{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,24]],"date-time":"2026-04-24T03:19:29Z","timestamp":1777000769612,"version":"3.51.4"},"publisher-location":"Berlin, Heidelberg","reference-count":22,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540545088","type":"print"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/3-540-38424-3_32","type":"book-chapter","created":{"date-parts":[[2007,12,3]],"date-time":"2007-12-03T13:05:56Z","timestamp":1196687156000},"page":"437-455","source":"Crossref","is-referenced-by-count":269,"title":["How to Time-Stamp a Digital Document"],"prefix":"10.1007","author":[{"given":"Stuart","family":"Haber","sequence":"first","affiliation":[]},{"given":"W. Scott","family":"Stornetta","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"32_CR1","unstructured":"J. Alter. When photographs lie. Newsweek, pp. 44\u201345, July 30, 1990."},{"issue":"4","key":"32_CR2","doi-asserted-by":"publisher","first-page":"850","DOI":"10.1137\/0213053","volume":"13","author":"M. Blum","year":"1984","unstructured":"M. Blum and S. Micali. How to generate cryptographically strong sequences of pseudo-random bits. SIAM Journal on Computing, 13(4):850\u2013864, Nov. 1984.","journal-title":"SIAM Journal on Computing"},{"key":"32_CR3","series-title":"Lect Notes Comput Sci","volume-title":"Advances in Cryptology\u2014Crypto\u2019 90","author":"G. Brassard","year":"1991","unstructured":"G. Brassard and M. Yung. One-way group actions. In Advances in Cryptology\u2014Crypto\u2019 90, these proceedings. Lecture Notes in Computer Science, Springer-Verlag, Berlin, 1991."},{"key":"32_CR4","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"203","DOI":"10.1007\/3-540-39118-5_19","volume-title":"Advances in Cryptology\u2014Eurocrypt\u2019 87","author":"I. Damg\u00e5rd","year":"1988","unstructured":"I. Damg\u00e5rd. Collision-free hash functions and public-key signature schemes. In Advances in Cryptology\u2014Eurocrypt\u2019 87, pp. 203\u2013217. Lecture Notes in Computer Science, vol. 304, Springer-Verlag, Berlin, 1988."},{"key":"32_CR5","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"416","DOI":"10.1007\/0-387-34805-0_39","volume-title":"Advances in Cryptology\u2014Crypto\u2019 89","author":"I. Damg\u00e5rd","year":"1990","unstructured":"I. Damg\u00e5rd. A design principle for hash functions. In Advances in Cryptology\u2014Crypto\u2019 89 (ed. G. Brassard), pp. 416\u2013427. Lecture Notes in Computer Science, vol. 435, Springer-Verlag, Berlin, 1990."},{"key":"32_CR6","series-title":"Lect Notes Comput Sci","volume-title":"Advances in Cryptology\u2014Eurocrypt\u2019 90","author":"A. DeSantis","year":"1990","unstructured":"A. DeSantis and M. Yung. On the design of provably secure cryptographic hash functions. In Advances in Cryptology\u2014Eurocrypt\u2019 90. Lecture Notes in Computer Science, Springer-Verlag, Berlin, to appear."},{"key":"32_CR7","doi-asserted-by":"publisher","first-page":"644","DOI":"10.1109\/TIT.1976.1055638","volume":"IT-22","author":"W. Diffie","year":"1976","unstructured":"W. Diffie and M.E. Hellman. New directions in cryptography. IEEE Trans. on Inform. Theory, vol. IT-22, Nov. 1976, pp. 644\u2013654.","journal-title":"IEEE Trans. on Inform. Theory"},{"key":"32_CR8","unstructured":"Z. Galil, S. Haber, and M. Yung. Interactive public-key cryptosystems. Submitted for publication, 1990."},{"key":"32_CR9","first-page":"270","volume":"28","author":"S. Goldwasser","year":"1984","unstructured":"S. Goldwasser and S. Micali. Probabilistic encryption. JCSS, 28:270\u2013299, April 1984.","journal-title":"JCSS"},{"issue":"2","key":"32_CR10","doi-asserted-by":"publisher","first-page":"281","DOI":"10.1137\/0217017","volume":"17","author":"S. Goldwasser","year":"1988","unstructured":"S. Goldwasser, S. Micali, and R. Rivest. A secure digital signature scheme. SIAM Journal on Computing, 17(2):281\u2013308, 1988.","journal-title":"SIAM Journal on Computing"},{"key":"32_CR11","unstructured":"Andy Grundberg. Ask it no questions: The camera can lie. The New York Times, section 2, pp. 1, 29, August 12, 1990."},{"key":"32_CR12","first-page":"12","volume-title":"Proc. 21st STOC","author":"R. Impagliazzo","year":"1989","unstructured":"R. Impagliazzo, L. Levin, and M. Luby. Pseudorandom generation from one-way functions. In Proc. 21st STOC, pp. 12\u201324. ACM, New York, 1989."},{"key":"32_CR13","first-page":"230","volume-title":"Proc. 30th FOCS","author":"R. Impagliazzo","year":"1989","unstructured":"R. Impagliazzo and M. Luby. One-way functions are essential for complexity-based cryptography. In Proc. 30th FOCS, pp. 230\u2013235. IEEE, New York, 1989."},{"key":"32_CR14","first-page":"117","volume-title":"Writing the laboratory notebook","author":"H. M. Kanare","year":"1985","unstructured":"H. M. Kanare. Writing the laboratory notebook, p. 117. American Chemical Society, Washington, D.C., 1985."},{"key":"32_CR15","unstructured":"R.C. Merkle. Secrecy, authentication, and public-key systems. Ph.D. thesis, Stanford University, 1979."},{"key":"32_CR16","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"428","DOI":"10.1007\/0-387-34805-0_40","volume-title":"Advances in Cryptology\u2014Crypto\u2019 89","author":"R.C. Merkle","year":"1990","unstructured":"R.C. Merkle. One-way hash functions and DES. In Advances in Cryptology\u2014Crypto\u2019 89 (ed. G. Brassard), pp. 428\u2013446. Lecture Notes in Computer Science, vol. 435, Springer-Verlag, Berlin, 1990."},{"key":"32_CR17","first-page":"33","volume-title":"Proc. 21st STOC","author":"M. Naor","year":"1989","unstructured":"M. Naor and M. Yung. Universal one-way hash functions and their cryptographic applications. In Proc. 21st STOC, pp. 33\u201343. ACM, New York, 1989."},{"key":"32_CR18","unstructured":"M.O. Rabin. Digitalized signatures. In Foundations of Secure Computation (ed. R.A. DeMillo et al.), pp. 155\u2013168. Academic Press, 1978."},{"key":"32_CR19","series-title":"Lect Notes Comput Sci","volume-title":"Advances in Cryptology\u2014Crypto\u2019 90","author":"R. Rivest","year":"1991","unstructured":"R. Rivest. The MD4 message digest algorithm. In Advances in Cryptology\u2014Crypto\u2019 90, these proceedings. Lecture Notes in Computer Science, Springer-Verlag, Berlin, 1991."},{"key":"32_CR20","first-page":"387","volume-title":"Proc. 22nd STOC","author":"J. Rompel","year":"1990","unstructured":"J. Rompel. One-way functions are necessary and sufficient for secure signatures. In Proc. 22nd STOC, pp. 387\u2013394. ACM, New York, 1990."},{"key":"32_CR21","doi-asserted-by":"publisher","first-page":"50","DOI":"10.1002\/j.1538-7305.1951.tb01366.x","volume":"30","author":"C. Shannon","year":"1951","unstructured":"C. Shannon. Prediction and entropy of printed English. Bell System Technical Journal, vol. 30 pp. 50\u201364, 1951.","journal-title":"Bell System Technical Journal"},{"key":"32_CR22","first-page":"80","volume-title":"Proc. 23rd FOCS","author":"A.C. Yao","year":"1982","unstructured":"A.C. Yao. Theory and applications of trapdoor functions. In Proc. 23rd FOCS, pp. 80\u201391. IEEE, New York, 1982."}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology-CRYPT0\u2019 90"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-38424-3_32.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,28]],"date-time":"2021-04-28T01:20:15Z","timestamp":1619572815000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-38424-3_32"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540545088"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/3-540-38424-3_32","relation":{},"subject":[]}}