{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,5]],"date-time":"2025-10-05T04:32:18Z","timestamp":1759638738728},"publisher-location":"Berlin, Heidelberg","reference-count":7,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540576006"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/3-540-48285-7_4","type":"book-chapter","created":{"date-parts":[[2007,8,1]],"date-time":"2007-08-01T02:16:46Z","timestamp":1185934606000},"page":"40-49","source":"Crossref","is-referenced-by-count":36,"title":["A New Elliptic Curve Based Analogue of RSA"],"prefix":"10.1007","author":[{"given":"N.","family":"Demytko","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"4_CR1","doi-asserted-by":"publisher","first-page":"644","DOI":"10.1109\/TIT.1976.1055638","volume":"22","author":"W. Diffie","year":"1976","unstructured":"W. Diffie and M. Hellman, \u201cNew Directions in Cryptography\u201d, IEEE Transactions on Information Theory, Vol. 22, pp. 644\u2013654, 1976.","journal-title":"IEEE Transactions on Information Theory"},{"key":"4_CR2","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"417","DOI":"10.1007\/3-540-39799-X_31","volume-title":"Advances in Cryptology: Proceedings of CRYPTO\u2019 85","author":"V.S. Miller","year":"1986","unstructured":"V.S. Miller, \u201cUse of Elliptic Curves in Cryptography\u201d, Advances in Cryptology: Proceedings of CRYPTO\u2019 85, Lecture Notes in Computer Science, Vol. 218, pp. 417\u2013426, Springer-Verlag, 1986."},{"key":"4_CR3","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4684-0310-7","volume-title":"A Course in Number Theory and Cryptography","author":"N. Koblitz","year":"1987","unstructured":"N. Koblitz, A Course in Number Theory and Cryptography, Spinger-Verlag, New York, 1987."},{"key":"4_CR4","unstructured":"K. Koyama, U.M. Maurer, T. Okamoto and S.A. Vanstone, \u201cNew Public-Key Schemes Based on Elliptic Curves over the Ring Zn\u201d, CRYPTO\u2019 91 Abstracts, Santa Barbara, CA, pp. 6-1 to 6-7, August 11\u201315, 1991."},{"issue":"170","key":"4_CR5","doi-asserted-by":"publisher","first-page":"483","DOI":"10.2307\/2007968","volume":"44","author":"R. Schoof","year":"1985","unstructured":"R. Schoof, \u201cElliptic Curves Over Finite Fields and the Computation of Square Roots mod p\u201d, Mathematics of Computation, Vol.44, No.170, pp. 483\u2013494, 1985.","journal-title":"Mathematics of Computation"},{"key":"4_CR6","unstructured":"A.K. Lenstra and H.W. Lenstra, Jnr., \u201cAlgorithms in Number theory\u201d, University of Chicago, Department of computer Science, Technical Report # 87-008, 1987."},{"key":"4_CR7","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4612-4544-5","volume-title":"Factorisation and Primality Testing","author":"D.M. Bressoud","year":"1989","unstructured":"D.M. Bressoud, Factorisation and Primality Testing, Springer-Verlag, New York, 1989."}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2014 EUROCRYPT \u201993"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-48285-7_4.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,28]],"date-time":"2021-04-28T00:50:33Z","timestamp":1619571033000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-48285-7_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540576006"],"references-count":7,"URL":"https:\/\/doi.org\/10.1007\/3-540-48285-7_4","relation":{},"subject":[]}}