{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,4]],"date-time":"2026-02-04T15:02:05Z","timestamp":1770217325246,"version":"3.49.0"},"publisher-location":"Berlin, Heidelberg","reference-count":10,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540564133","type":"print"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/3-540-47555-9_18","type":"book-chapter","created":{"date-parts":[[2007,8,8]],"date-time":"2007-08-08T23:23:49Z","timestamp":1186615429000},"page":"200-207","source":"Crossref","is-referenced-by-count":127,"title":["Fast Exponentiation with Precomputation"],"prefix":"10.1007","author":[{"given":"Ernest F.","family":"Brickell","sequence":"first","affiliation":[]},{"given":"Daniel M.","family":"Gordon","sequence":"additional","affiliation":[]},{"given":"Kevin S.","family":"McCurley","sequence":"additional","affiliation":[]},{"given":"David B.","family":"Wilson","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"18_CR1","unstructured":"A Proposed Federal Information Processing Standard for Digital Signature Standard, Federal Register, Volume 56, No. 169, August 31, 1991, pp. 42980\u201342982."},{"key":"18_CR2","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"400","DOI":"10.1007\/0-387-34805-0_37","volume-title":"Advances in Cryptology-Proceedings of Crypto\u2019 89","author":"J. Bos","year":"1990","unstructured":"J. Bos and M. Coster, Addition Chain Heuristics, in Advances in Cryptology-Proceedings of Crypto\u2019 89, Lecture Notes in Computer Science, Volume 435, Springer-Verlag, New York, 1990, pp. 400\u2013407."},{"key":"18_CR3","doi-asserted-by":"publisher","first-page":"472","DOI":"10.1109\/TIT.1976.1055638","volume":"22","author":"W. Diffie","year":"1976","unstructured":"W. Diffie and M. Hellman, New Directions in Cryptography, IEEE Transactions on Information Theory\n                  22 (1976), 472\u2013492.","journal-title":"IEEE Transactions on Information Theory"},{"key":"18_CR4","unstructured":"E.F. Brickell and K.S. McCurley, An Interactive Identification Scheme Based on Discrete Logarithms and Factoring, to appear in Journal of Cryptology."},{"key":"18_CR5","first-page":"954","volume":"17","author":"R. Fuji-Hara","year":"1985","unstructured":"Ryo Fuji-Hara, Cipher Algorithms and Computational Complexity, Bit 17 (1985), 954\u2013959 (in Japanese).","journal-title":"Bit"},{"key":"18_CR6","unstructured":"D.E. Knuth,The Art of Computer Programming, Vol. 2, Seminumerical Algorithms, Second Edition, Addison-Wesley, Massachusetts, 1981."},{"key":"18_CR7","doi-asserted-by":"publisher","first-page":"1131","DOI":"10.1145\/322344.322355","volume":"29","author":"D.W. Matula","year":"1982","unstructured":"D.W. Matula, Basic digit sets for radix representation, Journal of the ACM, 29 (1982), pp. 1131\u20131143.","journal-title":"Journal of the ACM"},{"key":"18_CR8","unstructured":"C.P. Schnorr, Efficient signature generation by smart cards, to appear in Journal of Cryptology."},{"key":"18_CR9","doi-asserted-by":"publisher","first-page":"711","DOI":"10.1137\/0219049","volume":"19","author":"D.R. Stinson","year":"1990","unstructured":"D.R. Stinson, Some observations on parallel algorithms for fast exponentiation in GF(2n), Siam. J. Comput., 19, (1990), pp. 711\u2013717.","journal-title":"Siam. J. Comput."},{"key":"18_CR10","first-page":"431","volume-title":"Handbook of Theoretical Computer Science","author":"J.S. Vitter","year":"1990","unstructured":"J.S. Vitter and P. Flajolet, Average-case analysis of algorithms and data structures, in Handbook of Theoretical Computer Science, ed. J. van Leeuwen, Elsevier, Amsterdam, 1990, pp. 431\u2013524."}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2014 EUROCRYPT\u2019 92"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-47555-9_18.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,17]],"date-time":"2020-11-17T21:13:55Z","timestamp":1605647635000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-47555-9_18"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540564133"],"references-count":10,"URL":"https:\/\/doi.org\/10.1007\/3-540-47555-9_18","relation":{},"subject":[]}}