{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T20:03:08Z","timestamp":1725480188256},"publisher-location":"Berlin, Heidelberg","reference-count":4,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540164630"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/3-540-39799-x_2","type":"book-chapter","created":{"date-parts":[[2007,2,28]],"date-time":"2007-02-28T12:25:31Z","timestamp":1172665531000},"page":"14-17","source":"Crossref","is-referenced-by-count":23,"title":["Another Birthday Attack"],"prefix":"10.1007","author":[{"given":"Don","family":"Coppersmith","sequence":"first","affiliation":[]}],"member":"297","reference":[{"issue":"2","key":"2_CR1","doi-asserted-by":"crossref","first-page":"27","DOI":"10.1109\/MC.1983.1654296","volume":"16","author":"D.E. Denning","year":"1983","unstructured":"D.E. Denning, Protecting public keys and signature keys, IEEE Computer, 1983, 16(2):27.","journal-title":"IEEE Computer"},{"key":"2_CR2","series-title":"NPL Report DNACS","volume-title":"The Application of Digital Signatures based on Public Key Cryptosystems","author":"D.W. Davies","year":"1980","unstructured":"D.W. Davies and W.L. Price, \u201cThe Application of Digital Signatures based on Public Key Cryptosystems,\u201d NPL Report DNACS 39\/80, National Physical Laboratory, Teddington, Middlesex, England, Dec. 1980."},{"key":"2_CR3","volume-title":"Foundations of Secure Computation","author":"M. Rabin","year":"1978","unstructured":"M. Rabin, Digital Signatures, in \u201cFoundations of Secure Computation,\u201d Academic Press, New York, 1978."},{"key":"2_CR4","doi-asserted-by":"publisher","first-page":"120","DOI":"10.1145\/359340.359342","volume":"21","author":"R.L. Rivest","year":"1978","unstructured":"R.L. Rivest, A. Shamir, and L. Adleman, \u201cA Method for Obtaining Digital Signatures and Public-Key Cryptosystems,\u201d Comm. ACM, vol. 21, no. 2, Feb. 1978, pp. 120\u2013126.","journal-title":"Comm. ACM"}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2014 CRYPTO \u201985 Proceedings"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-39799-X_2.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,28]],"date-time":"2021-04-28T01:22:37Z","timestamp":1619572957000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-39799-X_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540164630"],"references-count":4,"URL":"https:\/\/doi.org\/10.1007\/3-540-39799-x_2","relation":{},"subject":[]}}