{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,6]],"date-time":"2025-12-06T04:53:50Z","timestamp":1764996830394},"publisher-location":"Berlin, Heidelberg","reference-count":10,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540671855"},{"type":"electronic","value":"9783540465133"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2000]]},"DOI":"10.1007\/3-540-46513-8_12","type":"book-chapter","created":{"date-parts":[[2007,8,2]],"date-time":"2007-08-02T10:47:23Z","timestamp":1186051643000},"page":"163-174","source":"Crossref","is-referenced-by-count":2,"title":["Improving and Extending the Lim\/Lee Exponentiation Algorithm"],"prefix":"10.1007","author":[{"given":"Biljana","family":"Cubaleska","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Andreas","family":"Rieke","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Thomas","family":"Hermann","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2001,7,27]]},"reference":[{"key":"12_CR1","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"400","DOI":"10.1007\/0-387-34805-0_37","volume-title":"Advances in Cryptology-CRYPTO\u2019 89","author":"J. Bos","year":"1990","unstructured":"J. Bos and M. Coster. Addition Chain Heuristics. In G. Brassard, editor, Advances in Cryptology-CRYPTO\u2019 89. LNCS 435, pp. 400\u2013407. Springer-Verlag, 1990."},{"key":"12_CR2","doi-asserted-by":"crossref","first-page":"29","DOI":"10.1007\/BF00191319","volume":"5","author":"E. F. Brickell","year":"1992","unstructured":"E. F. Brickell and K. S. McCurley. An Interactive Identification Scheme Based on Discrete Logarithms and Factoring. In Journal of Cryptology 5 (1992), no. 1, pp. 29\u201339.","journal-title":"Journal of Cryptology"},{"issue":"17","key":"12_CR3","doi-asserted-by":"publisher","first-page":"1171","DOI":"10.1049\/el:19890785","volume":"25","author":"J. Jedwab","year":"1989","unstructured":"J. Jedwab and C. J. Mitchell. Minimum Weight Modified Signed-Digit Representations and Fast Exponentiation. Elect. Let. 25(17), pp. 1171\u20131172 (1989).","journal-title":"Elect. Let."},{"key":"12_CR4","unstructured":"D. E. Knuth. The Art of Computer Programming, Vol.2: Seminumerical algorithms. Third edition, Addison-Wesley, 1997."},{"key":"12_CR5","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"95","DOI":"10.1007\/3-540-48658-5_11","volume-title":"Advances in Cryptology-CRYPTO\u2019 94","author":"C. H. Lim","year":"1994","unstructured":"C. H. Lim and P. J. Lee. More Flexible Exponentiation with Precomputation. In Yvo G. Desmedt, editor, Advances in Cryptology-CRYPTO\u2019 94. LNCS 839, pp. 95\u2013107. Springer-Verlag, 1994."},{"key":"12_CR6","series-title":"CRC Press series on discrete mathematics and its applications","volume-title":"Handbook of Applied Cryptography","author":"A. J. Menezes","year":"1997","unstructured":"A. J. Menezes, P. C. van Oorschot, and Scott A. Vanstone. Handbook of Applied Cryptography. CRC Press series on discrete mathematics and its applications. CRC Press, Boca Raton, 1997."},{"key":"12_CR7","unstructured":"National Institute of Technology and Standards. Specifications for the Digital Signature Standard (DSS). Federal Information Processing Standards Publication XX, US Department of Commerce, February 1 1993."},{"key":"12_CR8","doi-asserted-by":"publisher","first-page":"120","DOI":"10.1145\/359340.359342","volume":"21","author":"R. L. Rivest","year":"1978","unstructured":"R. L. Rivest, A. Shamir, and L. Adleman. A Method for Obtaining Digital Signatures and Public Key Cryptosystems. Communications of ACM 21 (1978), pp 120\u2013126.","journal-title":"Communications of ACM"},{"key":"12_CR9","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"389","DOI":"10.1007\/BFb0053453","volume-title":"Advances in Cryptology-EUROCRYPT\u2019 94","author":"P. Rooij de","year":"1994","unstructured":"P. de Rooij. Efficient Exponentiation Using Precomputation and Vector Addition Chains. In de Santis, editor, Advances in Cryptology-EUROCRYPT\u2019 94. LNCS 950, pp. 389\u2013399. Springer-Verlag, 1994."},{"issue":"3","key":"12_CR10","doi-asserted-by":"publisher","first-page":"161","DOI":"10.1007\/BF00196725","volume":"4","author":"C. P. Schnorr","year":"1991","unstructured":"C. P. Schnorr. Efficient Signature Generation by Smart Cards. In Journal of Cryptology 4 (1991), no. 3, pp. 161\u2013174.","journal-title":"Journal of Cryptology"}],"container-title":["Lecture Notes in Computer Science","Selected Areas in Cryptography"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-46513-8_12","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,4,25]],"date-time":"2020-04-25T14:51:04Z","timestamp":1587826264000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-46513-8_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2000]]},"ISBN":["9783540671855","9783540465133"],"references-count":10,"URL":"https:\/\/doi.org\/10.1007\/3-540-46513-8_12","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[2000]]}}}