{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,22]],"date-time":"2025-03-22T09:05:03Z","timestamp":1742634303030},"publisher-location":"Berlin, Heidelberg","reference-count":34,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540545088"},{"type":"electronic","value":"9783540384243"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1991]]},"DOI":"10.1007\/3-540-38424-3_40","type":"book-chapter","created":{"date-parts":[[2007,12,3]],"date-time":"2007-12-03T13:05:56Z","timestamp":1196687156000},"page":"577-581","source":"Crossref","is-referenced-by-count":6,"title":["A Comparison of Practical Public-Key Cryptosystems based on Integer Factorization and Discrete Logarithms"],"prefix":"10.1007","author":[{"given":"Paul C.","family":"van Oorschot","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2001,5,18]]},"reference":[{"key":"40_CR1","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1007\/0-387-34799-2_7","volume-title":"Advances in Cryptology-Crypto 88","author":"E. Bach","year":"1990","unstructured":"E. Bach, \u201cIntractable problems in number theory\u201d, Advances in Cryptology-Crypto 88, S. Goldwasser (ed), Lecture Notes in Computer Science 403, Springer-Verlag (1990), 77\u201393."},{"key":"40_CR2","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"186","DOI":"10.1007\/0-387-34805-0_18","volume-title":"Advances in Cryptology-Crypto 89","author":"A. Bender","year":"1990","unstructured":"A. Bender and G. Castagnoli, \u201cOn the implementation of elliptic curve cryptosystems\u201d, Advances in Cryptology-Crypto 89, G. Brassard (ed.), Lecture Notes in Computer Science 435, Springer-Verlag (1990), 186\u2013192."},{"issue":"2","key":"40_CR3","doi-asserted-by":"publisher","first-page":"276","DOI":"10.1137\/0605029","volume":"5","author":"I.F. Blake","year":"1984","unstructured":"I.F. Blake, R. Fuji-Hara, R.C. Mullin, and S.A. Vanstone, \u201cComputing logarithms in finite fields of characteristic two\u201d, SIAM J. Alg. Disc. Meth. 5(2), June 1984, 276\u2013285.","journal-title":"SIAM J. Alg. Disc. Meth."},{"key":"40_CR4","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"368","DOI":"10.1007\/0-387-34805-0_34","volume-title":"Advances in Cryptology-Crypto 89","author":"E.F. Brickell","year":"1990","unstructured":"E.F. Brickell, \u201cA survey of hardware implementations of RSA (abstract)\u201d, Advances in Cryptology-Crypto 89, G. Brassard (ed.), Lecture Notes in Computer Science 435, Springer-Verlag (1990), 368\u2013370."},{"key":"40_CR5","doi-asserted-by":"publisher","first-page":"273","DOI":"10.1007\/BF00154339","volume":"1","author":"T.T. Caron","year":"1988","unstructured":"T.T. Caron and R.D. Silverman, \u201cParallel Implementation of the quadratic sieve\u201d, J. Supercomput. 1 (1988), 273\u2013290.","journal-title":"J. Supercomput."},{"issue":"4","key":"40_CR6","doi-asserted-by":"publisher","first-page":"587","DOI":"10.1109\/TIT.1984.1056941","volume":"IT-30","author":"D. Coppersmith","year":"1984","unstructured":"D. Coppersmith, \u201cFast evaluation of logarithms in fields of characteristic two\u201d, IEEE Transactions on Information Theory IT-30(4), July 1984, 587\u2013594.","journal-title":"IEEE Transactions on Information Theory"},{"issue":"1","key":"40_CR7","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/BF01840433","volume":"1","author":"D. Coppersmith","year":"1986","unstructured":"D. Coppersmith, A.M. Odlyzko, and R. Schroeppel, \u201cDiscrete logarithms in GF(p)\u201d, Algorithmica 1(1), 1986,1\u201315.","journal-title":"Algorithmica"},{"key":"40_CR8","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"183","DOI":"10.1007\/3-540-39757-4_18","volume-title":"Advances in Cryptology-Eurocrypt 84","author":"J.A. Davis","year":"1985","unstructured":"J.A. Davis, D.B. Holdridge, and G.J. Simmons, \u201cStatus report on factoring\u201d, Advances in Cryptology-Eurocrypt 84, T. Beth, N. Cot, I. Ingemarsson (eds.), Lecture Notes in Computer Science 209, Springer-Verlag (1985), 183\u2013215."},{"issue":"6","key":"40_CR9","doi-asserted-by":"publisher","first-page":"644","DOI":"10.1109\/TIT.1976.1055638","volume":"IT-22","author":"W. Diffie","year":"1976","unstructured":"W. Diffie and M. Hellman, \u201cNew directions in cryptography\u201d, IEEE Transactions on Information Theory IT-22(6), Nov. 1976,644\u2013654.","journal-title":"IEEE Transactions on Information Theory"},{"key":"40_CR10","unstructured":"S.R. Dusse and B.S. Kaliski, Jr., \u201cA cryptographic library for the Motorola DSP56000\u201d, Advances in Cryptology-Eurocrypt 90, I. Damgard (ed.), to appear."},{"issue":"4","key":"40_CR11","doi-asserted-by":"publisher","first-page":"469","DOI":"10.1109\/TIT.1985.1057074","volume":"IT-31","author":"T. EIGamal","year":"1985","unstructured":"T. EIGamal, \u201cA public key cryptosystem and a signature scheme based on discrete logarithms\u201d, IEEE Transactions on Information Theory IT-31(4), July 1985, 469\u2013472.","journal-title":"IEEE Transactions on Information Theory"},{"key":"40_CR12","doi-asserted-by":"publisher","first-page":"203","DOI":"10.1090\/S0025-5718-1987-0866109-5","volume":"48","author":"N. Koblitz","year":"1987","unstructured":"N. Koblitz, \u201cElliptic curve cryptosystems\u201d, Math. Comp. 48 (1987), 203\u2013209.","journal-title":"Math. Comp."},{"key":"40_CR13","unstructured":"N. Koblitz, \u201cConstructing elliptic curve cryptosystems in characteristic 2\u201d, Advances in Cryptology-Crypto 90, S.A. Vanstone (ed.), to appear."},{"key":"40_CR14","unstructured":"B.A. LaMacchia and A.M. Odlyzko, \u201cSolving large sparse linear systems over finite fields\u201d, Advances in Cryptology-Crypto 90, S.A. Vanstone (ed.), to appear."},{"key":"40_CR15","unstructured":"B.A. LaMacchia and A.M. Odlyzko, \u201cComputation of discrete logarithms in prime fields\u201d, Advances in Cryptology-Crypto 90, S.A. Vanstone (ed.), to appear."},{"key":"40_CR16","doi-asserted-by":"crossref","unstructured":"A.K. Lenstra and H.W. Lenstra, Jr., \u201cAlgorithms in number theory\u201d, in Handbook of theoretical computer science, A. Meyer, M. Nivat, M. Paterson, D. Perrin (eds.), North Holland, Amsterdam, to appear.","DOI":"10.1016\/B978-0-444-88071-0.50017-5"},{"key":"40_CR17","doi-asserted-by":"crossref","unstructured":"A.K. Lenstra, H.W. Lenstra, Jr., M.S. Manasse and J.M. Pollard, \u201cThe number field sieve\u201d, Proc. 22 nd ACM Symp. Theory of Computing (1990), 564\u2013572.","DOI":"10.1145\/100216.100295"},{"key":"40_CR18","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"355","DOI":"10.1007\/3-540-46885-4_35","volume-title":"Advances in Cryptology-Eurocrypt89","author":"A.K. Lenstra","year":"1990","unstructured":"A.K. Lenstra and M.S. Manasse, \u201cFactoring by electronic mail\u201d, Advances in Cryptology-Eurocrypt89, J.-J. Quisquater and J. Vandewalle (eds.), Lecture Notes in Computer Science 434, Springer-Verlag (1990), 355\u2013371."},{"key":"40_CR19","unstructured":"A.K. Lenstra and M.S. Manasse, \u201cFactoring with two large primes\u201d, Advances in Cryptology-Eurocrypt 90, I. Damgard (ed.), to appear."},{"key":"40_CR20","doi-asserted-by":"publisher","first-page":"649","DOI":"10.2307\/1971363","volume":"126","author":"H.W. Lenstra Jr.","year":"1987","unstructured":"H.W. Lenstra, Jr., \u201cFactoring with elliptic curves\u201d, Ann. of Math. 126 (1987), 649\u2013673.","journal-title":"Ann. of Math."},{"key":"40_CR21","doi-asserted-by":"crossref","unstructured":"K.S. McCurley, \u201cThe discrete logarithm problem\u201d, in Cryptography and Computational Number Theory, C. Pomerance (ed.), Proc. Symp. Appl. Math., Amer. Math. Soc. (1990), to appear.","DOI":"10.1090\/psapm\/042\/1095551"},{"key":"40_CR22","series-title":"Lect Notes Comput Sci","first-page":"2","volume-title":"Advances in Cryptology-Auscrypt 90","author":"A. Menezes","year":"1990","unstructured":"A. Menezes and S. Vanstone, \u201cThe implementation of elliptic curve cryptosystems\u201d, Advances in Cryptology-Auscrypt 90, J. Seberry and J. Pieprzyk (eds.), Lecture Notes in Computer Science 453, Springer-Verlag (1990), 2\u201313."},{"key":"40_CR23","doi-asserted-by":"crossref","unstructured":"A. Menezes, S. Vanstone and T. Okamoto, \u201cReducing elliptic curve logarithms to logarithms in a finite field\u201d, presented at Crypto 90; to appear in Proc. 23rd ACM Symp. Theory of Computing (1991)","DOI":"10.1145\/103418.103434"},{"key":"40_CR24","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"417","DOI":"10.1007\/3-540-39799-X_31","volume-title":"Advances in Cryptology-Crypto 85","author":"V. Miller","year":"1986","unstructured":"V. Miller, \u201cUses of elliptic curves in cryptography\u201d, Advances in Cryptology-Crypto 85, H. Williams (ed.), Lecture Notes in Computer Science 218, Springer-Verlag (1986), 417\u2013426."},{"key":"40_CR25","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"224","DOI":"10.1007\/3-540-39757-4_20","volume-title":"Advances in Cryptology-Eurocrypt 84","author":"A.M. Odlyzko","year":"1985","unstructured":"A.M. Odlyzko, \u201cDiscrete logarithms in finite fields and their cryptographic significance\u201d, Advances in Cryptology-Eurocrypt 84, T. Beth, N. Cot, I. Ingemarsson (eds.), Lecture Notes in Computer Science 209, Springer-Verlag (1985), 224\u2013314."},{"key":"40_CR26","unstructured":"C. Pomerance, \u201cAnalysis and comparison of some integer factoring algorithms\u201d, in Computational Methods in Number Theory, H.W. Lenstra, Jr. and R. Tijdeman (eds.), Math. Centrum Tract 154,1982, 89\u2013139."},{"issue":"2","key":"40_CR27","doi-asserted-by":"publisher","first-page":"387","DOI":"10.1137\/0217023","volume":"17","author":"C. Pomerance","year":"1988","unstructured":"C. Pomerance, J.W. Smith and R. Tuler, \u201cA pipeline architecture for factoring large integers with the quadratic sieve algorithm\u201d, SIAM J. Computing 17(2), Apr. 1988, 387\u2013403.","journal-title":"SIAM J. Computing"},{"key":"40_CR28","doi-asserted-by":"publisher","first-page":"120","DOI":"10.1145\/359340.359342","volume":"21","author":"R. Rivest","year":"1978","unstructured":"R. Rivest, A. Shamir and L. Adleman, \u201cA method for obtaining digital signatures and public-key cryptosystems\u201d, Communications of the ACM 21 (1978), 120\u2013126.","journal-title":"Communications of the ACM"},{"key":"40_CR29","doi-asserted-by":"crossref","unstructured":"T. Rosati, \u201cA High Speed Data Encryption Processor for Public Key Cryptography\u201d, Proceedings of the IEEE Custom Integrated Circuits Conference, May 1989.","DOI":"10.1109\/CICC.1989.56740"},{"key":"40_CR30","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"239","DOI":"10.1007\/0-387-34805-0_22","volume-title":"Advances in Cryptology-Crypto 89","author":"C.P. Schnorr","year":"1990","unstructured":"C.P. Schnorr, \u201cEfficient identification and signatures for smart cards\u201d, Advances in Cryptology-Crypto 89, G. Brassard (ed.), Lecture Notes in Computer Science 435, Springer-Verlag (1990), 239\u2013251."},{"key":"40_CR31","doi-asserted-by":"crossref","unstructured":"M. Shand, P. Bertin and J. Vuillemin, \u201cHardware speedups in long integer multiplication\u201d, Proceedings of the 2nd ACM Symposium on Parallel Algorithms and Architectures, Crete, July 2\u20136,1990, to appear.","DOI":"10.1145\/97444.97679"},{"key":"40_CR32","doi-asserted-by":"publisher","first-page":"329","DOI":"10.1090\/S0025-5718-1987-0866119-8","volume":"48","author":"R.D. Silverman","year":"1987","unstructured":"R.D. Silverman, \u201cThe multiple polynomial quadratic sieve\u201d, Math. Comp. 48 (1987), 329\u2013339.","journal-title":"Math. Comp."},{"key":"40_CR33","doi-asserted-by":"crossref","unstructured":"G.J. Simmons (ed.), Contemporary Cryptology: The Science of Information Integrity, IEEE press, to appear.","DOI":"10.1109\/9780470544327"},{"issue":"1","key":"40_CR34","doi-asserted-by":"publisher","first-page":"54","DOI":"10.1109\/TIT.1986.1057137","volume":"IT-32","author":"D.H. Wiedemann","year":"1986","unstructured":"D.H. Wiedemann, \u201cSolving sparse linear equations over finite fields\u201d, IEEE Transactions on Information Theory IT-32(1), Jan. 1986, 54\u201362.","journal-title":"IEEE Transactions on Information Theory"}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology-CRYPT0\u2019 90"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-38424-3_40","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,5,15]],"date-time":"2023-05-15T03:03:11Z","timestamp":1684119791000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-38424-3_40"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1991]]},"ISBN":["9783540545088","9783540384243"],"references-count":34,"URL":"https:\/\/doi.org\/10.1007\/3-540-38424-3_40","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[1991]]}}}