{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T13:47:25Z","timestamp":1725544045160},"publisher-location":"Berlin, Heidelberg","reference-count":22,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540346401"},{"type":"electronic","value":"9783540346425"}],"license":[{"start":{"date-parts":[[2006,1,1]],"date-time":"2006-01-01T00:00:00Z","timestamp":1136073600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1007\/11766155_34","type":"book-chapter","created":{"date-parts":[[2006,5,31]],"date-time":"2006-05-31T19:35:00Z","timestamp":1149104100000},"page":"481-493","source":"Crossref","is-referenced-by-count":2,"title":["Quantum Algorithm for Solving the Discrete Logarithm Problem in the Class Group of an Imaginary Quadratic Field and Security Comparison of Current Cryptosystems at the Beginning of Quantum Computer Age"],"prefix":"10.1007","author":[{"given":"Arthur","family":"Schmidt","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"34_CR1","doi-asserted-by":"crossref","unstructured":"Beauregard, S.: Circuit for Shor\u2019s algorithm using 2n+3 qubits, http:\/\/xxx.lanl.gov\/abs\/quant-ph\/0205095","DOI":"10.26421\/QIC3.2-8"},{"key":"34_CR2","doi-asserted-by":"crossref","unstructured":"Bennett, C.H.: Logical Reversibility of Computation. IBM Journal of Research and Development, 525\u2013532 (November 1977)","DOI":"10.1147\/rd.176.0525"},{"issue":"2","key":"34_CR3","doi-asserted-by":"publisher","first-page":"107","DOI":"10.1007\/BF02351719","volume":"1","author":"J. Buchmann","year":"1988","unstructured":"Buchmann, J., Williams, H.C.: A Key-Exchange System Based on Imaginary Quadratic Fields. Journal of Cryptology\u00a01(2), 107\u2013118 (1988)","journal-title":"Journal of Cryptology"},{"key":"34_CR4","series-title":"London Mathematical Society Lecture Note Series","doi-asserted-by":"publisher","first-page":"9","DOI":"10.1017\/CBO9781107325838.003","volume-title":"Number Theory and Cryptography","author":"J. Buchmann","year":"1990","unstructured":"Buchmann, J., Williams, H.C.: Quadratic Fields and Cryptography. In: Loxton, J.H. (ed.) Number Theory and Cryptography. London Mathematical Society Lecture Note Series, vol.\u00a0154, pp. 9\u201325. Cambridge University Press, Cambridge (1990)"},{"key":"34_CR5","doi-asserted-by":"publisher","first-page":"143","DOI":"10.1038\/30181","volume":"393","author":"I. Chuang","year":"1998","unstructured":"Chuang, I., Vandersypen, L., Zhou, X., Leung, D., Lloyd, S.: Experimental Realization of a Quantum Algorithm. Nature\u00a0393, 143\u2013146 (1998)","journal-title":"Nature"},{"key":"34_CR6","unstructured":"Draper, T.G.: Addition on a Quantum Computer, http:\/\/xxx.lanl.gov\/abs\/quant-ph\/0008033"},{"key":"34_CR7","unstructured":"GNU multiple precision arithmetic library 4.1.4. http:\/\/swox.com\/gmp\/"},{"key":"34_CR8","unstructured":"Griffiths, R.B., Niu, C.-S.: Semiclassical Fourier Transform for Quantum Computation, http:\/\/xxx.lanl.gov\/abs\/quant-ph\/9511007"},{"key":"34_CR9","unstructured":"Hamdy, S.: \u00dcber die Sicherheit und Effizienz kryptografischer Verfahren mit Klassengruppen imagin\u00e4r-quadratischer Zahlk\u00f6rper. PhD thesis, Technische Universit\u00e4t Darmstadt, Fachbereich Informatik, Darmstadt, Germany (2002), http:\/\/www.cdc.informatik.tu-darmstadt.de\/reports\/reports\/hamdy.diss.pdf"},{"key":"34_CR10","doi-asserted-by":"publisher","first-page":"643","DOI":"10.1038\/nature04279","volume":"438","author":"H. H\u00effner","year":"2005","unstructured":"H\u00effner, H., H\u00efsel, W., Roos, C.F., Benhelm, J., Chek al kar, D., Chwalla, M., K\u00efber, T., Rapol, U.D., Riebe, M., Schmidt, P.O., Becher, C., Ghne, O., Dr, W., Blatt., R.: Scalable Multiparticle Entanglement of Trapped Ions p643. Nature\u00a0438, 643\u2013646 (2005)","journal-title":"Nature"},{"key":"34_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"234","DOI":"10.1007\/3-540-44448-3_18","volume-title":"Advances in Cryptology - ASIACRYPT 2000","author":"S. Hamdy","year":"2000","unstructured":"Hamdy, S., M\u00f6ller, B.: Security of Cryptosystems Based on Class Groups of Imaginary Quadratic Orders. In: Okamoto, T. (ed.) ASIACRYPT 2000. LNCS, vol.\u00a01976, pp. 234\u2013247. Springer, Heidelberg (2000)"},{"key":"34_CR12","unstructured":"Kitaev, A.: Quantum Measurements and the Abelian Stabilizer Problem. Electronic Colloquium on Computational Complexity (ECCC)\u00a03(3) (1996)"},{"key":"34_CR13","unstructured":"Kunihiro, N.: Practical Running Time of Factoring by Quantum Circuits. In: ERATO Workshop on Quantum Information Science 2003 (EQIS 2003) (2003)"},{"key":"34_CR14","unstructured":"LiDIA \u2014 A C++ Library For Computational Number Theory, http:\/\/www.informatik.tu-darmstadt.de\/TI\/LiDIA\/"},{"issue":"4","key":"34_CR15","doi-asserted-by":"publisher","first-page":"255","DOI":"10.1007\/s00145-001-0009-4","volume":"14","author":"A.K. Lenstra","year":"2001","unstructured":"Lenstra, A.K., Verheul, E.R.: Selecting Cryptographic Key Sizes. Journal of Cryptology\u00a014(4), 255\u2013293 (2001)","journal-title":"Journal of Cryptology"},{"key":"34_CR16","volume-title":"Quantum Computation and Quantum Information","author":"M.A. Nielsen","year":"2000","unstructured":"Nielsen, M.A., Chuang, I.L.: Quantum Computation and Quantum Information. Cambridge University Press, Cambridge (2000)"},{"key":"34_CR17","unstructured":"NTL \u2013 a library for doing number theory. version 5.4. http:\/\/shoup.net\/ntl\/"},{"key":"34_CR18","unstructured":"Proos, J., Zalka, C.: Shor\u2019s Discrete Logarithm Quantum Algorithm for Elliptic Curves, http:\/\/xxx.lanl.gov\/abs\/quant-ph\/0301141"},{"key":"34_CR19","doi-asserted-by":"crossref","unstructured":"Shor, P.W.: Algorithms for Quantum Computation: Discrete Logarithms and Factoring. In: IEEE Symposium on Foundations of Computer Science, pp. 124\u2013134 (1994)","DOI":"10.1109\/SFCS.1994.365700"},{"key":"34_CR20","unstructured":"Vollmer, U.: Invariant and Discrete Logarithm Computation in Quadratic Orders. PhD thesis, Technische Universit\u00e4t Darmstadt, Fachbereich Informatik (2003), http:\/\/elib.tu-darmstadt.de\/diss\/000494\/"},{"key":"34_CR21","doi-asserted-by":"publisher","first-page":"5452","DOI":"10.1103\/PhysRevLett.85.5452","volume":"85","author":"L.M.K. Vandersypen","year":"2000","unstructured":"Vandersypen, L.M.K., Steffen, M., Breyta, G., Yannoni, C.S., Cleve, R., Chuang, I.L.: Experimental Realization of an Order-Finding Algorithm with an NMR Quantum Computer. Physical Review Letters\u00a085, 5452\u20135455 (2000)","journal-title":"Physical Review Letters"},{"key":"34_CR22","doi-asserted-by":"publisher","first-page":"883","DOI":"10.1038\/414883a","volume":"414","author":"L.M.K. Vandersypen","year":"2001","unstructured":"Vandersypen, L.M.K., Steffen, M., Breyta, G., Yannoni, C.S., Sherwood, M.H., Chuang, I.L.: Experimental Realization of Shor\u2019s Quantum Factoring Algorithm using Nuclear Magnetic Resonance. Nature\u00a0414, 883\u2013887 (2001)","journal-title":"Nature"}],"container-title":["Lecture Notes in Computer Science","Emerging Trends in Information and Communication Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11766155_34","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,7,27]],"date-time":"2021-07-27T22:15:13Z","timestamp":1627424113000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11766155_34"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"ISBN":["9783540346401","9783540346425"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/11766155_34","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2006]]}}}