{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T22:24:47Z","timestamp":1725488687435},"publisher-location":"Berlin, Heidelberg","reference-count":19,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540546207"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/3-540-46416-6_34","type":"book-chapter","created":{"date-parts":[[2007,8,6]],"date-time":"2007-08-06T18:02:07Z","timestamp":1186423327000},"page":"399-408","source":"Crossref","is-referenced-by-count":4,"title":["Discrete Logarithm Based Protocols"],"prefix":"10.1007","author":[{"given":"Patrick","family":"Horster","sequence":"first","affiliation":[]},{"given":"Hans-Joachim","family":"Knobloch","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"34_CR1","doi-asserted-by":"publisher","first-page":"1024","DOI":"10.1049\/el:19900663","volume":"26","author":"G. B. Agnew","year":"1990","unstructured":"G. B. Agnew, R. C. Mullin, S. A. Vanstone, Improved digital signature scheme based on discrete exponentiation, Electronics Letters 26, 1990, pp. 1024\u20131025.","journal-title":"Electronics Letters"},{"key":"34_CR2","first-page":"38","volume-title":"Adv. in Cryptology-EUROCRYPT\u2019 89","author":"F. Bauspie\u00df","year":"1990","unstructured":"F. Bauspie\u00df, H.-J. Knobloch, How to Keep Authenticity Alive in a Computer Network, Adv. in Cryptology-EUROCRYPT\u2019 89, Springer, Berlin 1990, pp. 38\u201346."},{"unstructured":"F. Bauspie\u00df, SELANE-An Approach to Secure Networks, Abstracts of SECURICOM\u2019 90, Paris 1990.","key":"34_CR3"},{"key":"34_CR4","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1007\/3-540-45961-8_7","volume-title":"Adv. in Cryptology-EUROCRYPT\u2019 88","author":"Th. Beth","year":"1988","unstructured":"Th. Beth, Zero-Knowledge Identification Scheme for Smart Cards, Adv. in Cryptology-EUROCRYPT\u2019 88, Springer, Berlin 1988, pp. 77\u201384."},{"unstructured":"CCITT, Recommendation X.509: The Directory-Authentication Framework, Blue Book-Melbourne 1988, Fascicle VIII.8: Data communication networks: directory, International Telecommunication Union, Geneva 1989, pp. 48\u201381.","key":"34_CR5"},{"key":"34_CR6","first-page":"127","volume-title":"Adv. in Cryptology-EUROCRYPT\u2019 87","author":"D. Chaum","year":"1988","unstructured":"D. Chaum, J. H. Evertse, J. van de Graaf, An Improved Protocol for Demonstrating Possession of Discrete Logarithms and some Generalizations, Adv. in Cryptology-EUROCRYPT\u2019 87, Springer, Berlin 1988, pp. 127\u2013141."},{"key":"34_CR7","doi-asserted-by":"publisher","first-page":"644","DOI":"10.1109\/TIT.1976.1055638","volume":"22","author":"W. Diffie","year":"1976","unstructured":"W. Diffie, M. E. Hellman, New Directions in Cryptography, IEEE Trans. on Information Theory 22, 1976, pp. 644\u2013654.","journal-title":"IEEE Trans. on Information Theory"},{"key":"34_CR8","doi-asserted-by":"publisher","first-page":"469","DOI":"10.1109\/TIT.1985.1057074","volume":"31","author":"T. ElGamal","year":"1985","unstructured":"T. ElGamal, A Public Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms, IEEE Trans. on Information Theory 31, 1985, pp. 469\u2013472.","journal-title":"IEEE Trans. on Information Theory"},{"unstructured":"M. Girault, Self-Certified Public Keys, Adv. in Cryptology-EUROCRYPT\u2019 91, this volume.","key":"34_CR9"},{"key":"34_CR10","first-page":"29","volume-title":"Adv. in Cryptology-EUROCRYPT\u2019 89","author":"C. G. G\u00fcnther","year":"1990","unstructured":"C. G. G\u00fcnther, Diffie-Hellman and El-Gamal Protocols with One Single Authentication Key, Adv. in Cryptology-EUROCRYPT\u2019 89, Springer, Verlin 1990, pp. 29\u201337."},{"unstructured":"P. Horster, H.-J. Knobloch, Protocols for Secure Networks, Abstracts of SECURICOM\u2019 91, Paris 1991.","key":"34_CR11"},{"key":"34_CR12","doi-asserted-by":"publisher","first-page":"203","DOI":"10.2307\/2007884","volume":"48","author":"N. Koblitz","year":"1987","unstructured":"N. Koblitz, Elliptic Curve Cryptosystems, Math. of Computation 48, 1987, pp. 203\u2013209.","journal-title":"Math. of Computation"},{"key":"34_CR13","volume-title":"Section E.2.1: Kerberos Authentication and Authorization System","author":"S. P. Miller","year":"1987","unstructured":"S. P. Miller, B. C. Neuman, J. I. Schiller, J. H. Saltzer, Section E.2.1: Kerberos Authentication and Authorization System, MIT Project Athena, Cambridge, Ma., 1987."},{"key":"34_CR14","doi-asserted-by":"publisher","first-page":"993","DOI":"10.1145\/359657.359659","volume":"21","author":"R. M. Needham","year":"1978","unstructured":"R. M. Needham, M. D. Schroeder, Using Encryption for Authentication in Large Networks of Computers, Comm. of the ACM 21, 1978, pp. 993\u2013999.","journal-title":"Comm. of the ACM"},{"key":"34_CR15","first-page":"224","volume-title":"Adv. in Cryptology-EUROCRYPT\u2019 84","author":"A. M. Odlyzko","year":"1985","unstructured":"A. M. Odlyzko, Discrete Logarithms in Finite Fields and their Cryptographic Significance, Adv. in Cryptology-EUROCRYPT\u2019 84, Springer, Berlin 1985, pp. 224\u2013314."},{"key":"34_CR16","doi-asserted-by":"publisher","first-page":"106","DOI":"10.1109\/TIT.1978.1055817","volume":"24","author":"S. C. Pohlig","year":"1978","unstructured":"S. C. Pohlig, M. E. Hellman, Am Improved Algorithm for Computing Logarithms Over GF(p) and its Cryptographic Significance, IEEE Trans. on Information Theory 24, 1978, pp. 106\u2013110.","journal-title":"IEEE Trans. on Information Theory"},{"key":"34_CR17","doi-asserted-by":"publisher","first-page":"120","DOI":"10.1145\/359340.359342","volume":"21","author":"R. L. Rivest","year":"1978","unstructured":"R. L. Rivest, A. Shamir, L. Adleman, A Method for Obtaining Digital Signatures and Public-Key Cryptosystems, Comm. of the ACM 21, 1978, pp. 120\u2013126.","journal-title":"Comm. of the ACM"},{"key":"34_CR18","doi-asserted-by":"publisher","first-page":"393","DOI":"10.1145\/358027.358053","volume":"27","author":"R. L. Rivest","year":"1984","unstructured":"R. L. Rivest, A. Shamir, How to Expose an Eavesdropper, Comm. of the ACM 27, 1984, pp. 393\u2013395.","journal-title":"Comm. of the ACM"},{"key":"34_CR19","doi-asserted-by":"crossref","first-page":"239","DOI":"10.1007\/0-387-34805-0_22","volume-title":"Adv. in Cryptology-CRYPTO\u2019 89","author":"C. P. Schnorr","year":"1990","unstructured":"C. P. Schnorr, Efficient Identification and Signatures for Smart Cards, Adv. in Cryptology-CRYPTO\u2019 89, Springer, Berlin 1990, pp. 239\u2013251."}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2014 EUROCRYPT \u201991"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-46416-6_34.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,17]],"date-time":"2020-11-17T21:11:29Z","timestamp":1605647489000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-46416-6_34"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540546207"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/3-540-46416-6_34","relation":{},"subject":[]}}