{"id":"https://openalex.org/W2100770280","doi":"https://doi.org/10.1007/11689522_29","title":"Security Analysis of a Server-Aided RSA Key Generation Protocol","display_name":"Security Analysis of a Server-Aided RSA Key Generation Protocol","publication_year":2006,"publication_date":"2006-01-01","ids":{"openalex":"https://openalex.org/W2100770280","doi":"https://doi.org/10.1007/11689522_29","mag":"2100770280"},"language":"en","primary_location":{"id":"doi:10.1007/11689522_29","is_oa":false,"landing_page_url":"https://doi.org/10.1007/11689522_29","pdf_url":null,"source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},"type":"book-chapter","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5058390263","display_name":"Tianjie Cao","orcid":"https://orcid.org/0000-0002-8120-5029"},"institutions":[{"id":"https://openalex.org/I25757504","display_name":"China University of Mining and Technology","ror":"https://ror.org/01xt2dr21","country_code":"CN","type":"education","lineage":["https://openalex.org/I25757504"]},{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366"]},{"id":"https://openalex.org/I4391768012","display_name":"State Key Laboratory of Information Security","ror":"https://ror.org/012cr4033","country_code":null,"type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404","https://openalex.org/I4391768012"]},{"id":"https://openalex.org/I4210128818","display_name":"Institute of Software","ror":"https://ror.org/033dfsn42","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210128818"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Tianjie Cao","raw_affiliation_strings":["Graduate School of Chinese Academy of Sciences, Beijing, China","Institute of Software of Chinese Academy of Sciences, State Key Laboratory of Information Security, Beijing, China","School of Computer Science and Technology, China University of Mining and Technology, Xuzhou, China"],"affiliations":[{"raw_affiliation_string":"Graduate School of Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I19820366"]},{"raw_affiliation_string":"Institute of Software of Chinese Academy of Sciences, State Key Laboratory of Information Security, Beijing, China","institution_ids":["https://openalex.org/I4210128818","https://openalex.org/I19820366","https://openalex.org/I4391768012"]},{"raw_affiliation_string":"School of Computer Science and Technology, China University of Mining and Technology, Xuzhou, China","institution_ids":["https://openalex.org/I25757504"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5088188169","display_name":"Xianping Mao","orcid":null},"institutions":[{"id":"https://openalex.org/I25757504","display_name":"China University of Mining and Technology","ror":"https://ror.org/01xt2dr21","country_code":"CN","type":"education","lineage":["https://openalex.org/I25757504"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xianping Mao","raw_affiliation_strings":["School of Computer Science and Technology, China University of Mining and Technology, Xuzhou, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Technology, China University of Mining and Technology, Xuzhou, China","institution_ids":["https://openalex.org/I25757504"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5008820992","display_name":"Dongdai Lin","orcid":"https://orcid.org/0000-0002-3951-7889"},"institutions":[{"id":"https://openalex.org/I4210128818","display_name":"Institute of Software","ror":"https://ror.org/033dfsn42","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210128818"]},{"id":"https://openalex.org/I4391768012","display_name":"State Key Laboratory of Information Security","ror":"https://ror.org/012cr4033","country_code":null,"type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404","https://openalex.org/I4391768012"]},{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Dongdai Lin","raw_affiliation_strings":["Institute of Software of Chinese Academy of Sciences, State Key Laboratory of Information Security, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Institute of Software of Chinese Academy of Sciences, State Key Laboratory of Information Security, Beijing, China","institution_ids":["https://openalex.org/I4210128818","https://openalex.org/I19820366","https://openalex.org/I4391768012"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5058390263"],"corresponding_institution_ids":["https://openalex.org/I19820366","https://openalex.org/I25757504","https://openalex.org/I4210128818","https://openalex.org/I4391768012"],"apc_list":{"value":5000,"currency":"EUR","value_usd":5392},"apc_paid":null,"fwci":2.0794,"has_fulltext":false,"cited_by_count":9,"citation_normalized_percentile":{"value":0.87741681,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"314","last_page":"320"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9984999895095825,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9984999895095825,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/collusion","display_name":"Collusion","score":0.8222532868385315},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8065332174301147},{"id":"https://openalex.org/keywords/server","display_name":"Server","score":0.750015139579773},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5586888790130615},{"id":"https://openalex.org/keywords/key-generation","display_name":"Key generation","score":0.5429508686065674},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.5332142114639282},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.5071632862091064},{"id":"https://openalex.org/keywords/protocol","display_name":"Protocol (science)","score":0.5007634162902832},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.49189233779907227},{"id":"https://openalex.org/keywords/cryptographic-protocol","display_name":"Cryptographic protocol","score":0.46395060420036316},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.2967497706413269},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.137807697057724}],"concepts":[{"id":"https://openalex.org/C2781198186","wikidata":"https://www.wikidata.org/wiki/Q701521","display_name":"Collusion","level":2,"score":0.8222532868385315},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8065332174301147},{"id":"https://openalex.org/C93996380","wikidata":"https://www.wikidata.org/wiki/Q44127","display_name":"Server","level":2,"score":0.750015139579773},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5586888790130615},{"id":"https://openalex.org/C163173736","wikidata":"https://www.wikidata.org/wiki/Q3308558","display_name":"Key generation","level":3,"score":0.5429508686065674},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.5332142114639282},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.5071632862091064},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.5007634162902832},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.49189233779907227},{"id":"https://openalex.org/C33884865","wikidata":"https://www.wikidata.org/wiki/Q1254335","display_name":"Cryptographic protocol","level":3,"score":0.46395060420036316},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.2967497706413269},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.137807697057724},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.0},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0},{"id":"https://openalex.org/C204787440","wikidata":"https://www.wikidata.org/wiki/Q188504","display_name":"Alternative medicine","level":2,"score":0.0},{"id":"https://openalex.org/C175444787","wikidata":"https://www.wikidata.org/wiki/Q39072","display_name":"Microeconomics","level":1,"score":0.0},{"id":"https://openalex.org/C142724271","wikidata":"https://www.wikidata.org/wiki/Q7208","display_name":"Pathology","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1007/11689522_29","is_oa":false,"landing_page_url":"https://doi.org/10.1007/11689522_29","pdf_url":null,"source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":20,"referenced_works":["https://openalex.org/W1508772548","https://openalex.org/W1510693470","https://openalex.org/W1530462290","https://openalex.org/W1546386934","https://openalex.org/W1564189060","https://openalex.org/W1567403662","https://openalex.org/W1571821840","https://openalex.org/W1574208347","https://openalex.org/W1606573350","https://openalex.org/W1718334008","https://openalex.org/W1721847811","https://openalex.org/W1799981655","https://openalex.org/W1899316545","https://openalex.org/W1996360405","https://openalex.org/W2016332932","https://openalex.org/W2068211749","https://openalex.org/W2123544182","https://openalex.org/W2133740767","https://openalex.org/W4232836212","https://openalex.org/W4285719527"],"related_works":["https://openalex.org/W2109535376","https://openalex.org/W1599634820","https://openalex.org/W1980134735","https://openalex.org/W783558444","https://openalex.org/W2554901794","https://openalex.org/W2108355720","https://openalex.org/W3203834545","https://openalex.org/W2362653998","https://openalex.org/W2992521683","https://openalex.org/W2126511574"],"abstract_inverted_index":null,"counts_by_year":[{"year":2016,"cited_by_count":1},{"year":2015,"cited_by_count":1},{"year":2013,"cited_by_count":1},{"year":2012,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
