{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T00:37:26Z","timestamp":1725496646181},"publisher-location":"Berlin, Heidelberg","reference-count":6,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540545088"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/3-540-38424-3_36","type":"book-chapter","created":{"date-parts":[[2007,12,3]],"date-time":"2007-12-03T08:05:56Z","timestamp":1196669156000},"page":"515-529","source":"Crossref","is-referenced-by-count":1,"title":["Fast Checkers for Cryptography"],"prefix":"10.1007","author":[{"given":"Kireeti","family":"Kompella","sequence":"first","affiliation":[]},{"given":"Leonard","family":"Adleman","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"36_CR1","unstructured":"Leonard Adleman and Kireeti Kompella, Self-Checking RSA Programs, abstract submitted to Advances in Cryptology (CRYPTO 89)."},{"key":"36_CR2","unstructured":"Manuel Blum, Designing Programs to Check Their Work, Technical Report, ISRI, UC Berkeley, Nov. 1988."},{"key":"36_CR3","doi-asserted-by":"crossref","unstructured":"Manuel Blum, Michael Luby, and Ronitt Rubinfeld, Self-Testing\/Correcting with Applications to Numerical Problems, Proc. of the 22nd Annual ACM Symposium on Theory of Computing, 1990, pp. 73\u201383.","DOI":"10.1145\/100216.100225"},{"key":"36_CR4","doi-asserted-by":"publisher","first-page":"644","DOI":"10.1109\/TIT.1976.1055638","volume":"IT-22","author":"W. Diffie","year":"1976","unstructured":"Walt Diffie and Martin Hellman, New Directions in Cryptography, IEEE Transcations on Information Theory, vol. IT-22, 1976, pp. 644\u2013654.","journal-title":"IEEE Transcations on Information Theory"},{"issue":"2","key":"36_CR5","doi-asserted-by":"publisher","first-page":"120","DOI":"10.1145\/359340.359342","volume":"21","author":"R. Rivest","year":"1978","unstructured":"Ron Rivest, Adi Shamir, and Leonard Adleman, A Method for Obtaining Digital Signatures and Public-Key Cryptosystems, Communications of the ACM, vol. 21, no. 2, February 1978, pp. 120\u2013126.","journal-title":"Communications of the ACM"},{"key":"36_CR6","unstructured":"Ronitt Rubinfeld, private communication."}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology-CRYPT0\u2019 90"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-38424-3_36.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T21:20:16Z","timestamp":1619558416000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-38424-3_36"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540545088"],"references-count":6,"URL":"https:\/\/doi.org\/10.1007\/3-540-38424-3_36","relation":{},"subject":[]}}