{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:33:44Z","timestamp":1750307624768,"version":"3.41.0"},"reference-count":9,"publisher":"Association for Computing Machinery (ACM)","issue":"1-2","license":[{"start":{"date-parts":[[2008,7,25]],"date-time":"2008-07-25T00:00:00Z","timestamp":1216944000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Commun. Comput. Algebra"],"published-print":{"date-parts":[[2008,7,25]]},"DOI":"10.1145\/1394042.1394065","type":"journal-article","created":{"date-parts":[[2008,7,29]],"date-time":"2008-07-29T13:22:19Z","timestamp":1217337739000},"page":"50-51","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["A variant of Wiener's attack on RSA with small secret exponent"],"prefix":"10.1145","volume":"42","author":[{"given":"Andrej","family":"Dujella","sequence":"first","affiliation":[{"name":"University of Zagreb"}]}],"member":"320","published-online":{"date-parts":[[2008,7,25]]},"reference":[{"key":"e_1_2_1_1_1","first-page":"1","article-title":"Durfee, Cryptanalysis of RSA with private key d less than N0:292, Advances in Cryptology - Proceedings of Eurocrypt '99","volume":"1952","author":"Boneh D.","year":"1999","journal-title":"Lecture Notes in Comput. Sci."},{"key":"e_1_2_1_2_1","first-page":"101","article-title":"Continued fractions and RSA with small secret exponent","volume":"29","author":"Dujella A.","year":"2004","journal-title":"Tatra Mt. Math. Publ."},{"key":"e_1_2_1_3_1","unstructured":"A. Dujella B. Ibrahimpa\u0161i\u010d On Worley's theorem in Diophantine approximations preprint.  A. Dujella B. Ibrahimpa\u0161i\u010d On Worley's theorem in Diophantine approximations preprint."},{"key":"e_1_2_1_4_1","unstructured":"J. Hinek On the Security of Some Variants of RSA Ph.D. Thesis University of Waterloo 2007.   J. Hinek On the Security of Some Variants of RSA Ph.D. Thesis University of Waterloo 2007."},{"key":"e_1_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-30580-4_13"},{"key":"e_1_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-72738-5_8"},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/s002000050082"},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/18.54902"},{"key":"e_1_2_1_9_1","first-page":"202","article-title":"Math","volume":"31","author":"Worley R. T.","year":"1981","journal-title":"Soc. Ser. A"}],"container-title":["ACM Communications in Computer Algebra"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1394042.1394065","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1394042.1394065","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T12:45:52Z","timestamp":1750250752000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1394042.1394065"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,7,25]]},"references-count":9,"journal-issue":{"issue":"1-2","published-print":{"date-parts":[[2008,7,25]]}},"alternative-id":["10.1145\/1394042.1394065"],"URL":"https:\/\/doi.org\/10.1145\/1394042.1394065","relation":{},"ISSN":["1932-2240"],"issn-type":[{"type":"print","value":"1932-2240"}],"subject":[],"published":{"date-parts":[[2008,7,25]]},"assertion":[{"value":"2008-07-25","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}