{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,25]],"date-time":"2026-02-25T12:26:29Z","timestamp":1772022389845,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":18,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540284741","type":"print"},{"value":"9783540319405","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005]]},"DOI":"10.1007\/11545262_4","type":"book-chapter","created":{"date-parts":[[2005,9,27]],"date-time":"2005-09-27T14:35:35Z","timestamp":1127831735000},"page":"47-60","source":"Crossref","is-referenced-by-count":13,"title":["A New Baby-Step Giant-Step Algorithm and Some Applications to Cryptanalysis"],"prefix":"10.1007","author":[{"given":"Jean S\u00e9bastien","family":"Coron","sequence":"first","affiliation":[]},{"given":"David","family":"Lefranc","sequence":"additional","affiliation":[]},{"given":"Guillaume","family":"Poupard","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"4_CR1","series-title":"Graduate Texts in Mathematics","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-662-02945-9","volume-title":"A Course in Computational Algebraic Number Theory","author":"H. Cohen","year":"1993","unstructured":"Cohen, H.: A Course in Computational Algebraic Number Theory. Graduate Texts in Mathematics, vol.\u00a0138. Springer, Heidelberg (1993)"},{"issue":"6","key":"4_CR2","doi-asserted-by":"publisher","first-page":"644","DOI":"10.1109\/TIT.1976.1055638","volume":"22","author":"W. Diffie","year":"1976","unstructured":"Diffie, W., Hellman, M.E.: New Directions in Cryptography. IEEE Transactions on Information Theory\u00a022(6), 644\u2013654 (1976)","journal-title":"IEEE Transactions on Information Theory"},{"key":"4_CR3","series-title":"Lecture Notes in Computer Science","first-page":"186","volume-title":"Advances in Cryptology - CRYPTO \u201986","author":"A. Fiat","year":"1987","unstructured":"Fiat, A., Shamir, A.: How to Prove Yourself: Practical Solutions to Identification and Signature Problems. In: Odlyzko, A.M. (ed.) CRYPTO 1986. LNCS, vol.\u00a0263, pp. 186\u2013194. Springer, Heidelberg (1987)"},{"key":"4_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"490","DOI":"10.1007\/3-540-46416-6_42","volume-title":"Advances in Cryptology - EUROCRYPT \u201991","author":"M. Girault","year":"1991","unstructured":"Girault, M.: Self-Certified Public Keys. In: Davies, D.W. (ed.) EUROCRYPT 1991. LNCS, vol.\u00a0547, pp. 490\u2013497. Springer, Heidelberg (1991)"},{"key":"4_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"413","DOI":"10.1007\/978-3-540-28632-5_30","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2004","author":"M. Girault","year":"2004","unstructured":"Girault, M., Lefranc, D.: Public Key Authentication with one Single (on-line) Addition. In: Joye, M., Quisquater, J.-J. (eds.) CHES 2004. LNCS, vol.\u00a03156, pp. 413\u2013427. Springer, Heidelberg (2004)"},{"key":"4_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"123","DOI":"10.1007\/3-540-45961-8_11","volume-title":"Advances in Cryptology - EUROCRYPT \u201988","author":"L.C. Guillou","year":"1988","unstructured":"Guillou, L.C., Quisquater, J.J.: A Practical Zero-knowledge Protocol Fitted to Security Microprocessor Minimizing both Transmission and Memory. In: G\u00fcnther, C.G. (ed.) EUROCRYPT 1988. LNCS, vol.\u00a0330, pp. 123\u2013128. Springer, Heidelberg (1988)"},{"key":"4_CR7","unstructured":"Hoffstein, J., Silverman, J.H.: Random Small Hamming Weight Products with Applications to Cryptography. Technical report, NTRU Cryptosystems"},{"key":"4_CR8","unstructured":"National Institute of Standards and Technologies. Digital Signature Standard (DSS). Federal Information Processing Standards. Publication 186 (November 1994)"},{"issue":"2\/3","key":"4_CR9","doi-asserted-by":"publisher","first-page":"129","DOI":"10.1023\/A:1008350005447","volume":"19","author":"A.M. Odlyzko","year":"2000","unstructured":"Odlyzko, A.M.: Discrete Logarithms: The Past and The Future. Designs, Codes, and Cryptography\u00a019(2\/3), 129\u2013145 (2000)","journal-title":"Designs, Codes, and Cryptography"},{"key":"4_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"111","DOI":"10.1007\/10958513_9","volume-title":"Information Security","author":"T. Okamoto","year":"2003","unstructured":"Okamoto, T., Katsuno, H., Okamoto, E.: A Fast Signature Scheme based on new on-line Computation. In: Boyd, C., Mao, W. (eds.) ISC 2003. LNCS, vol.\u00a02851, pp. 111\u2013121. Springer, Heidelberg (2003)"},{"key":"4_CR11","doi-asserted-by":"crossref","unstructured":"Okamoto, T., Tada, M., Miyaji, A.: An Improved Fast Signature Scheme without on-line Multiplication. In: Blaze, M. (ed.) FC 2002. LNCS, vol.\u00a02357. Springer, Heidelberg (2003)","DOI":"10.1007\/3-540-36504-4_12"},{"issue":"143","key":"4_CR12","doi-asserted-by":"publisher","first-page":"918","DOI":"10.2307\/2006496","volume":"32","author":"J.M. Pollard","year":"1978","unstructured":"Pollard, J.M.: Monte Carlo Methods for Index Computations (mod p). Mathematics of Computation\u00a032(143), 918\u2013924 (1978)","journal-title":"Mathematics of Computation"},{"key":"4_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"422","DOI":"10.1007\/BFb0054143","volume-title":"Advances in Cryptology - EUROCRYPT \u201998","author":"G. Poupard","year":"1998","unstructured":"Poupard, G., Stern, J.: Security Analysis of a Practical \u201don the fly\u201d Authentication and Signature Generation. In: Nyberg, K. (ed.) EUROCRYPT 1998. LNCS, vol.\u00a01403, pp. 422\u2013436. Springer, Heidelberg (1998)"},{"issue":"2","key":"4_CR14","doi-asserted-by":"publisher","first-page":"120","DOI":"10.1145\/359340.359342","volume":"21","author":"R. Rivest","year":"1978","unstructured":"Rivest, R., Shamir, A., Adleman, L.: A Method for Obtaining Digital Signatures and Public-Key Cryptosystems. Communication of the ACM\u00a021(2), 120\u2013126 (1978)","journal-title":"Communication of the ACM"},{"key":"4_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"239","DOI":"10.1007\/0-387-34805-0_22","volume-title":"Advances in Cryptology - CRYPTO \u201989","author":"C.P. Schnorr","year":"1990","unstructured":"Schnorr, C.P.: Efficient Identification and Signatures for Smart Cards. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol.\u00a0435, pp. 239\u2013252. Springer, Heidelberg (1990)"},{"key":"4_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"207","DOI":"10.1007\/3-540-45539-6_15","volume-title":"Advances in Cryptology - EUROCRYPT 2000","author":"V. Shoup","year":"2000","unstructured":"Shoup, V.: Practical Threshold Signatures. In: Preneel, B. (ed.) EUROCRYPT 2000. LNCS, vol.\u00a01807, pp. 207\u2013220. Springer, Heidelberg (2000)"},{"key":"4_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"138","DOI":"10.1007\/978-3-540-45126-6_10","volume-title":"Financial Cryptography","author":"J. Stern","year":"2003","unstructured":"Stern, J., Stern, J.P.: Cryptanalysis of the OTM Signature Scheme from FC\u201902. In: Wright, R.N. (ed.) FC 2003. LNCS, vol.\u00a02742, pp. 138\u2013148. Springer, Heidelberg (2003)"},{"issue":"237","key":"4_CR18","doi-asserted-by":"publisher","first-page":"379","DOI":"10.1090\/S0025-5718-01-01310-2","volume":"71","author":"D.R. Stinson","year":"2002","unstructured":"Stinson, D.R.: Some Baby-Step Giant-Step Algorithms for the Low Hamming Weight Discrete Logarithm Problem. Mathematics of Computation\u00a071(237), 379\u2013391 (2002)","journal-title":"Mathematics of Computation"}],"container-title":["Lecture Notes in Computer Science","Cryptographic Hardware and Embedded Systems \u2013 CHES 2005"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11545262_4.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,17]],"date-time":"2020-11-17T20:18:43Z","timestamp":1605644323000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11545262_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005]]},"ISBN":["9783540284741","9783540319405"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/11545262_4","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2005]]}}}