{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T20:52:52Z","timestamp":1725483172078},"publisher-location":"Berlin, Heidelberg","reference-count":6,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540663478"},{"type":"electronic","value":"9783540484059"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1999]]},"DOI":"10.1007\/3-540-48405-1_19","type":"book-chapter","created":{"date-parts":[[2007,5,1]],"date-time":"2007-05-01T06:24:36Z","timestamp":1178000676000},"page":"305-314","source":"Crossref","is-referenced-by-count":3,"title":["Weakness in Quaternion Signatures"],"prefix":"10.1007","author":[{"given":"Don","family":"Coppersmith","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[1999,12,16]]},"reference":[{"key":"19_CR1","doi-asserted-by":"publisher","first-page":"17","DOI":"10.2307\/2007870","volume":"48","author":"L.M. Adleman","year":"1987","unstructured":"L.M. Adleman, D.R. Estes and K.S. McCurley, \u201cSolving bivariate quadratic congruences in random polynomial time,\u201d Math. Comp.\n                  48 (1987), pp. 17\u201328.","journal-title":"Math. Comp."},{"key":"19_CR2","series-title":"Lect Notes Comput Sci","first-page":"435","volume-title":"Advances in Cryptology-CRYPTO\u2019 93","author":"D. Coppersmith","year":"1997","unstructured":"D. Coppersmith, J. Stern and S. Vaudenay, \u201cAttacks on the birational permutation signature schemes,\u201d Advances in Cryptology-CRYPTO\u2019 93, Springer LNCS 773, D.R. Stinson (Ed.), pp. 435\u2013443. Journal of Cryptology, Vol. 10, No. 3 (Summer 1997), pp. 207\u2013221."},{"key":"19_CR3","doi-asserted-by":"crossref","unstructured":"H. Ong, C.P. Schnorr and A. Shamir, \u201cAn efficient signature scheme based on quadratic equations,\u201d Proc. 16th ACM Symp. Theory of Computation, 1984, pp. 208\u2013216.","DOI":"10.1145\/800057.808683"},{"key":"19_CR4","doi-asserted-by":"publisher","first-page":"702","DOI":"10.1109\/TIT.1987.1057350","volume":"IT-33","author":"J.M. Pollard","year":"1987","unstructured":"J.M. Pollard and C.P. Schnorr, \u201cAn efficient solution of the congruence x\n                  2+ky\n                  2\n                  \u2261 m (mod n),\u201d IEEE Trans. Inf. Theory, Vol. IT-33, 1987, pp. 702\u2013709.","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"1","key":"19_CR5","first-page":"40","volume":"E80-A","author":"T. Satoh","year":"1997","unstructured":"T. Satoh and K. Araki, \u201cOn construction of signature scheme over a certain noncommutative ring,\u201d IEICE Trans. Fundamentals, Vol. E80-A, No. 1, January 1997, pp. 40\u201345.","journal-title":"IEICE Trans. Fundamentals"},{"key":"19_CR6","series-title":"Lect Notes Comput Sci","first-page":"1","volume-title":"Advances in Cryptology-CRYPTO\u2019 93","author":"A. Shamir","year":"1994","unstructured":"A. Shamir, \u201cEfficient signature schemes based on birational permutations,\u201d Advances in Cryptology-CRYPTO\u2019 93, Springer LNCS 773, D.R. Stinson (Ed.), pp. 1\u201312."}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2014 CRYPTO\u2019 99"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-48405-1_19","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,2,16]],"date-time":"2019-02-16T07:26:38Z","timestamp":1550301998000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-48405-1_19"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1999]]},"ISBN":["9783540663478","9783540484059"],"references-count":6,"URL":"https:\/\/doi.org\/10.1007\/3-540-48405-1_19","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[1999]]}}}