{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,13]],"date-time":"2026-03-13T09:08:54Z","timestamp":1773392934048,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":26,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540602217","type":"print"},{"value":"9783540447504","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1995]]},"DOI":"10.1007\/3-540-44750-4_31","type":"book-chapter","created":{"date-parts":[[2007,8,16]],"date-time":"2007-08-16T08:39:53Z","timestamp":1187253593000},"page":"386-396","source":"Crossref","is-referenced-by-count":25,"title":["Some Remarks on Lucas-Based Cryptosystems"],"prefix":"10.1007","author":[{"given":"Daniel","family":"Bleichenbacher","sequence":"first","affiliation":[]},{"given":"Wieb","family":"Bosma","sequence":"additional","affiliation":[]},{"given":"Arjen K.","family":"Lenstra","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2001,7,13]]},"reference":[{"key":"31_CR1","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"147","DOI":"10.1007\/3-540-48329-2_13","volume-title":"Proceedings Crypto\u201993","author":"L. M. Adleman","year":"1994","unstructured":"L. M. Adleman and J. DeMarrias, A subexponential algorithm for discrete logarithms over all finite fields, Proceedings Crypto\u201993, Lecture Notes in Comp. Sci. 773 (1994), 147\u2013158."},{"key":"31_CR2","unstructured":"E. Bach, Comments on Peter Smith\u2019s LUC public-key encryption system, manuscript, March 1993."},{"key":"31_CR3","doi-asserted-by":"publisher","first-page":"713","DOI":"10.2307\/2004849","volume":"24","author":"E. R. Berlekamp","year":"1970","unstructured":"E. R. Berlekamp, Factoring polynomials over large finite fields, Math. Comp. 24 (1970), 713\u2013735.","journal-title":"Math. Comp."},{"key":"31_CR4","doi-asserted-by":"publisher","first-page":"644","DOI":"10.1109\/TIT.1976.1055638","volume":"IT-33","author":"W. Diffie","year":"1976","unstructured":"W. Diffie and M. E. Hellman, New directions in cryptography, IEEE Trans. Info. Theory, vol IT-33 (1976), 644\u2013654.","journal-title":"IEEE Trans. Info. Theory"},{"key":"31_CR5","doi-asserted-by":"publisher","first-page":"469","DOI":"10.1109\/TIT.1985.1057074","volume":"IT-32","author":"T. ElGamal","year":"1985","unstructured":"T. ElGamal, A subexponential-time algorithm for computing discrete logarithms over GF(p 2), IEEE Trans. Info. Theory, vol IT-32 (1985), 469\u2013472.","journal-title":"IEEE Trans. Info. Theory"},{"key":"31_CR6","doi-asserted-by":"crossref","unstructured":"T. ElGamal and B. Kaliski, Letter to the editor, Dr. Dobb\u2019s Journal (May 1993), 10.","DOI":"10.1006\/fmic.1993.1017"},{"key":"31_CR7","doi-asserted-by":"publisher","first-page":"124","DOI":"10.1137\/0406010","volume":"6","author":"D. Gordon","year":"1993","unstructured":"D. Gordon, Discrete logarithms in GF(p) using the number field sieve, SIAM J. Disc. Math. 6 (1993), 124\u2013138.","journal-title":"SIAM J. Disc. Math."},{"key":"31_CR8","unstructured":"P. Horster, H. Petersen, and M. Michels, Digital signature schemes based on Lucas functions, University of Technology Chemnitz-Zwickau, Technical Report TR-95-1; to appear in: Communications and Multimedia Security, IT-Sicherheit\u2019 95, Joint working conference IFIP TC-6 TR-11 and Austrian Computer Society, Graz, Sept. 20\u201321, 1995."},{"key":"31_CR9","doi-asserted-by":"publisher","first-page":"243","DOI":"10.1016\/0020-0190(94)00209-H","volume":"53","author":"C.-S. Laih","year":"1995","unstructured":"C.-S. Laih, F.-K. Tu, and W.-C. Tai, On the security of the Lucas function, Information Processing Letters 53 (1995), 243\u2013247.","journal-title":"Information Processing Letters"},{"key":"31_CR10","series-title":"Lecture Notes in Math.","volume-title":"The development of the number field sieve","year":"1993","unstructured":"A. K. Lenstra and H. W. Lenstra, Jr. (eds), The development of the number field sieve, Lecture Notes in Math. 1554, Springer-Verlag, Berlin, 1993."},{"key":"31_CR11","doi-asserted-by":"crossref","unstructured":"R. Lidl and W. B. M\u00fcller, Permutation polynomials in RSA-cryptosystems, Proceedings of Crypto\u201983, Plenum Press (1984), 293\u2013301.","DOI":"10.1007\/978-1-4684-4730-9_23"},{"key":"31_CR12","unstructured":"W. B. M\u00fcller, Polynomial functions in modern cryptology, Contributions to general Algebra 3, Proceedings of the Vienna conference (1985), 7\u201332."},{"key":"31_CR13","first-page":"71","volume":"16","author":"W. B. M\u00fcller","year":"1981","unstructured":"W. B. M\u00fcller and W. N\u00f6bauer, Some remarks on public-key cryptosystems, Studia Sci. Math. Hungar. 16 (1981), 71\u201376.","journal-title":"Studia Sci. Math. Hungar."},{"key":"31_CR14","doi-asserted-by":"crossref","unstructured":"W. B. M\u00fcller and W. N\u00f6bauer, Cryptanalysis of the Dickson-scheme, Proceedings of Eurocrypt\u201985, Springer (1985), 50\u201361.","DOI":"10.1007\/3-540-39805-8_7"},{"key":"31_CR15","first-page":"42980","volume":"56","author":"NIST","year":"1991","unstructured":"NIST, A proposed federal information processing standard for digital signature standard (DSS), Federal Register 56 (1991), 42980\u201342982.","journal-title":"Federal Register"},{"key":"31_CR16","first-page":"255","volume":"3","author":"W. N\u00f6bauer","year":"1985","unstructured":"W. N\u00f6bauer, Cryptanalysis of the R\u00e9dei-scheme, Contributions to general Algebra 3, Proceedings of the Vienna conference (1985), 255\u2013264.","journal-title":"Proceedings of the Vienna conference"},{"key":"31_CR17","first-page":"309","volume":"38","author":"W. N\u00f6bauer","year":"1989","unstructured":"W. N\u00f6bauer, Cryptanalysis of a public-key cryptosystem based on Dicksonpolynomials, Mathematica Slovaca 38 (1989), 309\u2013323.","journal-title":"Mathematica Slovaca"},{"key":"31_CR18","volume-title":"Progr. Math.","author":"H. Riesel","year":"1985","unstructured":"H. Riesel, Prime numbers and computer methods for factorization, Progr. Math. 57, Boston: Birkhauser, 1985."},{"key":"31_CR19","doi-asserted-by":"publisher","first-page":"120","DOI":"10.1145\/359340.359342","volume":"21","author":"R. L. Rivest","year":"1978","unstructured":"R. L. Rivest, A. Shamir, L. Adleman, A method for obtaining digital signatures and public-key cryptosystems, Comm. ACM 21 (1978), 120\u2013126.","journal-title":"Comm. ACM"},{"key":"31_CR20","unstructured":"O. Schirokauer, Using number fields to compute general discrete logarithms, in preparation."},{"key":"31_CR21","unstructured":"P. Smith, LUC public-key encryption, Dr. Dobb\u2019s Journal (January 1993), 44\u201349."},{"key":"31_CR22","unstructured":"P. Smith, Cryptography without exponentiation, Dr. Dobb\u2019s Journal (April 1994), 26\u201330."},{"key":"31_CR23","unstructured":"P. Smith, Response to [6], Dr. Dobb\u2019s Journal (May 1993), 10\u201311."},{"key":"31_CR24","unstructured":"P. Smith, Personal communication, February 1995."},{"key":"31_CR25","unstructured":"P. J. Smith and M. J. J. Lennon, LUC: a new public key system, Proceedings of the Ninth IFIP Int. Symp. on Computer Security (1993), 103\u2013117."},{"key":"31_CR26","unstructured":"P. Smith and C. Skinner, A public-key cryptosystem and a digital signature system based on the Lucas function analogue to discrete logarithms, Pre-proceedings Asiacrypt\u201994, 298\u2013306."}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2014 CRYPT0\u2019 95"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-44750-4_31","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,2]],"date-time":"2019-05-02T04:18:45Z","timestamp":1556770725000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-44750-4_31"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1995]]},"ISBN":["9783540602217","9783540447504"],"references-count":26,"URL":"https:\/\/doi.org\/10.1007\/3-540-44750-4_31","relation":{},"ISSN":["0302-9743"],"issn-type":[{"value":"0302-9743","type":"print"}],"subject":[],"published":{"date-parts":[[1995]]}}}