{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,1]],"date-time":"2026-03-01T06:31:37Z","timestamp":1772346697784,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":11,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540583332","type":"print"},{"value":"9783540486589","type":"electronic"}],"license":[{"start":{"date-parts":[[1994,1,1]],"date-time":"1994-01-01T00:00:00Z","timestamp":757382400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1994]]},"DOI":"10.1007\/3-540-48658-5_18","type":"book-chapter","created":{"date-parts":[[2007,8,9]],"date-time":"2007-08-09T20:50:39Z","timestamp":1186692639000},"page":"164-173","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":41,"title":["Designing Identification Schemes with Keys of Short Size"],"prefix":"10.1007","author":[{"given":"Jacques","family":"Stern","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2001,7,13]]},"reference":[{"key":"18_CR1","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"305","DOI":"10.1007\/3-540-48071-4_21","volume-title":"Proceedings of Crypto 92","author":"T. Baritaud","year":"1993","unstructured":"T. Baritaud, M. Campana, P. Chauvaud and H. Gilbert: On the security of the permuted kernel identification scheme. In: Proceedings of Crypto 92. Lecture Notes in Computer Science 740. Berlin: Springer 1993, pp. 305\u2013311."},{"key":"18_CR2","unstructured":"M. Bellare and P. Rogaway: Random oracles are practical: a paradigm for designing efficient protocols. In: Proceedings of the 1st ACM Conference on Computer and Communications Security, 1993, pp. 62\u201373."},{"key":"18_CR3","series-title":"Lect Notes Comput Sci","volume-title":"Proceedings of Eurocrypt 94","author":"F. Chabaud","year":"1994","unstructured":"F. Chabaud: On the security of some cryptosystems based on error-correcting codes. In: Proceedings of Eurocrypt 94. Lecture Notes in Computer Science, to appear."},{"key":"18_CR4","series-title":"Lect Notes Comput Sci","first-page":"181","volume-title":"Proceedings of Crypto 86","author":"A. Fiat","year":"1987","unstructured":"A. Fiat and A. Shamir: How to prove yourself: Practical solutions to identification and signature problems. In: Proceedings of Crypto 86. Lecture Notes in Computer Science 263. Berlin: Springer 1987, pp. 181\u2013187."},{"key":"18_CR5","doi-asserted-by":"crossref","unstructured":"U. Feige, A. Fiat and A. Shamir: Zero-knowledge proofs of identity. In: Proc. 19th ACM Symp. Theory of Computing, 1987, pp. 210\u2013217 and J. Cryptology\n                  1, 77\u201395 (1988).","DOI":"10.1007\/BF02351717"},{"key":"18_CR6","unstructured":"S. Goldwasser, S. Micali and C. Rackoff: The knowledge complexity of interactive proof systems. In: Proc. 17th ACM Symp. Theory of Computing, 1995, pp.291\u2013304."},{"key":"18_CR7","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"391","DOI":"10.1007\/3-540-48329-2_33","volume-title":"Proceedings of Crypto 93","author":"J. Patarin","year":"1994","unstructured":"J. Patarin and P. Chauvaud: Improved algorithms for the permuted kernel problem. In: Proceedings of Crypto 93, Lecture Notes in Computer Science 773. Berlin: Springer 1994, pp. 391\u2013402."},{"key":"18_CR8","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"606","DOI":"10.1007\/0-387-34805-0_54","volume-title":"Proceedings of Crypto 89","author":"A. Shamir","year":"1990","unstructured":"A. Shamir: An efficient identification scheme based on permuted kernels. In: Proceedings of Crypto 89. Lecture Notes in Computer Science 435. Berlin: Springer 1990, pp. 606\u2013609."},{"key":"18_CR9","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"303","DOI":"10.1007\/3-540-38424-3_22","volume-title":"Proceedings of Crypto 90","author":"R. L. Rivest","year":"1991","unstructured":"R. L. Rivest: The MD5 Message Digest Algorithm. In: Proceedings of Crypto 90. Lecture Notes in Computer Science 537. Berlin: Springer 1991, pp. 303\u2013311."},{"key":"18_CR10","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"173","DOI":"10.1007\/3-540-46885-4_19","volume-title":"Proceedings of Eurocrypt 89","author":"J. Stern","year":"1990","unstructured":"J. Stern: An alternative to the Fiat-Shamir protocol. In: Proceedings of Eurocrypt 89. Lecture Notes in Computer Science 434. Berlin: Springer 1990, pp. 173\u2013180."},{"key":"18_CR11","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"13","DOI":"10.1007\/3-540-48329-2_2","volume-title":"Proceedings of Crypto 93","author":"J. Stern","year":"1994","unstructured":"J. Stern: A new identification scheme based on syndrome decoding. In: Proceedings of Crypto 93. Lecture Notes in Computer Science 773. Berlin: Springer 1994, pp. 13\u201321."}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2014 CRYPTO \u201994"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-48658-5_18","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,19]],"date-time":"2019-05-19T14:06:36Z","timestamp":1558274796000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-48658-5_18"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1994]]},"ISBN":["9783540583332","9783540486589"],"references-count":11,"URL":"https:\/\/doi.org\/10.1007\/3-540-48658-5_18","relation":{},"ISSN":["0302-9743"],"issn-type":[{"value":"0302-9743","type":"print"}],"subject":[],"published":{"date-parts":[[1994]]},"assertion":[{"value":"13 July 2001","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}