{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T20:28:34Z","timestamp":1725481714702},"publisher-location":"Berlin, Heidelberg","reference-count":9,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540502517"},{"type":"electronic","value":"9783540459613"}],"license":[{"start":{"date-parts":[[1988,1,1]],"date-time":"1988-01-01T00:00:00Z","timestamp":567993600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1988]]},"DOI":"10.1007\/3-540-45961-8_26","type":"book-chapter","created":{"date-parts":[[2007,3,5]],"date-time":"2007-03-05T16:43:15Z","timestamp":1173112995000},"page":"281-291","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":11,"title":["How to Break Okamoto\u2019s Cryptosystem by Reducing Lattice Bases"],"prefix":"10.1007","author":[{"given":"Brigitte","family":"Vall\u00e9e","sequence":"first","affiliation":[]},{"given":"Marc","family":"Girault","sequence":"additional","affiliation":[]},{"given":"Philippe","family":"Toffin","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2000,12,1]]},"reference":[{"key":"26_CR1","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/BF02579403","volume":"6","author":"L. Babai","year":"1986","unstructured":"L. Babai: On Lovasz\u2019s lattice reduction and the nearest lattice point problem, Combinatorica 6 (1986) pp 1\u201314.","journal-title":"Combinatorica"},{"unstructured":"E. Brickell, J. Delaurentis: An attack on a signature scheme proposed by Okamoto and Shiraishi, Proc. of Crypto\u201985, pp 10\u201314.","key":"26_CR2"},{"unstructured":"A. Frieze, J. Hastad, R. Kannan, J.C. Lagarias, A. Shamir: Reconstructing truncated variables satisfying linear congruences, to appear in SIAM Journal of Computing.","key":"26_CR3"},{"key":"26_CR4","doi-asserted-by":"publisher","first-page":"513","DOI":"10.1007\/BF01457454","volume":"261","author":"A.K. Lenstra","year":"1982","unstructured":"A.K. Lenstra, H.W. Lenstra, L. Lovasz: Factoring polynomials with integer coefficients, Mathematische Annalen, 261, (1982) pp 513\u2013534.","journal-title":"Mathematische Annalen"},{"doi-asserted-by":"crossref","unstructured":"T. Okamoto, A. Shiraishi: A fast signature scheme based on quadratic inequalities, Proc. of the 1985 Symposium on Security and Privacy, April 1985, Oakland, CA.","key":"26_CR5","DOI":"10.1109\/SP.1985.10026"},{"key":"26_CR6","doi-asserted-by":"publisher","first-page":"581","DOI":"10.1049\/el:19860395","volume":"22","author":"T. Okamoto","year":"1986","unstructured":"T. Okamoto: Fast public-key cryptosystem using congruent polynomial equations, Electronics Letters, 1986, 22, pp 581\u2013582.","journal-title":"Electronics Letters"},{"key":"26_CR7","doi-asserted-by":"publisher","first-page":"814","DOI":"10.1049\/el:19870577","volume":"23","author":"T. Okamoto","year":"1987","unstructured":"T. Okamoto: Modification of a public-key cryptosystem, Electronics Letters, 1987, 23, pp 814\u2013815.","journal-title":"Electronics Letters"},{"unstructured":"A. Shamir: Private communications to Okamoto, quoted in [7], August and October 1986.","key":"26_CR8"},{"unstructured":"B. Vall\u00e9e, M. Girault, P. Toffin: How to guess \u2113-th roots modulo n by reducing lattices bases, preprint of Universit\u00e9 de Caen, to appear in Proceedings of First International Joint Conference of ISSAC-88 and AAECC-6 (July 88).","key":"26_CR9"}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2014 EUROCRYPT \u201988"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-45961-8_26","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,19]],"date-time":"2019-05-19T13:27:21Z","timestamp":1558272441000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-45961-8_26"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1988]]},"ISBN":["9783540502517","9783540459613"],"references-count":9,"URL":"https:\/\/doi.org\/10.1007\/3-540-45961-8_26","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[1988]]},"assertion":[{"value":"1 December 2000","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}