{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T22:17:51Z","timestamp":1725488271809},"publisher-location":"Berlin, Heidelberg","reference-count":9,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540576006"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/3-540-48285-7_19","type":"book-chapter","created":{"date-parts":[[2007,8,1]],"date-time":"2007-08-01T02:16:46Z","timestamp":1185934606000},"page":"233-239","source":"Crossref","is-referenced-by-count":2,"title":["Can O.S.S. be Repaired? - Proposal for a New Practical Signature Scheme -"],"prefix":"10.1007","author":[{"given":"David","family":"Naccache","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"19_CR1","doi-asserted-by":"crossref","unstructured":"H. ONG, C. SCHNORR & A. SHAMIR, \u201cAn efficient signature scheme based on quadratic equations\u201d in Proceedings of the 16th Symposium on the Theory of Computing, Washington, 1984, pp. 208\u2013216.","DOI":"10.1145\/800057.808683"},{"issue":"5","key":"19_CR2","doi-asserted-by":"publisher","first-page":"702","DOI":"10.1109\/TIT.1987.1057350","volume":"IT-33","author":"J. Pollard","year":"1987","unstructured":"J. POLLARD & C. SCHNORR, \u201cAn efficient solution of the congruence x 2 + ky 2 = m mod n\u201d, IEEE Transactions on Information Theory, vol. IT-33, no. 5., September 1987, pp 702\u2013709.","journal-title":"IEEE Transactions on Information Theory"},{"issue":"177","key":"19_CR3","doi-asserted-by":"publisher","first-page":"17","DOI":"10.2307\/2007870","volume":"48","author":"L. Adleman","year":"1987","unstructured":"L. ADLEMAN, D. ESTES & K. McCURLEY, \u201cSolving bivariate quadratic congruences in random polynomial time\u201d, Mathematics of Computation, vol. 48, no. 177, January 1987, pp 17\u201328.","journal-title":"Mathematics of Computation"},{"key":"19_CR4","series-title":"Lect Notes Comput Sci","volume-title":"Proceedings of Crypto\u201984","author":"A. Shamir","year":"1985","unstructured":"A. SHAMIR, \u201cIdentity-Based Cryptosystems and Signature Schemes\u201d, Proceedings of Crypto\u201984, Lecture Notes in Computer Science, no. 196, Springer-Verlag 1985."},{"key":"19_CR5","series-title":"Lect Notes Comput Sci","volume-title":"Proceedings of Crypto\u201986","author":"A. Fiat","year":"1986","unstructured":"A. FIAT & A. SHAMIR, \u201cHow to Prove Yourself: Practical Solutions to Identification and Signature Problems\u201d, Proceedings of Crypto\u201986, Lecture Notes in Computer Science, no. 263, Springer-Verlag 1986."},{"key":"19_CR6","series-title":"Lect Notes Comput Sci","volume-title":"Proceedings of Crypto\u201984","author":"H. Ong","year":"1985","unstructured":"H. ONG, C. SCHNORR & A. SHAMIR, \u201cEfficient Signature Schemes Based on Polynomial Equations\u201d, Proceedings of Crypto\u201984, Lecture Notes in Computer Science, no. 196, Springer-Verlag 1985."},{"issue":"2","key":"19_CR7","doi-asserted-by":"publisher","first-page":"120","DOI":"10.1145\/359340.359342","volume":"21","author":"R. Rivest","year":"1978","unstructured":"R. RIVEST, A. SHAMIR & L. ADLEMAN, \u201cA Method for Obtaining Digital Signatures and Public-Key Cryptosystems\u201d, Comm: ACM 21,2 (Feb. 1978), pp 120\u2013126.","journal-title":"Comm: ACM"},{"key":"19_CR8","unstructured":"D. NACCACHE, \u201cUnless Modified Fiat-Shamir is Insecure\u201d, Proceedings of the Third Symposium on State and Progress of Research in Cryptography: SPRC\u201993, Fondazione Ugo Bordont (1993), pp 172\u2013180."},{"key":"19_CR9","unstructured":"D. NACCACHE & D. M\u2019RAIHI, \u201cA strictly DSS-compatible scheme without 1\/k mod q\u201d, to appear."}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2014 EUROCRYPT \u201993"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-48285-7_19.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,28]],"date-time":"2021-04-28T00:50:24Z","timestamp":1619571024000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-48285-7_19"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540576006"],"references-count":9,"URL":"https:\/\/doi.org\/10.1007\/3-540-48285-7_19","relation":{},"subject":[]}}