{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T11:41:22Z","timestamp":1742989282209,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":15,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540442707"},{"type":"electronic","value":"9783540458111"}],"license":[{"start":{"date-parts":[[2002,1,1]],"date-time":"2002-01-01T00:00:00Z","timestamp":1009843200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2002]]},"DOI":"10.1007\/3-540-45811-5_28","type":"book-chapter","created":{"date-parts":[[2007,10,19]],"date-time":"2007-10-19T05:43:51Z","timestamp":1192772631000},"page":"357-371","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":9,"title":["On Optimal Hash Tree Traversal for Interval Time-Stamping"],"prefix":"10.1007","author":[{"given":"Helger","family":"Lipmaa","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2002,9,5]]},"reference":[{"key":"28_CR1","unstructured":"Josh Benaloh and Michael de Mare. Efficient Broadcast Time-stamping. Technical Report 1, Clarkson University Department of Mathematics and Computer Science, August 1991."},{"key":"28_CR2","doi-asserted-by":"crossref","unstructured":"Dave Bayer, Stuart A. Haber, and Wakefield Scott Stornetta. Improving the Efficiency And Reliability of Digital Time-stamping. In Sequences\u201991: Methods in Communication, Security, and Computer Science, pages 329\u2013334. Springer-Verlag, 1992.","DOI":"10.1007\/978-1-4613-9323-8_24"},{"key":"28_CR3","unstructured":"Ahto Buldas and Peeter Laud. New Linking Schemes for Digital Time-stamping. In The 1st International Conference on Information Security and Cryptology, pages 3\u201314, Seoul, Korea, 18\u201319 December 1998. Korea Institute of Information Security and Cryptology."},{"key":"28_CR4","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"486","DOI":"10.1007\/BFb0055749","volume-title":"Advances in Cryptology \u2014 CRYPTO\u2019 98","author":"A. Buldas","year":"1998","unstructured":"Ahto Buldas, Peeter Laud, Helger Lipmaa, and Jan Villemson. Time-stamping with Binary Linking Schemes. In Hugo Krawczyk, editor, Advances in Cryptology \u2014 CRYPTO\u2019 98, volume 1462 of Lecture Notes in Computer Science, pages 486\u2013501, Santa Barbara, USA, 23\u201327 August 1998. International Association for Cryptologic Research, Springer-Verlag."},{"key":"28_CR5","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"293","DOI":"10.1007\/978-3-540-46588-1_20","volume-title":"Public Key Cryptography\u20192000","author":"A. Buldas","year":"2000","unstructured":"Ahto Buldas, Helger Lipmaa, and Berry Schoenmakers. Optimally Efficient Accountable Time-stamping. In Hideki Imai and Yuliang Zheng, editors, Public Key Cryptography\u20192000, volume 1751 of Lecture Notes in Computer Science, pages 293\u2013305, Melbourne, Victoria, Australia, 18\u201320 January 2000. Springer-Verlag."},{"key":"28_CR6","unstructured":"Ahto Buldas. Personal communication. June 2002."},{"key":"28_CR7","series-title":"Lect Notes Comput Sci","first-page":"203","volume-title":"Advances in Cryptology \u2014 EUROCRYPT\u201987","author":"I. B. Damg\u00e5rd","year":"1987","unstructured":"Ivan Bjerre Damg\u00e5rd. Collision free hash functions and public key signature schemes. In David Chaum and Wyn L. Price, editors, Advances in Cryptology \u2014 EUROCRYPT\u201987, volume 304 of Lecture Notes in Computer Science, pages 203\u2013216, Amsterdam, The Netherlands, 13\u201315 April 1987. Springer-Verlag, 1988."},{"key":"28_CR8","unstructured":"Nicholas Govert de Bruijn. Asymptotic Methods in Analysis. Dover, January 1982."},{"issue":"2","key":"28_CR9","doi-asserted-by":"publisher","first-page":"99","DOI":"10.1007\/BF00196791","volume":"3","author":"S. A. Haber","year":"1991","unstructured":"Stuart A. Haber and Wakefield Scott Stornetta. How to Time-stamp a Digital Document. Journal of Cryptology, 3(2):99\u2013111, 1991.","journal-title":"Journal of Cryptology"},{"key":"28_CR10","unstructured":"Donald E. Knuth. The Art of Computer Programming. Volume 3: Sorting and Searching. Addison-Wesley, 2 edition, 1998."},{"key":"28_CR11","unstructured":"Helger Lipmaa. Secure and Efficient Time-stamping Systems. PhD thesis, University of Tartu, June 1999."},{"key":"28_CR12","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"336","DOI":"10.1007\/3-540-45473-X_28","volume-title":"Fast Software Encryption\u20192001","author":"H. Lipmaa","year":"2001","unstructured":"Helger Lipmaa and Shiho Moriai. Efficient Algorithms for Computing Differential Properties of Addition. In Mitsuru Matsui, editor, Fast Software Encryption\u20192001, volume 2355 of Lecture Notes in Computer Science, pages 336\u2013350,Yokohama, Japan, 2\u20134 April 2001. Springer-Verlag, 2002."},{"key":"28_CR13","unstructured":"Ralph Charles Merkle. Protocols for Public Key Cryptosystems. In Proceedings of the 1980 Symposium on Security and Privacy, Oakland, California, USA, 14\u201316 April 1980. IEEE Computer Society Press."},{"key":"28_CR14","unstructured":"Jan Willemson. Personal communication. July 2002."},{"key":"28_CR15","unstructured":"Jan Willemson. Size-Efficient Interval Time Stamps. PhD thesis, University of Tartu, June 2002. Available from \nhttp:\/\/home.cyber.ee\/jan\/publ.html\n\n, May 2002."}],"container-title":["Lecture Notes in Computer Science","Information Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-45811-5_28","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,1,27]],"date-time":"2020-01-27T18:04:53Z","timestamp":1580148293000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-45811-5_28"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2002]]},"ISBN":["9783540442707","9783540458111"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/3-540-45811-5_28","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2002]]},"assertion":[{"value":"5 September 2002","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}