{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,21]],"date-time":"2024-09-21T04:19:10Z","timestamp":1726892350918},"reference-count":4,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,7,9]],"date-time":"2024-07-09T00:00:00Z","timestamp":1720483200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,7,9]],"date-time":"2024-07-09T00:00:00Z","timestamp":1720483200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,7,9]]},"DOI":"10.1109\/icce-taiwan62264.2024.10674633","type":"proceedings-article","created":{"date-parts":[[2024,9,18]],"date-time":"2024-09-18T17:51:53Z","timestamp":1726681913000},"page":"585-586","source":"Crossref","is-referenced-by-count":0,"title":["Investigating Vulnerabilities in RSA-like Cryptosystems Through Lattice-based Attacks on Small Exponent Keys"],"prefix":"10.1109","author":[{"given":"Sou","family":"Kumagai","sequence":"first","affiliation":[{"name":"Okayama University,Graduate School of Environmental, Life, Natural Science and Technology,Japan"}]},{"given":"Shota","family":"Kanzawa","sequence":"additional","affiliation":[{"name":"The Japan Research Institue, Limited,Tokyo,Japan,141-0022"}]},{"given":"Samsul","family":"Huda","sequence":"additional","affiliation":[{"name":"Okayama University,Green Innovation Center,Japan"}]},{"given":"Yuta","family":"Kodera","sequence":"additional","affiliation":[{"name":"Okayama University,Graduate School of Environmental, Life, Natural Science and Technology,Japan"}]},{"given":"Yasuyuki","family":"Nogami","sequence":"additional","affiliation":[{"name":"Okayama University,Graduate School of Environmental, Life, Natural Science and Technology,Japan"}]}],"member":"263","reference":[{"volume-title":"The LLL Algorithm: Survey and Applications","year":"2009","author":"Nguyen","key":"ref1"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/359340.359342"},{"key":"ref3","first-page":"91","article-title":"A Novel RSA-Like Cryptosystem Based on a Generalization of the R\u00e9dei Rational Functions","volume-title":"Number-Theoretic Methods in Cryptology 2017","author":"Murru","year":"2017"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-21280-2_33"}],"event":{"name":"2024 International Conference on Consumer Electronics - Taiwan (ICCE-Taiwan)","start":{"date-parts":[[2024,7,9]]},"location":"Taichung, Taiwan","end":{"date-parts":[[2024,7,11]]}},"container-title":["2024 International Conference on Consumer Electronics - Taiwan (ICCE-Taiwan)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10673884\/10673887\/10674633.pdf?arnumber=10674633","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,20]],"date-time":"2024-09-20T05:50:11Z","timestamp":1726811411000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10674633\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,7,9]]},"references-count":4,"URL":"https:\/\/doi.org\/10.1109\/icce-taiwan62264.2024.10674633","relation":{},"subject":[],"published":{"date-parts":[[2024,7,9]]}}}