{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,28]],"date-time":"2026-01-28T06:04:11Z","timestamp":1769580251390,"version":"3.49.0"},"publisher-location":"Berlin, Heidelberg","reference-count":15,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540191025","type":"print"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/3-540-39118-5_19","type":"book-chapter","created":{"date-parts":[[2010,7,13]],"date-time":"2010-07-13T15:51:38Z","timestamp":1279036298000},"page":"203-216","source":"Crossref","is-referenced-by-count":123,"title":["Collision Free Hash Functions and Public Key Signature Schemes"],"prefix":"10.1007","author":[{"given":"Ivan Bjerre","family":"Damg\u00e5rd","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"19_CR1","unstructured":"Brassard and Crepeau: Non transitive transfer of confidence: a perfect zero-knowledge interactive protocol for SAT and beyond. Proc. of FOCS 86."},{"key":"19_CR2","unstructured":"Damg\u00e5rd: Application of claw free functions in cryptography; unconditional protection in cryptographic protocols. Phd Thesis, in preparation."},{"issue":"4","key":"19_CR3","doi-asserted-by":"crossref","first-page":"388","DOI":"10.1145\/358027.358052","volume":"27","author":"Denning","year":"1984","unstructured":"Denning: Digital signatures with RSA and other public key cryptosystems. CACM, v.27, nr 4, 1984, pp.388\u2013392.","journal-title":"CACM"},{"key":"19_CR4","doi-asserted-by":"crossref","unstructured":"Goldwasser, Micali and Rivest: A \u201cparadoxical\u201d solution to the signature problem. Proc. of 25th FOCS, 1984, pp.441\u2013448.","DOI":"10.1109\/SFCS.1984.715946"},{"key":"19_CR5","unstructured":"Berstel and Perrin: Theory of codes, Academic Press, 1985."},{"key":"19_CR6","unstructured":"Davis and Price: The application of digital signatures based on public key cryptosystems. Proc. of 5th Int. CompCom, 1980, pp.525\u2013530."},{"key":"19_CR7","doi-asserted-by":"crossref","unstructured":"Winternitz: Producing a one-way hash function from DES. Proc. of Crypto 83, pp.203\u2013208","DOI":"10.1007\/978-1-4684-4730-9_17"},{"key":"19_CR8","unstructured":"Coppersmith: Another birthday attack. Proc. of Crypto 85."},{"key":"19_CR9","unstructured":"Stephens: Lentras factoring method based on elliptic curves. Proc. of Crypto 85."},{"key":"19_CR10","doi-asserted-by":"crossref","unstructured":"Wegman and Carter: New hash functions. JCSI, v.22,1981.","DOI":"10.1016\/0022-0000(81)90033-7"},{"key":"19_CR11","unstructured":"Goldreich, Goldwasser and Micali: How to construct random functions. MIT.LCS.TM-244, 1983."},{"key":"19_CR12","doi-asserted-by":"crossref","unstructured":"Blum and Micali: How to generate cryptographically strong sequences of pseudorandom bits. SIAM J. of Computing, v.13, 1984.","DOI":"10.1137\/0213053"},{"key":"19_CR13","unstructured":"Goldreich: Two remarks concerning the GMR-signature scheme. Proc. of Crypto 86."},{"key":"19_CR14","unstructured":"Goldwasser, Micali and Rivest: A digital signature scheme secure against adaptive chosen message attacks. To appear."},{"key":"19_CR15","unstructured":"Bert den Boer: private communication."}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2014 EUROCRYPT \u201987"],"original-title":[],"language":"en","deposited":{"date-parts":[[2020,6,6]],"date-time":"2020-06-06T22:57:55Z","timestamp":1591484275000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-39118-5_19"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540191025"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/3-540-39118-5_19","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[]}}