{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T00:37:35Z","timestamp":1725496655531},"publisher-location":"Berlin, Heidelberg","reference-count":11,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540545088"},{"type":"electronic","value":"9783540384243"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1991]]},"DOI":"10.1007\/3-540-38424-3_35","type":"book-chapter","created":{"date-parts":[[2007,12,3]],"date-time":"2007-12-03T08:05:56Z","timestamp":1196669156000},"page":"503-513","source":"Crossref","is-referenced-by-count":5,"title":["CORSAIR: A Smart Card for Public Key Cryptosystems"],"prefix":"10.1007","author":[{"given":"Dominique","family":"de Waleffe","sequence":"first","affiliation":[]},{"given":"Jean-Jacques","family":"Quisquater","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2001,5,18]]},"reference":[{"key":"35_CR1","unstructured":"J.-J. Quisquater, \u201cFast modular exponentiation without division\u201d, Rump session of EUROCRYPT\u2019 90."},{"key":"35_CR2","unstructured":"J.-J. Quisquater, L. Guillou, \u201cDes proc\u00e9d\u00e9s d\u2019authentification bas\u00e9s sur une publication de probl\u00e8mes complexes et personnalis\u00e9s dont les solutions maintenues secr\u00e8tes constitutent autant d\u2019accr\u00e9ditations\u201d, SECURICOM 89, Paris, April 1989."},{"key":"35_CR3","unstructured":"D. Denning, \u201cCryptography and Data Security\u201d, Addison-Wesley Publishing Company, 1985."},{"issue":"2","key":"35_CR4","doi-asserted-by":"publisher","first-page":"120","DOI":"10.1145\/359340.359342","volume":"21","author":"R. Rivest","year":"1978","unstructured":"R. Rivest, A. Shamir, L. Adleman, \u201cA method for obtaining digital signatures and public-key cryptosystems\u201d, C. ACM, Vol. 21, No. 2, pp. 120\u2013126, 1978.","journal-title":"C. ACM"},{"issue":"2","key":"35_CR5","doi-asserted-by":"publisher","first-page":"120","DOI":"10.1038\/scientificamerican0877-120","volume":"237","author":"M. Gardner","year":"1977","unstructured":"M. Gardner, \u201cA new kind of cipher that would take millions of years to break\u201d, Scientific American, Vol. 237, No. 2, pp. 120\u2013124, Aug. 1977.","journal-title":"Scientific American"},{"key":"35_CR6","unstructured":"R. Bright, \u201cSmart cards. Principles, practice, applications\u201d, Ellis Horwood Limited, 1988."},{"key":"35_CR7","doi-asserted-by":"publisher","first-page":"644","DOI":"10.1109\/TIT.1976.1055638","volume":"IT-22","author":"W. Diffie","year":"1976","unstructured":"W. Diffie, M. Hellman, \u201cNew directions in cryptography\u201d, IEEE Trans. Informat. Theory, Vol. IT-22, pp. 644\u2013654, Nov. 1976.","journal-title":"IEEE Trans. Informat. Theory"},{"key":"35_CR8","unstructured":"J.-J. Quisquater, D. de Waleffe and J.-P. Bournas, \u201cCORSAIR: A chip card with fast RSA capability\u201d, Proceedings of Smart Card 2000, Amsterdam, 1989, to appear."},{"key":"35_CR9","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"186","DOI":"10.1007\/3-540-47721-7_12","volume-title":"Proc. of CRYPTO\u2019 86","author":"A. Fiat","year":"1987","unstructured":"A. Fiat, A. Shamir, \u201cHow to prove yourself: practical solutions to identification and signature problems\u201d, Proc. of CRYPTO\u2019 86, Lecture notes in Computer Science, Springer Verlag, Vol. 263, pp. 186\u2013194, 1987."},{"key":"35_CR10","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"123","DOI":"10.1007\/3-540-45961-8_11","volume-title":"Proc. EUROCRYPT\u2019 88","author":"L. C. Guillou","year":"1988","unstructured":"L. C. Guillou, J.-J. Quisquater, \u201cA practical zero-knowledge protocol fitted to security microprocessor minimizing both transmission and memory\u201d, Proc. EUROCRYPT\u2019 88, Lecture notes in Computer Science, Springer Verlag, Vol. 330, pp. 123\u2013128."},{"key":"35_CR11","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"464","DOI":"10.1007\/3-540-47721-7_35","volume-title":"Proc. of CRYPTO\u2019 86","author":"L. C. Guillou","year":"1987","unstructured":"L. C. Guillou, M. Ugon, \u201cSmart Card: a highly reliable and portable security device\u201d, Proc. of CRYPTO\u2019 86, Lecture notes in Computer Science, Springer Verlag, Vol. 263, pp. 464\u2013489, 1987."}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology-CRYPT0\u2019 90"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-38424-3_35","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,2,26]],"date-time":"2019-02-26T00:27:23Z","timestamp":1551140843000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-38424-3_35"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1991]]},"ISBN":["9783540545088","9783540384243"],"references-count":11,"URL":"https:\/\/doi.org\/10.1007\/3-540-38424-3_35","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[1991]]}}}