{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,18]],"date-time":"2025-12-18T13:48:36Z","timestamp":1766065716774},"publisher-location":"Berlin, Heidelberg","reference-count":18,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540497677"},{"type":"electronic","value":"9783540497691"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1007\/11941378_25","type":"book-chapter","created":{"date-parts":[[2006,11,27]],"date-time":"2006-11-27T13:20:35Z","timestamp":1164633635000},"page":"349-363","source":"Crossref","is-referenced-by-count":57,"title":["CMSS \u2013 An Improved Merkle Signature Scheme"],"prefix":"10.1007","author":[{"given":"Johannes","family":"Buchmann","sequence":"first","affiliation":[]},{"given":"Luis Carlos Coronado","family":"Garc\u00eda","sequence":"additional","affiliation":[]},{"given":"Erik","family":"Dahmen","sequence":"additional","affiliation":[]},{"given":"Martin","family":"D\u00f6ring","sequence":"additional","affiliation":[]},{"given":"Elena","family":"Klintsevich","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"25_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"431","DOI":"10.1007\/3-540-48405-1_28","volume-title":"Advances in Cryptology - CRYPTO \u201999","author":"M. Bellare","year":"1999","unstructured":"Bellare, M., Miner, S.: A Forward-Secure Digital Signature Scheme. In: Wiener, M.J. (ed.) CRYPTO 1999. LNCS, vol.\u00a01666, pp. 431\u2013448. Springer, Heidelberg (1999)"},{"key":"25_CR2","unstructured":"Coronado Garc\u00eda, L.C.: On the security and the efficiency of the Merkle signature scheme. Technical Report 2005\/192, Cryptology ePrint Archive (2005), Available at: \n                    \n                      http:\/\/eprint.iacr.org\/2005\/192\/"},{"key":"25_CR3","unstructured":"Coronado Garc\u00eda, L.C.: Provably Secure and Practical Signature Schemes. PhD thesis, Computer Science Departement, Technical University of Darmstadt (2005), Available at: \n                    \n                      http:\/\/elib.tu-darmstadt.de\/diss\/000642\/"},{"issue":"6","key":"25_CR4","doi-asserted-by":"publisher","first-page":"644","DOI":"10.1109\/TIT.1976.1055638","volume":"IT-22","author":"W. Diffie","year":"1976","unstructured":"Diffie, W., Hellman, M.: New directions in cryptography. IEEE Transactions on Information Theory\u00a0IT-22(6), 644\u2013654 (1976)","journal-title":"IEEE Transactions on Information Theory"},{"key":"25_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"96","DOI":"10.1007\/11586821_8","volume-title":"Cryptography and Coding","author":"C. Dods","year":"2005","unstructured":"Dods, C., Smart, N.P., Stam, M.: Hash Based Digital Signature Schemes. In: Smart, N.P. (ed.) Cryptography and Coding 2005. LNCS, vol.\u00a03796, pp. 96\u2013115. Springer, Heidelberg (2005)"},{"key":"25_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"10","DOI":"10.1007\/3-540-39568-7_2","volume-title":"Advances in Cryptology","author":"T. Elgamal","year":"1985","unstructured":"Elgamal, T.: A Public Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms. In: Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol.\u00a0196, pp. 10\u201318. Springer, Heidelberg (1985)"},{"key":"25_CR7","unstructured":"The FlexiProvider group at Technische Universit\u00e4t Darmstadt. FlexiProvider, an open source Java Cryptographic Service Provider (2001-2006), Available at: \n                    \n                      http:\/\/www.flexiprovider.de\/"},{"key":"25_CR8","unstructured":"The FlexiPKI research group at Technische Universit\u00e4t Darmstadt. The FlexiS\/MIME Outlook Plugin (2003), Available at: \n                    \n                      http:\/\/www.informatik.tu-darmstadt.de\/TI\/FlexiPKI\/FlexiSMIME\/FlexiSMIME.html"},{"key":"25_CR9","unstructured":"International Telecommunication Union. X.680: Information technology \u2014 Abstract Syntax Notation One (ASN.1): Specification of basic notation (2002), Available at: \n                    \n                      http:\/\/www.itu.int\/rec\/T-REC-X.680\/"},{"key":"25_CR10","unstructured":"Sun Microsystems. The Java Cryptography Architecture API Specification & Reference (2002), Available at: \n                    \n                      http:\/\/java.sun.com\/j2se\/1.4.2\/docs\/guide\/security\/CryptoSpec.html"},{"key":"25_CR11","unstructured":"Sun Microsystems. The Java Cryptography Extension (JCE) Reference Guide (2002), Available at: \n                    \n                      http:\/\/java.sun.com\/j2se\/1.4.2\/docs\/guide\/security\/jce\/JCERefGuide.html"},{"key":"25_CR12","unstructured":"Johnson, D., Menezes, A.: The Elliptic Curve Digital Signature Algorithm (ECDSA). Technical Report CORR 99-34, University of Waterloo (1999), Available at: \n                    \n                      http:\/\/www.cacr.math.uwaterloo.ca"},{"key":"25_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"218","DOI":"10.1007\/0-387-34805-0_21","volume-title":"Advances in Cryptology - CRYPTO 1989","author":"R. Merkle","year":"1990","unstructured":"Merkle, R.: A certified digital signature. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol.\u00a0435, pp. 218\u2013238. Springer, Heidelberg (1990)"},{"key":"25_CR14","doi-asserted-by":"publisher","DOI":"10.1201\/9781439821916","volume-title":"Handbook of applied cryptography","author":"A.J. Menezes","year":"1996","unstructured":"Menezes, A.J., van Oorschot, P.C., Vanstone, S.A.: Handbook of applied cryptography. CRC Press, Boca Raton, Florida (1996), Available at: \n                    \n                      http:\/\/cacr.math.uwaterloo.ca\/hac\/"},{"key":"25_CR15","unstructured":"Naor, D., Shenhav, A., Wool, A.: One-Time Signatures Revisited: Have They Become Practical? Technical Report 2005\/442, Cryptology ePrint Archive (2005), Available at: \n                    \n                      http:\/\/eprint.iacr.org\/2005\/442\/"},{"issue":"2","key":"25_CR16","doi-asserted-by":"publisher","first-page":"120","DOI":"10.1145\/359340.359342","volume":"21","author":"R.L. Rivest","year":"1978","unstructured":"Rivest, R.L., Shamir, A., Adleman, L.: A Method for Obtaining Digital Signatures and Public-Key Cryptosystems. Communications of the ACM\u00a021(2), 120\u2013126 (1978)","journal-title":"Communications of the ACM"},{"key":"25_CR17","doi-asserted-by":"publisher","first-page":"124","DOI":"10.1109\/SFCS.1994.365700","volume-title":"Proceedings of the 35th Annual IEEE Symposium on Foundations of Computer Science (FOCS 1994)","author":"P.W. Shor","year":"1994","unstructured":"Shor, P.W.: Algorithms for Quantum Computation: Discrete Logarithms and Factoring. In: Proceedings of the 35th Annual IEEE Symposium on Foundations of Computer Science (FOCS 1994), pp. 124\u2013134. IEEE Computer Society Press, Los Alamitos (1994)"},{"key":"25_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"541","DOI":"10.1007\/978-3-540-24676-3_32","volume-title":"Advances in Cryptology - EUROCRYPT 2004","author":"M. Szydlo","year":"2004","unstructured":"Szydlo, M.: Merkle Tree Traversal in Log Space and Time. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol.\u00a03027, pp. 541\u2013554. Springer, Heidelberg (2004) (preprint version), Available at: \n                    \n                      http:\/\/szydlo.com\/"}],"container-title":["Lecture Notes in Computer Science","Progress in Cryptology - INDOCRYPT 2006"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11941378_25.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T07:50:25Z","timestamp":1619509825000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11941378_25"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"ISBN":["9783540497677","9783540497691"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/11941378_25","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2006]]}}}