A Coding-Theoretic Approach to Recovering Noisy RSA Keys

Saved in:
Bibliographic Details
Published inLecture notes in computer science
Format Book Chapter
LanguageEnglish
Online AccessGet full text
ISSN1611-3349
0302-9743
DOI10.1007/978-3-642-34961-4_24

Cover

BookMark eNotz8tOwzAUBFAvyqIU_oCFf8Bg5zpOsowiXqICqY-15cc1DQpx5BRQ_p60sBppNBrpXJJFH3sk5EbwW8F5cVcVJQOmZMZAVkowqTO5IEuhhGAwV0tS1rSJvu3f2e6AMeGxdbQehhSNO9BjpBt08RvTPKCvsR0nutnW9AWn8YpcBNONeP2fK7J_uN81T2z99vjc1Gv2kWW5ZGBNVaK0Bp0HbnPlKh5CaayTQaEqcuBKojceyjxY50wRhAheFhbA-yBgRfK_369-MNOP6To9pPbTpEkLrk9KPSs16Fmpz0p9UsIv9hxLSA
ContentType Book Chapter
DBID ABOKW
UNPAY
DOI 10.1007/978-3-642-34961-4_24
DatabaseName Unpaywall for CDI: Monographs and Miscellaneous Content
Unpaywall
Database_xml – sequence: 1
  dbid: UNPAY
  name: Unpaywall
  url: https://proxy.k.utb.cz/login?url=https://unpaywall.org/
  sourceTypes: Open Access Repository
DeliveryMethod fulltext_linktorsrc
Discipline Computer Science
ExternalDocumentID 10.1007/978-3-642-34961-4_24
GroupedDBID -DT
-GH
-~X
1SB
29L
2HA
2HV
5QI
875
AASHB
ABMNI
ABOKW
ACGFS
ADCXD
AEFIE
ALMA_UNASSIGNED_HOLDINGS
EJD
F5P
FEDTE
HVGLF
LAS
LDH
P2P
RNI
RSU
SVGTG
UNPAY
VI1
~02
ID FETCH-LOGICAL-j2254-3ba98e4baecd30b56c90ff8abc4f6e6753064edad385fbcca7f11fd47b33ddf13
IEDL.DBID UNPAY
ISSN 1611-3349
0302-9743
IngestDate Tue Aug 19 19:52:29 EDT 2025
IsDoiOpenAccess true
IsOpenAccess true
IsPeerReviewed false
IsScholarly false
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-j2254-3ba98e4baecd30b56c90ff8abc4f6e6753064edad385fbcca7f11fd47b33ddf13
OpenAccessLink https://proxy.k.utb.cz/login?url=https://link.springer.com/content/pdf/10.1007/978-3-642-34961-4_24.pdf
ParticipantIDs unpaywall_primary_10_1007_978_3_642_34961_4_24
PublicationTitle Lecture notes in computer science
Score 1.6928327
SourceID unpaywall
SourceType Open Access Repository
Title A Coding-Theoretic Approach to Recovering Noisy RSA Keys
URI https://link.springer.com/content/pdf/10.1007/978-3-642-34961-4_24.pdf
UnpaywallVersion publishedVersion
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpV1NS8NAEB1qexA91E9UVPbgNWmT3XwdQ7EUxSLaQj2F_RS1pEVTpf56Z5tEingR79ls8naXfcPMewNw4fm2r5EOHRb5wmEaA5QkCkLHaGOiQDGktFbvfDMMB2N2NQkmDejXWphVtXudkiw1DdalKS86c2XqrH6nzOkjdXas3zkGQZnPXHxgA1phgJy8Ca3x8DZ9KFMIPk5fVtqH1rMPh6xp6H571RZsLvI5X37w6XTttum34bH-zrLI5MVdFMKVnz8sHP__IzuwbbUOxIoQEN9daOh8D9p1pwdSHfx9iFPSm9lbzhnVwkeSVm7kpJgRG8S-r0wNyXD29LYkd_cpucZNcgDj_uWoN3CqngvOM55s5lDBk1gzwbVUtCuCUCZdY2IuJDO4pBjcIIfRiisaB0bg8kfG84xikaBUKePRQ2jms1wfATGayYRyI2NDmZQs8bjiVEnGkZNopY7B_UY5m5feGlntoozAZDRDYLIVMJkF5uSvA06hWbwu9BnShkKcV3viC4IOu-s
linkProvider Unpaywall
linkToUnpaywall http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpV1NS8NAEB1qexA91E9UVPbgNWmT3XwdQ7EUxSLaQj2F_RS1pEVTpf56Z5tEingR79ls8naXfcPMewNw4fm2r5EOHRb5wmEaA5QkCkLHaGOiQDGktFbvfDMMB2N2NQkmDejXWphVtXudkiw1DdalKS86c2XqrH6nzOkjdXas3zkGQZnPXHxgA1phgJy8Ca3x8DZ9KFMIPk5fVtqH1rMPh6xp6H571RZsLvI5X37w6XTttum34bH-zrLI5MVdFMKVnz8sHP__IzuwbbUOxIoQEN9daOh8D9p1pwdSHfx9iFPSm9lbzhnVwkeSVm7kpJgRG8S-r0wNyXD29LYkd_cpucZNcgDj_uWoN3CqngvOM55s5lDBk1gzwbVUtCuCUCZdY2IuJDO4pBjcIIfRiisaB0bg8kfG84xikaBUKePRQ2jms1wfATGayYRyI2NDmZQs8bjiVEnGkZNopY7B_UY5m5feGlntoozAZDRDYLIVMJkF5uSvA06hWbwu9BnShkKcV3viC4IOu-s
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=bookitem&rft.title=Lecture+notes+in+computer+science&rft.atitle=A+Coding-Theoretic+Approach+to+Recovering+Noisy+RSA+Keys&rft.issn=1611-3349&rft_id=info:doi/10.1007%2F978-3-642-34961-4_24&rft.externalDocID=10.1007%2F978-3-642-34961-4_24
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1611-3349&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1611-3349&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1611-3349&client=summon