{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,7]],"date-time":"2025-05-07T18:02:15Z","timestamp":1746640935609,"version":"3.28.0"},"reference-count":22,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,1]]},"DOI":"10.1109\/ccnc.2018.8319159","type":"proceedings-article","created":{"date-parts":[[2018,3,19]],"date-time":"2018-03-19T18:10:21Z","timestamp":1521483021000},"page":"1-7","source":"Crossref","is-referenced-by-count":1,"title":["Cryptosystems with a multi prime composite modulus"],"prefix":"10.1109","author":[{"given":"Shay","family":"Gueron","sequence":"first","affiliation":[]},{"given":"Nir","family":"Drucker","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","first-page":"759","article-title":"Residuosity problem and its applications to cryptography","volume":"71","author":"zheng","year":"1988","journal-title":"IEICE TRANSACTIONS (1976&#x2013;1990)"},{"journal-title":"Digitalized signatures and public-key functions as intractable as factorization","year":"1979","author":"rabin","key":"ref11"},{"key":"ref12","first-page":"120","article-title":"Dense probabilistic encryption","author":"benaloh","year":"1994","journal-title":"Proceedings of the Workshop on Selected Areas of Cryptography"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.1982.59"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/BFb0091537"},{"key":"ref15","first-page":"67","author":"lenstra","year":"2001","journal-title":"Unbelievable Security Matching AES Security Using Public Key Systems"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.2307\/1971363"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-14623-7_18"},{"key":"ref18","article-title":"Multi-prime RSA trade offs","author":"langley","year":"2011","journal-title":"ImperialViolet (blog)"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/288090.288106"},{"key":"ref4","first-page":"1","article-title":"Fast variants of RSA","volume":"5","author":"boneh","year":"2002","journal-title":"CryptoBytes"},{"key":"ref3","first-page":"237","author":"gueron","year":"2016","journal-title":"Speed Records for Multi-prime RSA Using AVX2 Architectures"},{"key":"ref6","first-page":"385","article-title":"On some attacks on multi-prime RSA","author":"hinek","year":"2002","journal-title":"Workshop Selected Areas in Cryptography"},{"key":"ref5","first-page":"203","article-title":"Twenty years of attacks on the RSA cryptosystem","volume":"46","author":"boneh","year":"1999","journal-title":"Notices of the AMS"},{"key":"ref8","first-page":"185","author":"terada","year":"2015","journal-title":"Factoring a Multiprime Modulus N with Random Bits"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1515\/JMC.2008.006"},{"journal-title":"PKCS #1 v2 2 RSA Cryptography Standard","year":"2012","author":"laboratories","key":"ref2"},{"journal-title":"Public Key Cryptographic Apparatus and Method","year":"1980","author":"hellman","key":"ref1"},{"journal-title":"Discrete logarithms and factoring","year":"1984","author":"bach","key":"ref9"},{"key":"ref20","first-page":"223","author":"paillier","year":"1999","journal-title":"Public-key cryptosystems based on composite degree residuosity classes"},{"key":"ref22","first-page":"348","author":"fousse","year":"2011","journal-title":"Benaloh's Dense Probabilistic Encryption Revisited"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1980.1056264"}],"event":{"name":"2018 15th IEEE Annual Consumer Communications & Networking Conference (CCNC)","start":{"date-parts":[[2018,1,12]]},"location":"Las Vegas, NV","end":{"date-parts":[[2018,1,15]]}},"container-title":["2018 15th IEEE Annual Consumer Communications &amp; Networking Conference (CCNC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8314843\/8319155\/08319159.pdf?arnumber=8319159","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,4,9]],"date-time":"2018-04-09T17:06:38Z","timestamp":1523293598000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/8319159\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,1]]},"references-count":22,"URL":"https:\/\/doi.org\/10.1109\/ccnc.2018.8319159","relation":{},"subject":[],"published":{"date-parts":[[2018,1]]}}}