{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,13]],"date-time":"2025-05-13T02:43:14Z","timestamp":1747104194252,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":11,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540416586"},{"type":"electronic","value":"9783540445869"}],"license":[{"start":{"date-parts":[[2001,1,1]],"date-time":"2001-01-01T00:00:00Z","timestamp":978307200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2001,1,1]],"date-time":"2001-01-01T00:00:00Z","timestamp":978307200000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2001]]},"DOI":"10.1007\/3-540-44586-2_6","type":"book-chapter","created":{"date-parts":[[2007,10,7]],"date-time":"2007-10-07T02:53:49Z","timestamp":1191725629000},"page":"73-86","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":14,"title":["Fast Irreducibility and Subgroup Membership Testing in XTR"],"prefix":"10.1007","author":[{"given":"Arjen K.","family":"Lenstra","sequence":"first","affiliation":[]},{"given":"Eric R.","family":"Verheul","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2001,6,5]]},"reference":[{"key":"6_CR1","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"131","DOI":"10.1007\/3-540-44598-6_8","volume-title":"Differential fault attacks on elliptic curve cryptosystems","author":"I. Biehl","year":"2000","unstructured":"I. Biehl, B. Meyer, V. M\u00fcller, Differential fault attacks on elliptic curve cryptosystems, Proceedings of Crypto 2000, LNCS 1880, Springer-Verlag, 2000, 131\u2013146."},{"key":"6_CR2","series-title":"Lect Notes Comput Sci","first-page":"493","volume-title":"A remark on the efficiency of identification schemes","author":"M.V.D. Burmester","year":"1990","unstructured":"M.V.D. Burmester, A remark on the efficiency of identification schemes, Proceedings of Eurocrypt\u201990, LNCS 473, Springer-Verlag 1990, 493\u2013495."},{"key":"6_CR3","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"13","DOI":"10.1007\/BFb0055717","volume-title":"A practical public key cryptosystem provably secure against adaptive chosen ciphertext attack","author":"R. Cramer","year":"1998","unstructured":"R. Cramer, V. Shoup, A practical public key cryptosystem provably secure against adaptive chosen ciphertext attack, Proceedings of Crypto\u201998, LNCS 1462, Springer-Verlag 1998, 13\u201325."},{"key":"6_CR4","series-title":"Lect Notes Comput Sci","first-page":"1","volume-title":"The XTR public key system","author":"A.K. Lenstra","year":"2000","unstructured":"A.K. Lenstra, E.R. Verheul, The XTR public key system, Proceedings of Crypto 2000, LNCS 1880, Springer-Verlag, 2000, 1\u201319; available from \nhttp:\/\/www.ecstr.com\n\n."},{"key":"6_CR5","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"220","DOI":"10.1007\/3-540-44448-3_17","volume-title":"Key improvements to XTR","author":"A.K. Lenstra","year":"2000","unstructured":"A.K. Lenstra, E.R. Verheul, Key improvements to XTR, Proceedings of Asiacrypt 2000, LNCS 1976, Springer-Verlag, 2000, 220\u2013233; available from \nhttp:\/\/www.ecstr.com\n\n."},{"key":"6_CR6","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"249","DOI":"10.1007\/BFb0052240","volume-title":"A key recovery attack on discrete log-based schemes using a prime order subgroup","author":"C.H. Lim","year":"1997","unstructured":"C.H. Lim, P.J. Lee, A key recovery attack on discrete log-based schemes using a prime order subgroup, Proceedings of Crypto\u201997, LNCS 1294, Springer-Verlag 1997, 249\u2013263."},{"key":"6_CR7","volume-title":"Introduction to abstract algebra","author":"W.K. Nicholson","year":"1993","unstructured":"W.K. Nicholson, Introduction to abstract algebra, PWS-Kent Publishing Company, Boston, 1993."},{"key":"6_CR8","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"332","DOI":"10.1007\/3-540-68339-9_29","volume-title":"On Diffie-Hellman key agreement with short exponents","author":"P.C. van Oorschot","year":"1996","unstructured":"P.C. van Oorschot, M.J. Wiener, On Diffie-Hellman key agreement with short exponents, Proceedings of Eurocrypt\u2019 96, LNCS 1070, Springer-Verlag 1996, 332\u2013343."},{"key":"6_CR9","doi-asserted-by":"publisher","first-page":"106","DOI":"10.1109\/TIT.1978.1055817","volume":"24","author":"S.C. Pohlig","year":"1978","unstructured":"S.C. Pohlig, M.E. Hellman, An improved algorithm for computing logarithms over GF(p) and its cryptographic significance, IEEE Trans. on IT, 24 (1978), 106\u2013110.","journal-title":"IEEE Trans. on IT"},{"key":"6_CR10","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4757-1089-2","volume-title":"Prime numbers and computer methods for factorization","author":"H. Riesel","year":"1985","unstructured":"H. Riesel, Prime numbers and computer methods for factorization, Birkh\u00e4user, Boston, 1985."},{"key":"6_CR11","unstructured":"E.R. Verheul, M.P. Hoyle, Tricking the Chaum-Pedersen protocol, manuscript, 1998."}],"container-title":["Lecture Notes in Computer Science","Public Key Cryptography"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-44586-2_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,8,8]],"date-time":"2020-08-08T16:07:35Z","timestamp":1596902855000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-44586-2_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2001]]},"ISBN":["9783540416586","9783540445869"],"references-count":11,"URL":"https:\/\/doi.org\/10.1007\/3-540-44586-2_6","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2001]]},"assertion":[{"value":"5 June 2001","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}