisher","DOI":"10.1007\/BFb0055716"},{"key":"e_1_3_5_4_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-45146-4_2"},{"key":"e_1_3_5_5_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-44647-8_17"},{"key":"e_1_3_5_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-49649-1_3"},{"key":"e_1_3_5_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-02945-9"},{"key":"e_1_3_5_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-68339-9_14"},{"key":"e_1_3_5_9_1","volume-title":"Practical cryptography","author":"Ferguson N.","year":"2003","unstructured":"Ferguson, N., and B. Schneier. 2003. Practical cryptography. Hoboken, NJ: John Wiley & Sons."},{"key":"e_1_3_5_10_1","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9781139012843"},{"key":"e_1_3_5_11_1","volume-title":"Cryptanalysis of RSA and its variants","author":"Hinek M. J.","year":"2010","unstructured":"Hinek, M. J. 2010. Cryptanalysis of RSA and its variants. Boca Raton, FL: Chapman & Hall\/CRC Cryptography and Network Security. CRC Press."},{"key":"e_1_3_5_12_1","volume-title":"Introduction to modern cryptography","author":"Katz J.","year":"2008","unstructured":"Katz, J., and Y. Lindell. 2008. Introduction to modern cryptography. Boca Raton, FL: Chapman & Hall\/CRC Cryptography and Network Security. Chapman & Hall\/CRC."},{"key":"e_1_3_5_13_1","doi-asserted-by":"publisher","DOI":"10.1017\/S0305004100049252"},{"key":"e_1_3_5_14_1","unstructured":"Rabin M. O. Digitalized signatures and public-key functions as intractable as factorization. MIT Laboratory for Computer Science MIT-LCS-TR 212 1979."},{"key":"e_1_3_5_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/359340.359342"},{"key":"e_1_3_5_16_1","volume-title":"Applied cryptography. Protocols, algorithms and source code in C. 20th anniversary edition. With a foreword by Whitfield Diffie","author":"Schneier B.","year":"2015","unstructured":"Schneier, B. 2015. Applied cryptography. Protocols, algorithms and source code in C. 20th anniversary edition. With a foreword by Whitfield Diffie. 2nd ed. Hoboken, NJ: John Wiley & Sons, reprint of the 1996 edition.","edition":"2"},{"key":"e_1_3_5_17_1","first-page":"51","volume-title":"Proceedings of the Second Manitoba Conference on Numerical Mathematics (Univ. Manitoba, Winnipeg, Man., 1972)","author":"Shanks D.","year":"1973","unstructured":"Shanks, D. 1973. Five number-theoretic algorithms. In Proceedings of the Second Manitoba Conference on Numerical Mathematics (Univ. Manitoba, Winnipeg, Man., 1972). Vol. VII of Congress. Numer, 51\u201370. Winnipeg, MB: Utilitas Math."},{"key":"e_1_3_5_18_1","doi-asserted-by":"publisher","DOI":"10.1137\/S0097539795293172"},{"key":"e_1_3_5_19_1","first-page":"344","article-title":"Bemerkung \u00fcber die Aufl\u00f6sung quadratischer Congruenzen","volume":"1891","author":"Tonelli A.","year":"1891","unstructured":"Tonelli, A. 1891. Bemerkung \u00fcber die Aufl\u00f6sung quadratischer Congruenzen. Nachrichten von der K\u00f6nigl. Gesellschaft der Wissenschaften und der Georg-Augusts-Universit\u00e4t zu G\u00f6ttingen 1891:344\u20136.","journal-title":"Nachrichten von der K\u00f6nigl. Gesellschaft der Wissenschaften und der Georg-Augusts-Universit\u00e4t zu G\u00f6ttingen"},{"key":"e_1_3_5_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1980.1056264"}],"container-title":["Cryptologia"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.tandfonline.com\/doi\/pdf\/10.1080\/01611194.2025.2496141","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,5]],"date-time":"2026-03-05T18:28:54Z","timestamp":1772735334000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.tandfonline.com\/doi\/full\/10.1080\/01611194.2025.2496141"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,6,4]]},"references-count":19,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2026,3,4]]}},"alternative-id":["10.1080\/01611194.2025.2496141"],"URL":"https:\/\/doi.org\/10.1080\/01611194.2025.2496141","relation":{},"ISSN":["0161-1194","1558-1586"],"issn-type":[{"value":"0161-1194","type":"print"},{"value":"1558-1586","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,6,4]]},"assertion":[{"value":"The publishing and review policy for this title is described in its Aims & Scope.","order":1,"name":"peerreview_statement","label":"Peer Review Statement"},{"value":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=ucry20","URL":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=ucry20","order":2,"name":"aims_and_scope_url","label":"Aim & Scope"},{"value":"2025-06-04","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}