{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T11:39:52Z","timestamp":1725622792563},"publisher-location":"Berlin, Heidelberg","reference-count":10,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540472421"},{"type":"electronic","value":"9783540472438"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1007\/11902140_7","type":"book-chapter","created":{"date-parts":[[2006,10,26]],"date-time":"2006-10-26T13:35:29Z","timestamp":1161869729000},"page":"47-54","source":"Crossref","is-referenced-by-count":3,"title":["Heuristics for Minimum Brauer Chain Problem"],"prefix":"10.1007","author":[{"given":"Fatih","family":"Gelgi","sequence":"first","affiliation":[]},{"given":"Melih","family":"Onus","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"3","key":"7_CR1","doi-asserted-by":"publisher","first-page":"638","DOI":"10.1137\/0210047","volume":"10","author":"P.J. Downey","year":"1981","unstructured":"Downey, P.J., Leong, B.L., Sethi, R.: Computing sequences with addition chains. SIAM Journal on Computing\u00a010(3), 638\u2013646 (1981)","journal-title":"SIAM Journal on Computing"},{"issue":"6","key":"7_CR2","doi-asserted-by":"publisher","first-page":"644","DOI":"10.1109\/TIT.1976.1055638","volume":"IT-22","author":"W. Diffie","year":"1976","unstructured":"Diffie, W., Hellman, M.E.: New directions in cryptography. IEEE Transactions on Information Theory\u00a0IT-22(6), 644\u2013654 (1976)","journal-title":"IEEE Transactions on Information Theory"},{"key":"7_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"10","DOI":"10.1007\/3-540-39568-7_2","volume-title":"Advances in Cryptology","author":"T.E. Gamal","year":"1985","unstructured":"Gamal, T.E.: A public key cryptosystem and a signature scheme based on discrete logarithms. In: Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol.\u00a0196, pp. 10\u201318. Springer, Heidelberg (1985)"},{"issue":"1","key":"7_CR4","doi-asserted-by":"publisher","first-page":"96","DOI":"10.1145\/357980.358017","volume":"26","author":"R.L. Rivest","year":"1983","unstructured":"Rivest, R.L., Shamir, A., Adleman, L.: A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM\u00a026(1), 96\u201399 (1983)","journal-title":"Communications of the ACM"},{"key":"7_CR5","unstructured":"Bernstein, D.: Pippenger\u2019s exponentiation algorithm (2002), Available online at: \n                    \n                      http:\/\/cr.yp.to\/papers.html"},{"issue":"4","key":"7_CR6","doi-asserted-by":"publisher","first-page":"1247","DOI":"10.1137\/S0097539795295663","volume":"28","author":"E.G. Thurber","year":"1999","unstructured":"Thurber, E.G.: Efficient generation of minimal length addition chains. SIAM Journal on Computing\u00a028(4), 1247\u20131263 (1999)","journal-title":"SIAM Journal on Computing"},{"key":"7_CR7","volume-title":"The Art of Computer Programming: Seminumerical Algorithms","author":"D.E. Knuth","year":"1971","unstructured":"Knuth, D.E.: The Art of Computer Programming: Seminumerical Algorithms, 2nd edn., vol.\u00a02. Addison-Wesley, Reading (1971)","edition":"2"},{"key":"7_CR8","doi-asserted-by":"publisher","first-page":"736","DOI":"10.1090\/S0002-9904-1939-07068-7","volume":"45","author":"A. Brauer","year":"1939","unstructured":"Brauer, A.: On addition chains. Bulletin of the American Mathematical Society\u00a045, 736\u2013739 (1939)","journal-title":"Bulletin of the American Mathematical Society"},{"issue":"1","key":"7_CR9","doi-asserted-by":"publisher","first-page":"100","DOI":"10.1137\/0205008","volume":"5","author":"A.C.C. Yao","year":"1976","unstructured":"Yao, A.C.C.: On the evaluation of powers. SIAM Journal on Computing\u00a05(1), 100\u2013103 (1976)","journal-title":"SIAM Journal on Computing"},{"key":"7_CR10","doi-asserted-by":"publisher","first-page":"230","DOI":"10.1137\/0209022","volume":"9","author":"N. Pippenger","year":"1980","unstructured":"Pippenger, N.: On the evaluation of powers and monomials. SIAM Journal on Computing\u00a09, 230\u2013250 (1980)","journal-title":"SIAM Journal on Computing"}],"container-title":["Lecture Notes in Computer Science","Computer and Information Sciences \u2013 ISCIS 2006"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11902140_7.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T07:37:28Z","timestamp":1619509048000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11902140_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"ISBN":["9783540472421","9783540472438"],"references-count":10,"URL":"https:\/\/doi.org\/10.1007\/11902140_7","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2006]]}}}