{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,17]],"date-time":"2026-04-17T16:55:20Z","timestamp":1776444920135,"version":"3.51.2"},"publisher-location":"New York, NY","reference-count":13,"publisher":"Springer New York","isbn-type":[{"value":"9780387973173","type":"print"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/0-387-34805-0_21","type":"book-chapter","created":{"date-parts":[[2007,11,9]],"date-time":"2007-11-09T02:05:53Z","timestamp":1194573953000},"page":"218-238","source":"Crossref","is-referenced-by-count":803,"title":["A Certified Digital Signature"],"prefix":"10.1007","author":[{"given":"Ralph C.","family":"Merkle","sequence":"first","affiliation":[]}],"member":"297","reference":[{"issue":"6","key":"21_CR1","doi-asserted-by":"publisher","first-page":"644","DOI":"10.1109\/TIT.1976.1055638","volume":"IT-22","author":"W. Diffie","year":"1976","unstructured":"Diffie, W., and Hellman, M. New directions in cryptography. IEEE Trans. on Inform. IT-22,6(Nov. 1976), 644\u2013654.","journal-title":"IEEE Trans. on Inform"},{"issue":"8","key":"21_CR2","doi-asserted-by":"publisher","first-page":"437","DOI":"10.1145\/361082.361087","volume":"17","author":"A. Evans","year":"1974","unstructured":"Evans A., Kantrowitz, W., and Weiss, E. A user authentication system not requiring secrecy in the computer. Comm. ACM 17,8(Aug. 1974), 437\u2013442.","journal-title":"Comm. ACM"},{"key":"21_CR3","unstructured":"Kohnfelder, L.M. Using certificates for key distribution in a public-key cryptosystem. Private communication."},{"key":"21_CR4","unstructured":"Lipton, S.M., and Matyas, S.M. Making the digital signature legal-and safeguarded. Data Communications (Feb. 1978), 41\u201352."},{"key":"21_CR5","unstructured":"McEliece, R.J. A public-key cryptosystem based on algebraic coding theory. DSN Progress Report, JPL, (Jan. and Feb. 1978), 42\u201344."},{"issue":"4","key":"21_CR6","doi-asserted-by":"publisher","first-page":"294","DOI":"10.1145\/359460.359473","volume":"21","author":"R. Merkle","year":"1978","unstructured":"Merkle, R. Secure Communications over Insecure Channels. Comm. ACM 21,4(Apr. 1978), 294\u2013299.","journal-title":"Comm. ACM"},{"issue":"5","key":"21_CR7","doi-asserted-by":"publisher","first-page":"525","DOI":"10.1109\/TIT.1978.1055927","volume":"IT-24","author":"R. Merkle","year":"1978","unstructured":"Merkle, R., and Hellman, M. Hiding information and signatures in trapdoor knapsacks. IEEE Trans. on Inform. IT-24,5(Sept. 1978), 525\u2013530.","journal-title":"IEEE Trans. on Inform."},{"issue":"2","key":"21_CR8","doi-asserted-by":"publisher","first-page":"120","DOI":"10.1145\/359340.359342","volume":"21","author":"R.L. Rivest","year":"1978","unstructured":"Rivest, R.L., Shamir, A., and Adleman, L. A method for obtaining digital signatures and public-key cryptosystems. Comm. ACM 21,2(Feb. 1978), 120\u2013126.","journal-title":"Comm. ACM"},{"key":"21_CR9","volume-title":"Time-Sharing Computer Systems","author":"M.V. Wilkes","year":"1972","unstructured":"Wilkes, M.V., Time-Sharing Computer Systems. Elsevier, New York, 1972."},{"key":"21_CR10","unstructured":"Lamport, L., Constructing digital signatures from a one way function. SRI Intl. CSL-98"},{"key":"21_CR11","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1038\/scientificamerican0573-15","volume":"228","author":"H. Feistel","year":"1973","unstructured":"Feistel, H., Cryptography and computer security. Scientific American, 228(May 1973), 15\u201323.","journal-title":"Scientific American"},{"key":"21_CR12","doi-asserted-by":"crossref","first-page":"656","DOI":"10.1002\/j.1538-7305.1949.tb00928.x","volume":"28","author":"C.E. Shannon","year":"1949","unstructured":"Shannon, C.E., Communication theory of secrecy systems. Bell Sys. Tech. Jour. 28(Oct. 1949) 656\u2013715.","journal-title":"Bell Sys. Tech. Jour."},{"key":"21_CR13","first-page":"155","volume-title":"Foundations of Secure Computation","author":"M.O. Rabin","year":"1978","unstructured":"Rabin, M.O., Digitalized signatures. In Foundations of Secure Computation, R. Lipton and R. DeMillo, Eds., Academic Press, New York, 1978, pp. 155\u2013166."}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2014 CRYPTO\u2019 89 Proceedings"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/0-387-34805-0_21.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T05:28:07Z","timestamp":1619501287000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/0-387-34805-0_21"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9780387973173"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/0-387-34805-0_21","relation":{},"subject":[]}}