{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,7]],"date-time":"2026-03-07T14:16:41Z","timestamp":1772893001688,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":6,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540424567","type":"print"},{"value":"9783540446477","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2001]]},"DOI":"10.1007\/3-540-44647-8_21","type":"book-chapter","created":{"date-parts":[[2007,11,13]],"date-time":"2007-11-13T19:28:14Z","timestamp":1194982094000},"page":"355-367","source":"Crossref","is-referenced-by-count":215,"title":["Improved Online\/Offline Signature Schemes"],"prefix":"10.1007","author":[{"given":"Adi","family":"Shamir","sequence":"first","affiliation":[]},{"given":"Yael","family":"Tauman","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2001,8,2]]},"reference":[{"key":"21_CR1","doi-asserted-by":"crossref","unstructured":"Shimon Even, Oded Goldreich, and Silvio Micali, On-line\/off-line Digital Signatures. In Advances in Cryptology: Crypto\u2019 89, pp 263\u2013277. August 1990. Springer.","DOI":"10.1007\/0-387-34805-0_24"},{"key":"21_CR2","first-page":"281","volume":"17","author":"S. Goldwasser","year":"1988","unstructured":"Shafi Goldwasser, Silvio Micali, and Ron Rivest, A Digital Signature Scheme Secure Against Adaptive Chosen-Message Attacks, SIAM J. on Computing, 17, pp 281\u2013308, 1988.","journal-title":"A Digital Signature Scheme Secure Against Adaptive Chosen-Message Attacks, SIAM J. on Computing"},{"key":"21_CR3","unstructured":"Hugo Krawczyk and Tal Rabin, Chameleon Signatures. In Symposium on Network and Distributed Systems Security (NDSS\u2019 00), pp 143\u2013154, February 2000, Internet Society."},{"key":"21_CR4","doi-asserted-by":"crossref","first-page":"300","DOI":"10.1016\/S0022-0000(76)80043-8","volume":"13","author":"G. Miller","year":"1976","unstructured":"Gary Miller, Riemann\u2019s Hypothesis and Tests for Primality, J. Comp. Sys. Sci., 13:300\u2013317, 1976.","journal-title":"Riemann\u2019s Hypothesis and Tests for Primality, J. Comp. Sys. Sci."},{"key":"21_CR5","unstructured":"Michael Rabin, Digitized Signatures as Intractable as Factorization, Technical Report MIT\/LCS TR-212, January 1979."},{"key":"21_CR6","doi-asserted-by":"crossref","unstructured":"Ron Rivest, Adi Shamir, and Len Adleman, A Method of Obtaining Digital Signatures and Public-Key Cryptosystems, CACM, 21(2), pp 120\u2013126, February 1978.","DOI":"10.1145\/359340.359342"}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2014 CRYPTO 2001"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-44647-8_21","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,8,27]],"date-time":"2021-08-27T11:57:40Z","timestamp":1630065460000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-44647-8_21"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2001]]},"ISBN":["9783540424567","9783540446477"],"references-count":6,"URL":"https:\/\/doi.org\/10.1007\/3-540-44647-8_21","relation":{},"ISSN":["0302-9743"],"issn-type":[{"value":"0302-9743","type":"print"}],"subject":[],"published":{"date-parts":[[2001]]}}}