{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T15:45:47Z","timestamp":1725551147719},"publisher-location":"Berlin, Heidelberg","reference-count":8,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540294986"},{"type":"electronic","value":"9783540322450"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005]]},"DOI":"10.1007\/11571155_14","type":"book-chapter","created":{"date-parts":[[2005,10,31]],"date-time":"2005-10-31T07:32:31Z","timestamp":1130743951000},"page":"170-179","source":"Crossref","is-referenced-by-count":0,"title":["New Computation Paradigm for Modular Exponentiation Using a Graph Model"],"prefix":"10.1007","author":[{"given":"Chi Seong","family":"Park","sequence":"first","affiliation":[]},{"given":"Mun-Kyu","family":"Lee","sequence":"additional","affiliation":[]},{"given":"Dong Kyue","family":"Kim","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"2","key":"14_CR1","doi-asserted-by":"publisher","first-page":"120","DOI":"10.1145\/359340.359342","volume":"21","author":"R.L. Rivest","year":"1978","unstructured":"Rivest, R.L., Shamir, A., Adleman, L.: A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM\u00a021(2), 120\u2013126 (1978)","journal-title":"Communications of the ACM"},{"issue":"4","key":"14_CR2","doi-asserted-by":"publisher","first-page":"469","DOI":"10.1109\/TIT.1985.1057074","volume":"31","author":"T. ElGamal","year":"1985","unstructured":"ElGamal, T.: A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Transactions on Information Theory\u00a031(4), 469\u2013472 (1985)","journal-title":"IEEE Transactions on Information Theory"},{"key":"14_CR3","unstructured":"National Institute of Standards and Technology. Digital Signature Standard, 186. FIPS Publication (1994)"},{"key":"14_CR4","first-page":"461","volume-title":"The art of computer programming: Seminumerical algorithms","author":"D.E. Knuth","year":"1981","unstructured":"Knuth, D.E.: The art of computer programming: Seminumerical algorithms, 2nd edn., vol.\u00a02, pp. 461\u2013485. Addison-Wesley, Reading (1981)","edition":"2"},{"key":"14_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"400","DOI":"10.1007\/0-387-34805-0_37","volume-title":"Advances in Cryptology - CRYPTO \u201989","author":"J. Bos","year":"1990","unstructured":"Bos, J., Coster, M.: Addition chain heuristics. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol.\u00a0435, pp. 400\u2013407. Springer, Heidelberg (1990)"},{"issue":"3","key":"14_CR6","doi-asserted-by":"publisher","first-page":"638","DOI":"10.1137\/0210047","volume":"10","author":"P. Downey","year":"1981","unstructured":"Downey, P., Leong, B., Sethi, R.: Computing sequences with addition chains. SIAM J. Comp.\u00a010(3), 638\u2013646 (1981)","journal-title":"SIAM J. Comp."},{"issue":"10","key":"14_CR7","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1016\/0898-1221(95)00153-P","volume":"30","author":"C.K. Ko\u00e7","year":"1995","unstructured":"Ko\u00e7, C.K.: Analysis of Sliding Window Techniques for Exponentiation. Computers and Mathematics with Application\u00a030(10), 17\u201324 (1995)","journal-title":"Computers and Mathematics with Application"},{"key":"14_CR8","first-page":"514","volume-title":"Introduction to algorithms","author":"T.H. Cormen","year":"1990","unstructured":"Cormen, T.H., Leiserson, C.E., Rivest, R.L.: Introduction to algorithms, pp. 514\u2013531. The MIT Press, Cambridge (1990)"}],"container-title":["Lecture Notes in Computer Science","Stochastic Algorithms: Foundations and Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11571155_14.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T06:40:31Z","timestamp":1619505631000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11571155_14"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005]]},"ISBN":["9783540294986","9783540322450"],"references-count":8,"URL":"https:\/\/doi.org\/10.1007\/11571155_14","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2005]]}}}