{"id":"https://openalex.org/W2303920657","doi":"https://doi.org/10.1007/s10623-016-0196-5","title":"Cryptanalysis of Dual RSA","display_name":"Cryptanalysis of Dual RSA","publication_year":2016,"publication_date":"2016-03-22","ids":{"openalex":"https://openalex.org/W2303920657","doi":"https://doi.org/10.1007/s10623-016-0196-5","mag":"2303920657"},"language":"en","primary_location":{"id":"doi:10.1007/s10623-016-0196-5","is_oa":false,"landing_page_url":"https://doi.org/10.1007/s10623-016-0196-5","pdf_url":null,"source":{"id":"https://openalex.org/S81616010","display_name":"Designs Codes and Cryptography","issn_l":"0925-1022","issn":["0925-1022","1573-7586"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Designs, Codes and Cryptography","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5077538627","display_name":"Liqiang Peng","orcid":null},"institutions":[{"id":"https://openalex.org/I4210126530","display_name":"Data Assurance and Communication Security","ror":"https://ror.org/02z2gfm30","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210126530","https://openalex.org/I4210156404"]},{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]},{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Liqiang Peng","raw_affiliation_strings":["Data Assurance and Communication Security Research Center, Chinese Academy of Sciences, Beijing, 100093, China","State Key State Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, 100093, China"],"affiliations":[{"raw_affiliation_string":"Data Assurance and Communication Security Research Center, Chinese Academy of Sciences, Beijing, 100093, China","institution_ids":["https://openalex.org/I4210126530"]},{"raw_affiliation_string":"State Key State Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, 100093, China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5034965387","display_name":"Lei Hu","orcid":"https://orcid.org/0000-0002-9920-5342"},"institutions":[{"id":"https://openalex.org/I4210095018","display_name":"National Center for Mathematics and Interdisciplinary Sciences","ror":"https://ror.org/00s97k668","country_code":"CN","type":"facility","lineage":["https://openalex.org/I4210095018"]},{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]},{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366"]},{"id":"https://openalex.org/I4210126530","display_name":"Data Assurance and Communication Security","ror":"https://ror.org/02z2gfm30","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210126530","https://openalex.org/I4210156404"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Lei Hu","raw_affiliation_strings":["Beijing Center for Mathematics and Information Interdisciplinary Sciences, Beijing, 100048, China","Data Assurance and Communication Security Research Center, Chinese Academy of Sciences, Beijing, 100093, China","State Key State Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, 100093, China"],"affiliations":[{"raw_affiliation_string":"Beijing Center for Mathematics and Information Interdisciplinary Sciences, Beijing, 100048, China","institution_ids":["https://openalex.org/I4210095018"]},{"raw_affiliation_string":"Data Assurance and Communication Security Research Center, Chinese Academy of Sciences, Beijing, 100093, China","institution_ids":["https://openalex.org/I4210126530"]},{"raw_affiliation_string":"State Key State Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, 100093, China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101983112","display_name":"Yao Lu","orcid":"https://orcid.org/0000-0001-9824-6348"},"institutions":[{"id":"https://openalex.org/I74801974","display_name":"The University of Tokyo","ror":"https://ror.org/057zh3y96","country_code":"JP","type":"education","lineage":["https://openalex.org/I74801974"]},{"id":"https://openalex.org/I4210126530","display_name":"Data Assurance and Communication Security","ror":"https://ror.org/02z2gfm30","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210126530","https://openalex.org/I4210156404"]},{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]},{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366"]}],"countries":["CN","JP"],"is_corresponding":false,"raw_author_name":"Yao Lu","raw_affiliation_strings":["Data Assurance and Communication Security Research Center, Chinese Academy of Sciences, Beijing, 100093, China","State Key State Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, 100093, China","The University of Tokyo, Tokyo, Japan"],"affiliations":[{"raw_affiliation_string":"Data Assurance and Communication Security Research Center, Chinese Academy of Sciences, Beijing, 100093, China","institution_ids":["https://openalex.org/I4210126530"]},{"raw_affiliation_string":"State Key State Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, 100093, China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]},{"raw_affiliation_string":"The University of Tokyo, Tokyo, Japan","institution_ids":["https://openalex.org/I74801974"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101590763","display_name":"Jun Xu","orcid":"https://orcid.org/0000-0002-1179-7487"},"institutions":[{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366"]},{"id":"https://openalex.org/I4210126530","display_name":"Data Assurance and Communication Security","ror":"https://ror.org/02z2gfm30","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210126530","https://openalex.org/I4210156404"]},{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jun Xu","raw_affiliation_strings":["Data Assurance and Communication Security Research Center, Chinese Academy of Sciences, Beijing, 100093, China","State Key State Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, 100093, China"],"affiliations":[{"raw_affiliation_string":"Data Assurance and Communication Security Research Center, Chinese Academy of Sciences, Beijing, 100093, China","institution_ids":["https://openalex.org/I4210126530"]},{"raw_affiliation_string":"State Key State Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, 100093, China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5101917133","display_name":"Zhangjie Huang","orcid":null},"institutions":[{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]},{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366"]},{"id":"https://openalex.org/I4210126530","display_name":"Data Assurance and Communication Security","ror":"https://ror.org/02z2gfm30","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210126530","https://openalex.org/I4210156404"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhangjie Huang","raw_affiliation_strings":["Data Assurance and Communication Security Research Center, Chinese Academy of Sciences, Beijing, 100093, China","State Key State Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, 100093, China"],"affiliations":[{"raw_affiliation_string":"Data Assurance and Communication Security Research Center, Chinese Academy of Sciences, Beijing, 100093, China","institution_ids":["https://openalex.org/I4210126530"]},{"raw_affiliation_string":"State Key State Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, 100093, China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5077538627"],"corresponding_institution_ids":["https://openalex.org/I19820366","https://openalex.org/I4210126530","https://openalex.org/I4210156404"],"apc_list":{"value":2290,"currency":"EUR","value_usd":2890},"apc_paid":null,"fwci":5.7647,"has_fulltext":false,"cited_by_count":19,"citation_normalized_percentile":{"value":0.96118679,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":99},"biblio":{"volume":"83","issue":"1","first_page":"1","last_page":"21"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11130","display_name":"Coding theory and cryptography","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11693","display_name":"Cryptography and Residue Arithmetic","score":0.9987000226974487,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/cryptanalysis","display_name":"Cryptanalysis","score":0.8190274238586426},{"id":"https://openalex.org/keywords/exponent","display_name":"Exponent","score":0.6747815012931824},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.6489201188087463},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.6061082482337952},{"id":"https://openalex.org/keywords/dual","display_name":"Dual (grammatical number)","score":0.600753664970398},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.5191596746444702},{"id":"https://openalex.org/keywords/integer","display_name":"Integer (computer science)","score":0.42435210943222046},{"id":"https://openalex.org/keywords/modular-equation","display_name":"Modular equation","score":0.4156635105609894},{"id":"https://openalex.org/keywords/secrecy","display_name":"Secrecy","score":0.41455626487731934},{"id":"https://openalex.org/keywords/discrete-mathematics","display_name":"Discrete mathematics","score":0.4113355278968811},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.391005277633667},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.37231308221817017},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.36785221099853516},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.2724111080169678},{"id":"https://openalex.org/keywords/pure-mathematics","display_name":"Pure mathematics","score":0.14347141981124878},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.10945311188697815}],"concepts":[{"id":"https://openalex.org/C181149355","wikidata":"https://www.wikidata.org/wiki/Q897511","display_name":"Cryptanalysis","level":3,"score":0.8190274238586426},{"id":"https://openalex.org/C2780388253","wikidata":"https://www.wikidata.org/wiki/Q5421508","display_name":"Exponent","level":2,"score":0.6747815012931824},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.6489201188087463},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.6061082482337952},{"id":"https://openalex.org/C2780980858","wikidata":"https://www.wikidata.org/wiki/Q110022","display_name":"Dual (grammatical number)","level":2,"score":0.600753664970398},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.5191596746444702},{"id":"https://openalex.org/C97137487","wikidata":"https://www.wikidata.org/wiki/Q729138","display_name":"Integer (computer science)","level":2,"score":0.42435210943222046},{"id":"https://openalex.org/C55247095","wikidata":"https://www.wikidata.org/wiki/Q6889716","display_name":"Modular equation","level":4,"score":0.4156635105609894},{"id":"https://openalex.org/C2776452267","wikidata":"https://www.wikidata.org/wiki/Q1503443","display_name":"Secrecy","level":2,"score":0.41455626487731934},{"id":"https://openalex.org/C118615104","wikidata":"https://www.wikidata.org/wiki/Q121416","display_name":"Discrete mathematics","level":1,"score":0.4113355278968811},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.391005277633667},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.37231308221817017},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.36785221099853516},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.2724111080169678},{"id":"https://openalex.org/C202444582","wikidata":"https://www.wikidata.org/wiki/Q837863","display_name":"Pure mathematics","level":1,"score":0.14347141981124878},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.10945311188697815},{"id":"https://openalex.org/C124952713","wikidata":"https://www.wikidata.org/wiki/Q8242","display_name":"Literature","level":1,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C142362112","wikidata":"https://www.wikidata.org/wiki/Q735","display_name":"Art","level":0,"score":0.0},{"id":"https://openalex.org/C3387666","wikidata":"https://www.wikidata.org/wiki/Q6889798","display_name":"Moduli of algebraic curves","level":3,"score":0.0},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0},{"id":"https://openalex.org/C73373263","wikidata":"https://www.wikidata.org/wiki/Q845677","display_name":"Moduli space","level":2,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1007/s10623-016-0196-5","is_oa":false,"landing_page_url":"https://doi.org/10.1007/s10623-016-0196-5","pdf_url":null,"source":{"id":"https://openalex.org/S81616010","display_name":"Designs Codes and Cryptography","issn_l":"0925-1022","issn":["0925-1022","1573-7586"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Designs, Codes and Cryptography","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G3277449334","display_name":null,"funder_award_id":"61402469","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G676629878","display_name":null,"funder_award_id":"61472417","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320321133","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35"},{"id":"https://openalex.org/F4320335777","display_name":"National Key Research and Development Program of China","ror":null},{"id":"https://openalex.org/F4320338075","display_name":"Core Research for Evolutional Science and Technology","ror":"https://ror.org/00097mb19"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":26,"referenced_works":["https://openalex.org/W159286319","https://openalex.org/W279488099","https://openalex.org/W610273277","https://openalex.org/W1550863203","https://openalex.org/W1580300316","https://openalex.org/W1766548092","https://openalex.org/W1775358224","https://openalex.org/W1961022628","https://openalex.org/W1974890031","https://openalex.org/W1976677460","https://openalex.org/W1996360405","https://openalex.org/W2000986731","https://openalex.org/W2006155502","https://openalex.org/W2019689629","https://openalex.org/W2074881446","https://openalex.org/W2101040389","https://openalex.org/W2107346534","https://openalex.org/W2113005412","https://openalex.org/W2117948393","https://openalex.org/W2130783199","https://openalex.org/W2141040012","https://openalex.org/W2143772938","https://openalex.org/W2166780626","https://openalex.org/W2166957790","https://openalex.org/W2914533310","https://openalex.org/W4285719527"],"related_works":["https://openalex.org/W2493929861","https://openalex.org/W2016567611","https://openalex.org/W2475541339","https://openalex.org/W565335793","https://openalex.org/W2363071176","https://openalex.org/W2107199751","https://openalex.org/W2166780626","https://openalex.org/W2132296708","https://openalex.org/W1553510179","https://openalex.org/W3003799348"],"abstract_inverted_index":null,"counts_by_year":[{"year":2023,"cited_by_count":2},{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":3},{"year":2019,"cited_by_count":6},{"year":2018,"cited_by_count":3},{"year":2017,"cited_by_count":4}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
