{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,10]],"date-time":"2026-04-10T16:39:43Z","timestamp":1775839183881,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":17,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540546207","type":"print"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/3-540-46416-6_38","type":"book-chapter","created":{"date-parts":[[2007,8,6]],"date-time":"2007-08-06T18:02:07Z","timestamp":1186423327000},"page":"446-457","source":"Crossref","is-referenced-by-count":25,"title":["ESIGN: An Efficient Digital Signature Implementation for Smart Cards"],"prefix":"10.1007","author":[{"given":"Atsushi","family":"Fujioka","sequence":"first","affiliation":[]},{"given":"Tatsuaki","family":"Okamoto","sequence":"additional","affiliation":[]},{"given":"Shoji","family":"Miyaguchi","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"38_CR1","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"368","DOI":"10.1007\/0-387-34805-0_34","volume-title":"Advances in Cryptology \u2014 CRYPTO\u2019 89","author":"E. F. Brickell","year":"1990","unstructured":"E. F. Brickell, \u201cA Survey of Hardware Implementation of RSA\u201d, in Advances in Cryptology \u2014 CRYPTO\u2019 89, Lecture Notes in Computer Science 435, Springer-Verlag, Berlin, pp.368\u2013370 (1990)."},{"issue":"2","key":"38_CR2","doi-asserted-by":"publisher","first-page":"55","DOI":"10.1109\/MC.1983.1654301","volume":"16","author":"D. W. Davies","year":"1983","unstructured":"D. W. Davies, \u201cApplying the RSA Digital Signature to Electronic Mail\u201d, Computer, Vol.16, No.2, pp.55\u201362 (Feb., 1983).","journal-title":"Computer"},{"key":"38_CR3","unstructured":"D. E. Denning, Cryptography and Data Security, Addison-Wesley, pp.170 (1982)."},{"issue":"6","key":"38_CR4","doi-asserted-by":"publisher","first-page":"644","DOI":"10.1109\/TIT.1976.1055638","volume":"IT-22","author":"W. Diffie","year":"1976","unstructured":"W. Diffie and M. E. Hellman, \u201cNew Directions in Cryptography\u201d, IEEE Transactions on Information Theory, Vol.IT-22, No.6, pp.644\u2013654 (Nov., 1976).","journal-title":"IEEE Transactions on Information Theory"},{"key":"38_CR5","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"263","DOI":"10.1007\/0-387-34805-0_24","volume-title":"Advances in Cryptology \u2014 CRYPTO\u2019 89","author":"S. Even","year":"1990","unstructured":"S. Even, O. Goldreich, and S. Micali, \u201cOn-line\/Off-line Digital Signatures\u201d, in Advances in Cryptology \u2014 CRYPTO\u2019 89, Lecture Notes in Computer Science 435, Springer-Verlag, Berlin, pp.263\u2013275 (1990)."},{"key":"38_CR6","series-title":"Lect Notes Comput Sci","first-page":"186","volume-title":"Advances in Cryptology \u2014 CRYPTO\u2019 86","author":"A. Fiat","year":"1987","unstructured":"A. Fiat and A. Shamir, \u201cHow to Prove Yourself: Practical Solutions to Identification and Signature Problems\u201d, in Advances in Cryptology \u2014 CRYPTO\u2019 86, Lecture Notes in Computer Science 263, Springer-Verlag, Berlin, pp.186\u2013194 (1987)."},{"key":"38_CR7","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"123","DOI":"10.1007\/3-540-45961-8_11","volume-title":"Advances in Cryptology \u2014 EUROCRYPT\u2019 88","author":"L. C. Guillou","year":"1988","unstructured":"L. C. Guillou and J. J. Quisquater, \u201cA Practical Zero-Knowledge Protocol Fitted to Security Microprocessors Minimizing both Transmission and Memory\u201d, in Advances in Cryptology \u2014 EUROCRYPT\u2019 88, Lecture Notes in Computer Science 330, Springer-Verlag, Berlin, pp.123\u2013128 (1988)."},{"key":"38_CR8","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"246","DOI":"10.1007\/3-540-45961-8_21","volume-title":"Advances in Cryptology \u2014 EUROCRYPT\u2019 88","author":"S. Kawamura","year":"1988","unstructured":"S. Kawamura and K. Hirano, \u201cA Fast Modular Arithmetic Algorithm Using a Residue Table\u201d, in Advances in Cryptology \u2014 EUROCRYPT\u2019 88, Lecture Notes in Computer Science 330, Springer-Verlag, Berlin, pp.246\u2013250 (1988)."},{"key":"38_CR9","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"87","DOI":"10.1007\/3-540-45961-8_8","volume-title":"Advances in Cryptology \u2014 EUROCRYPT\u2019 88","author":"H. Knobloch","year":"1988","unstructured":"H. Knobloch, \u201cA Smart Card Implementation of the Fiat-Shamir Identification Scheme\u201d, in Advances in Cryptology \u2014 EUROCRYPT\u2019 88, Lecture Notes in Computer Science 330, Springer-Verlag, Berlin, pp.87\u201395 (1988)."},{"key":"38_CR10","volume-title":"Semi-Numerical Algorithms","author":"D. E. Knuth","year":"1981","unstructured":"D. E. Knuth, The Art of Computer Programming 2nd Edition, Vol.2, Semi-Numerical Algorithms. Reading, Massachusetts: Addison-Wesley (1981).","edition":"2nd Edition"},{"key":"38_CR11","unstructured":"S. Miyaguchi, K. Ohta, and M. Iwata, \u201cA 128-bit Hash Function (N-Hash)\u201d, Proceedings of SECURICOM\u201990, pp.123\u2013137 (Mar., 1990)."},{"key":"38_CR12","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"232","DOI":"10.1007\/0-387-34799-2_17","volume-title":"Advances in Cryptology \u2014 CRYPTO\u2019 88","author":"K. Ohta","year":"1990","unstructured":"K. Ohta and T. Okamoto, \u201cA Modification of the Fiat-Shamir Scheme\u201d, in Advances in Cryptology \u2014 CRYPTO\u2019 88, Lecture Notes in Computer Science 403, Springer-Verlag, Berlin, pp.232\u2013243 (1990)."},{"issue":"1","key":"38_CR13","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1109\/18.50373","volume":"IT-36","author":"T. Okamoto","year":"1990","unstructured":"T. Okamoto, \u201cA Fast Signature Scheme Based on Congruential Polynomial Operations\u201d, IEEE Transactions on Information Theory, Vol.IT-36, No.1, pp.47\u201353 (Jan., 1990).","journal-title":"IEEE Transactions on Information Theory"},{"key":"38_CR14","doi-asserted-by":"crossref","unstructured":"T. Okamoto and A. Shiraishi, \u201cA Digital Signature Scheme Based on Quadratic Inequalities\u201d, Proceeding of Symposium on Security and Privacy, IEEE, pp.123\u2013132 (Apr., 1985).","DOI":"10.1109\/SP.1985.10026"},{"key":"38_CR15","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"432","DOI":"10.1007\/3-540-46877-3_38","volume-title":"Advances in Cryptology \u2014 EUROCRYPT\u2019 90","author":"H. Ong","year":"1991","unstructured":"H. Ong and C. P. Schnorr, \u201cA Fast Signature Generation with the Fiat-Shamir Scheme\u201d, in Advances in Cryptology \u2014 EUROCRYPT\u2019 90, Lecture Notes in Computer Science 473, Springer-Verlag, Berlin, pp.432\u2013440 (1991)."},{"issue":"2","key":"38_CR16","doi-asserted-by":"publisher","first-page":"120","DOI":"10.1145\/359340.359342","volume":"21","author":"R. Rivest","year":"1978","unstructured":"R. Rivest, A. Shamir, and L. Adleman, \u201cA Method for Obtaining Digital Signatures and Public-Key Cryptosystems\u201d, Communications of the ACM, Vol.21, No.2, pp.120\u2013126 (Feb., 1978).","journal-title":"Communications of the ACM"},{"key":"38_CR17","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"47","DOI":"10.1007\/3-540-39568-7_5","volume-title":"Advances in Cryptology \u2014 CRYPTO\u2019 84","author":"A. Shamir","year":"1985","unstructured":"A. Shamir, \u201cIdentity-based Cryptosystems and Signature Schemes\u201d, Advances in Cryptology \u2014 CRYPTO\u2019 84, Lecture Notes in Computer Science 196, Springer-Verlag, Berlin, pp.47\u201353 (1985)."}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2014 EUROCRYPT \u201991"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-46416-6_38.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,17]],"date-time":"2020-11-17T21:11:31Z","timestamp":1605647491000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-46416-6_38"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540546207"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/3-540-46416-6_38","relation":{},"subject":[]}}