{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T22:18:47Z","timestamp":1725488327817},"publisher-location":"Berlin, Heidelberg","reference-count":14,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540573401"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/3-540-48071-4_4","type":"book-chapter","created":{"date-parts":[[2007,8,6]],"date-time":"2007-08-06T01:23:49Z","timestamp":1186363429000},"page":"54-65","source":"Crossref","is-referenced-by-count":2,"title":["An Efficient Digital Signature Scheme Based on an Elliptic Curve over the Ring Z n"],"prefix":"10.1007","author":[{"given":"Tatsuaki","family":"Okamoto","sequence":"first","affiliation":[]},{"given":"Atsushi","family":"Fujioka","sequence":"additional","affiliation":[]},{"given":"Eiichiro","family":"Fujisaki","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"4_CR1","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"28","DOI":"10.1007\/3-540-39799-X_4","volume-title":"Advances in Cryptology \u2014 CRYPTO\u201985","author":"E. Brickell","year":"1986","unstructured":"E. Brickell and J. DeLaurentis, \u201cAn Attack on a Signature Scheme Proposed by Okamoto and Shiraishi\u201d, Advances in Cryptology \u2014 CRYPTO\u201985, Lecture Notes in Computer Science No.218, Springer-Verlag, pp.28\u201332 (1986)."},{"issue":"6","key":"4_CR2","doi-asserted-by":"publisher","first-page":"644","DOI":"10.1109\/TIT.1976.1055638","volume":"IT-22","author":"W. Diffie","year":"1976","unstructured":"W. Diffie and M. E. Hellman, \u201cNew Directions in Cryptography\u201d, IEEE Transactions on Information Theory, Vol.IT-22, No.6, pp.644\u2013654 (Nov., 1976).","journal-title":"IEEE Transactions on Information Theory"},{"key":"4_CR3","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"83","DOI":"10.1007\/3-540-46877-3_8","volume-title":"Advances in Cryptology \u2014 EUROCRYPT\u201990","author":"J. Evertse","year":"1991","unstructured":"J. Evertse and E. van Heyst, \u201cWhich New RSA Signatures can be Computed from some Given RSA Signatures?\u201d, Advances in Cryptology \u2014 EUROCRYPT\u201990, Lecture Notes in Computer Science No.473, Springer-Verlag, pp.83\u201397 (1991)."},{"key":"4_CR4","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"446","DOI":"10.1007\/3-540-46416-6_38","volume-title":"Advances in Cryptology \u2014 EUROCRYPT\u201991","author":"A. Fujioka","year":"1991","unstructured":"A. Fujioka, T. Okamoto, and S. Miyaguchi, \u201cESIGN: An Efficient Digital Signature Implementation for Smart Cards\u201d, Advances in Cryptology \u2014 EUROCRYPT\u201991, Lecture Notes in Computer Science No.547, Springer-Verlag, pp.446\u2013457 (1991)."},{"key":"4_CR5","series-title":"Lect Notes Comput Sci","first-page":"403","volume-title":"Advances in Cryptology \u2014 CRYPTO\u201985","author":"J. Hastad","year":"1985","unstructured":"J. Hastad, \u201cOn Using RSA with Low Exponent in a Public Key Network\u201d, Advances in Cryptology \u2014 CRYPTO\u201985, Lecture Notes in Computer Science No.218, Springer-Verlag, pp.403\u2013408 (1985)."},{"key":"4_CR6","series-title":"Lect Notes Comput Sci","first-page":"84","volume-title":"Advances in Cryptology \u2014 CRYPTO\u201986","author":"B. S. Kaliski Jr.","year":"1986","unstructured":"B. S. Kaliski, Jr., \u201cA Pseudo-Random Bit Generator Based on Elliptic Logarithms\u201d, Advances in Cryptology \u2014 CRYPTO\u201986, Lecture Notes in Computer Science No.263, Springer-Verlag, pp.84\u2013103 (1986)."},{"key":"4_CR7","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"252","DOI":"10.1007\/3-540-46766-1_20","volume-title":"Advances in Cryptology \u2014 CRYPTO\u201991","author":"K. Koyama","year":"1992","unstructured":"K. Koyama, U. Maurer, T. Okamoto, and S. A. Vanstone, \u201cNew Public-Key Schemes Based on Elliptic Curves over the Ring Z\n                  n\u201d, Advances in Cryptology \u2014 CRYPTO\u201991, Lecture Notes in Computer Science No.576, Springer-Verlag, pp.252\u2013266 (1992)."},{"key":"4_CR8","unstructured":"D. E. Knuth, The Art of Computer Programming, 2nd Edition, Addison-Wesley Publishing Company (1981)."},{"key":"4_CR9","doi-asserted-by":"crossref","unstructured":"N. Koblitz, A. Course in Number Theory and Cryptography, Springer-Verlag (1987).","DOI":"10.1007\/978-1-4684-0310-7"},{"key":"4_CR10","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"156","DOI":"10.1007\/3-540-38424-3_11","volume-title":"Advances in Cryptology \u2014 CRYPTO\u201990","author":"N. Koblitz","year":"1991","unstructured":"N. Koblitz, \u201cConstructing Elliptic Curve Cryptosystems in Characteristics 2\u201d, Advances in Cryptology \u2014 CRYPTO\u201990, Lecture Notes in Computer Science No.537, Springer-Verlag, pp.156\u2013167 (1991)."},{"key":"4_CR11","unstructured":"National Institute for Standards and Technology, \u201cSpecifications for a Digital Signature Standard\u201d, Federal Information Processing Standard Publication XX, draft (Aug., 1991)."},{"issue":"1","key":"4_CR12","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1109\/18.50373","volume":"IT-36","author":"T. Okamoto","year":"1990","unstructured":"T. Okamoto, \u201cA Fast Signature Scheme Based on Congruential Polynomial Operations\u201d, IEEE Transactions on Information Theory, Vol.IT-36, No.1, pp.47\u201353 (Jan., 1990).","journal-title":"IEEE Transactions on Information Theory"},{"issue":"2","key":"4_CR13","doi-asserted-by":"publisher","first-page":"120","DOI":"10.1145\/359340.359342","volume":"21","author":"R. Rivest","year":"1978","unstructured":"R. Rivest, A. Shamir, and L. Adleman, \u201cA Method for Obtaining Digital Signatures and Public-Key Cryptosystems\u201d, Communications of the ACM, Vol.21, No.2, pp.120\u2013126 (Feb., 1978).","journal-title":"Communications of the ACM"},{"key":"4_CR14","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"281","DOI":"10.1007\/3-540-45961-8_26","volume-title":"Advances in Cryptology \u2014 Eurocrypt\u201988","author":"B. Vall\u00e9e","year":"1988","unstructured":"B. Vall\u00e9e, M. Girault, and P. Toffin, \u201cHow to Break Okamoto\u2019s Cryptosystem by Reducing Lattice Bases\u201d, Advances in Cryptology \u2014 Eurocrypt\u201988, Lecture Notes in Computer Science No.330, Springer-Verlag, pp.281\u2013292 (1988)."}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2014 CRYPTO\u2019 92"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-48071-4_4.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,17]],"date-time":"2020-11-17T21:15:20Z","timestamp":1605647720000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-48071-4_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540573401"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/3-540-48071-4_4","relation":{},"subject":[]}}