[{"author":[{"first_name":"Tibor","id":"64669","full_name":"Jager, Tibor","last_name":"Jager"},{"first_name":"Saqib","last_name":"Kakvi","full_name":"Kakvi, Saqib","id":"66268"},{"first_name":"Alexander","last_name":"May","full_name":"May, Alexander"}],"date_created":"2018-11-08T12:56:04Z","publisher":"ACM Press","date_updated":"2022-01-06T07:01:54Z","doi":"10.1145/3243734.3243798","main_file_link":[{"url":"https://eprint.iacr.org/2018/855.pdf"}],"title":"On the Security of the PKCS#1 v1.5 Signature Scheme","publication_identifier":{"isbn":["9781450356930"]},"has_accepted_license":"1","publication_status":"published","citation":{"apa":"Jager, T., Kakvi, S., &#38; May, A. (2018). On the Security of the PKCS#1 v1.5 Signature Scheme. In <i>Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security  - CCS ’18</i>. ACM Press. <a href=\"https://doi.org/10.1145/3243734.3243798\">https://doi.org/10.1145/3243734.3243798</a>","bibtex":"@inproceedings{Jager_Kakvi_May_2018, title={On the Security of the PKCS#1 v1.5 Signature Scheme}, DOI={<a href=\"https://doi.org/10.1145/3243734.3243798\">10.1145/3243734.3243798</a>}, booktitle={Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security  - CCS ’18}, publisher={ACM Press}, author={Jager, Tibor and Kakvi, Saqib and May, Alexander}, year={2018} }","mla":"Jager, Tibor, et al. “On the Security of the PKCS#1 v1.5 Signature Scheme.” <i>Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security  - CCS ’18</i>, ACM Press, 2018, doi:<a href=\"https://doi.org/10.1145/3243734.3243798\">10.1145/3243734.3243798</a>.","short":"T. Jager, S. Kakvi, A. May, in: Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security  - CCS ’18, ACM Press, 2018.","chicago":"Jager, Tibor, Saqib Kakvi, and Alexander May. “On the Security of the PKCS#1 v1.5 Signature Scheme.” In <i>Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security  - CCS ’18</i>. ACM Press, 2018. <a href=\"https://doi.org/10.1145/3243734.3243798\">https://doi.org/10.1145/3243734.3243798</a>.","ieee":"T. Jager, S. Kakvi, and A. May, “On the Security of the PKCS#1 v1.5 Signature Scheme,” in <i>Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security  - CCS ’18</i>, 2018.","ama":"Jager T, Kakvi S, May A. On the Security of the PKCS#1 v1.5 Signature Scheme. In: <i>Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security  - CCS ’18</i>. ACM Press; 2018. doi:<a href=\"https://doi.org/10.1145/3243734.3243798\">10.1145/3243734.3243798</a>"},"year":"2018","department":[{"_id":"558"}],"user_id":"38235","_id":"5442","language":[{"iso":"eng"}],"file_date_updated":"2018-11-08T12:57:34Z","ddc":["006"],"publication":"Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security  - CCS '18","type":"conference","status":"public","file":[{"success":1,"relation":"main_file","content_type":"application/pdf","file_size":481982,"file_name":"2018-855.pdf","file_id":"5443","access_level":"closed","date_updated":"2018-11-08T12:57:34Z","date_created":"2018-11-08T12:57:34Z","creator":"abirke"}]},{"extern":"1","language":[{"iso":"eng"}],"user_id":"83504","_id":"15892","status":"public","type":"conference","publication":"Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security","main_file_link":[{"url":"https://eprint.iacr.org/2018/749"}],"doi":"10.1145/3243734.3243787","title":"Prime and Prejudice: Primality Testing Under Adversarial Conditions","author":[{"first_name":"Martin R.","last_name":"Albrecht","full_name":"Albrecht, Martin R."},{"first_name":"Jake","last_name":"Massimo","full_name":"Massimo, Jake"},{"first_name":"Kenneth G.","last_name":"Paterson","full_name":"Paterson, Kenneth G."},{"first_name":"Juraj","orcid":"0000-0002-3593-7720","last_name":"Somorovsky","id":"83504","full_name":"Somorovsky, Juraj"}],"date_created":"2020-02-15T09:34:47Z","date_updated":"2022-01-06T06:52:39Z","citation":{"ama":"Albrecht MR, Massimo J, Paterson KG, Somorovsky J. Prime and Prejudice: Primality Testing Under Adversarial Conditions. In: <i>Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security</i>. ; 2018. doi:<a href=\"https://doi.org/10.1145/3243734.3243787\">10.1145/3243734.3243787</a>","ieee":"M. R. Albrecht, J. Massimo, K. G. Paterson, and J. Somorovsky, “Prime and Prejudice: Primality Testing Under Adversarial Conditions,” in <i>Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security</i>, 2018.","chicago":"Albrecht, Martin R., Jake Massimo, Kenneth G. Paterson, and Juraj Somorovsky. “Prime and Prejudice: Primality Testing Under Adversarial Conditions.” In <i>Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security</i>, 2018. <a href=\"https://doi.org/10.1145/3243734.3243787\">https://doi.org/10.1145/3243734.3243787</a>.","bibtex":"@inproceedings{Albrecht_Massimo_Paterson_Somorovsky_2018, title={Prime and Prejudice: Primality Testing Under Adversarial Conditions}, DOI={<a href=\"https://doi.org/10.1145/3243734.3243787\">10.1145/3243734.3243787</a>}, booktitle={Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security}, author={Albrecht, Martin R. and Massimo, Jake and Paterson, Kenneth G. and Somorovsky, Juraj}, year={2018} }","short":"M.R. Albrecht, J. Massimo, K.G. Paterson, J. Somorovsky, in: Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018.","mla":"Albrecht, Martin R., et al. “Prime and Prejudice: Primality Testing Under Adversarial Conditions.” <i>Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security</i>, 2018, doi:<a href=\"https://doi.org/10.1145/3243734.3243787\">10.1145/3243734.3243787</a>.","apa":"Albrecht, M. R., Massimo, J., Paterson, K. G., &#38; Somorovsky, J. (2018). Prime and Prejudice: Primality Testing Under Adversarial Conditions. In <i>Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security</i>. <a href=\"https://doi.org/10.1145/3243734.3243787\">https://doi.org/10.1145/3243734.3243787</a>"},"year":"2018","publication_status":"published","publication_identifier":{"isbn":["9781450356930"]}}]
