{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,13]],"date-time":"2025-05-13T02:43:04Z","timestamp":1747104184068,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":12,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540427001"},{"type":"electronic","value":"9783540454724"}],"license":[{"start":{"date-parts":[[2001,1,1]],"date-time":"2001-01-01T00:00:00Z","timestamp":978307200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2001]]},"DOI":"10.1007\/3-540-45472-1_9","type":"book-chapter","created":{"date-parts":[[2007,6,13]],"date-time":"2007-06-13T00:03:20Z","timestamp":1181693000000},"page":"121-135","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":19,"title":["Signing on a Postcard"],"prefix":"10.1007","author":[{"given":"David","family":"Naccache","sequence":"first","affiliation":[]},{"given":"Jacques","family":"Stern","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2001,10,26]]},"reference":[{"key":"9_CR1","series-title":"Lect Notes Comput Sci","volume-title":"Proceedings of asiacrypt\u201999","author":"M. Abe","year":"1999","unstructured":"M. Abe and T. Okamoto, A signature scheme with message recovery as secure as discrete logarrithms, Proceedings of asiacrypt\u201999, LNCS, Springer-Verlag, to appear, 1999."},{"key":"9_CR2","doi-asserted-by":"crossref","unstructured":"M. Bcllarc and P. Rogaway, Random oracles arc practical: a paradigm for designing efficient protocols, Proceedings of the 1-st ACM conference on communications and computer security, pp. 62\u201373. 1993.","DOI":"10.1145\/168588.168596"},{"key":"9_CR3","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"399","DOI":"10.1007\/3-540-68339-9_34","volume-title":"Proceedings of eurocrypt\u201996","author":"M. Bellare","year":"1996","unstructured":"M. Bellare and P. Rogaway, The exact security of digital signatures-How-to sign with RSA and Rabin, Proceedings of eurocrypt\u201996, LNCS 950, Springer-Verlag, pp. 399\u2013416, 1996."},{"key":"9_CR4","unstructured":"D. Coppersmith, S. Halevi and C. Jutla, ISO 9796-1 and the new forgery strategy., manuscript, July 28, 1999."},{"key":"9_CR5","series-title":"Lect Notes Comput Sci","first-page":"1","volume-title":"Proceedings of crypto\u201999","author":"J.-S. Coron","year":"1999","unstructured":"J.-S. Coron. D. Naccache and, T.P. Stern, On the security of RSA padding, Proceedings of crypto\u201999, LNCS 1666, Springer-Vcrlag, pp. 1\u201318, 1999."},{"key":"9_CR6","unstructured":"IEEE P1363 Draft, Standard specifications for public key cryptography, (available from \nhttp:\/\/grouper.ieee.org\/groups\/1363\/index.html\n\n), 1998."},{"key":"9_CR7","unstructured":"ISO\/IEC 9796-2, Information technology, Security techniques, Digital signature scheme giving message recovery, Part 2: Mechanisms using a hash-function, 1997."},{"issue":"2","key":"9_CR8","first-page":"165","volume":"55","author":"V.I. Nechaev","year":"1994","unstructured":"V.I. Nechaev, Complexity of a determinate algorithm for the discrete logarithm. Mathematical Notes, 55(2), pp. 165\u2013172, 1994. Translated from Matematicheskie Zametki 55(2), pp. 91-101, 1994.","journal-title":"Matematicheskie Zametki"},{"key":"9_CR9","unstructured":"National Institute of Standards and Technology, Secure hash standard, FIPS publication 180-1, April 1994."},{"key":"9_CR10","doi-asserted-by":"crossref","unstructured":"K. Nyberg and R. Rueppel, A new signature scheme based on the DSA, giving message recovery, Proceedings of the 1-st ACM conference on communications and computer security, pp. 58\u201361, 1993.","DOI":"10.1145\/168588.168595"},{"key":"9_CR11","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"387","DOI":"10.1007\/3-540-68339-9_33","volume-title":"Proceedings of euhochypt\u201996","author":"D. Pointcheval","year":"1996","unstructured":"D. Pointcheval and J. Stern, Security proofs for signature schemes. Proceedings of euhochypt\u201996, LNCS 950, Springer-Verlag, pp. 387\u2013398, 1996."},{"key":"9_CR12","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"256","DOI":"10.1007\/3-540-69053-0_18","volume-title":"Proceedings of eurocrypt\u201997","author":"V. Shoup","year":"1997","unstructured":"V. Shoup, Lower bounds for discrete logarithms and related problems. Proceedings of eurocrypt\u201997, LNCS 1233, Springer-Verlag, pp. 256\u2013266, 1997."}],"container-title":["Lecture Notes in Computer Science","Financial Cryptography"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-45472-1_9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,3,30]],"date-time":"2020-03-30T21:13:24Z","timestamp":1585602804000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-45472-1_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2001]]},"ISBN":["9783540427001","9783540454724"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/3-540-45472-1_9","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2001]]},"assertion":[{"value":"26 October 2001","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}