{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T22:26:33Z","timestamp":1725488793102},"publisher-location":"Berlin, Heidelberg","reference-count":10,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540583332"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/3-540-48658-5_21","type":"book-chapter","created":{"date-parts":[[2007,8,9]],"date-time":"2007-08-09T20:50:39Z","timestamp":1186692639000},"page":"202-215","source":"Crossref","is-referenced-by-count":31,"title":["On the length of cryptographic hash-values used in identification schemes"],"prefix":"10.1007","author":[{"given":"Marc","family":"Girault","sequence":"first","affiliation":[]},{"given":"Jacques","family":"Stern","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"21_CR1","unstructured":"W. Feller, An introduction to probability theory and its applications, J. Wiley & Sons, 1968."},{"issue":"2","key":"21_CR2","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1007\/BF02351717","volume":"1","author":"U. Feige","year":"1988","unstructured":"U. Feige, A. Fiat and A. Shamir, Zero-knowledge proofs of identity, Journal of Cryptology, Vol. 1, No2, 1988, pp. 77\u201394.","journal-title":"Journal of Cryptology"},{"key":"21_CR3","series-title":"Lect Notes Comput Sci","first-page":"186","volume-title":"Advances of Cryptology: Proceedings of CRYPTO\u201986","author":"A. Fiat","year":"1987","unstructured":"A. Fiat and A. Shamir, How to prove yourself: Practical solutions to identification and signature problems, Advances of Cryptology: Proceedings of CRYPTO\u201986, Lecture Notes in Computer Science, Vol. 263, Springer-Verlag, Berlin, 1987, pp. 186\u2013194."},{"key":"21_CR4","doi-asserted-by":"crossref","unstructured":"S. Goldwasser, S. Micali and C. Rackoff, The knowledge of interactive proof-systems, Proceedings of 17th ACM Symposium on Theory of Computing, 1985, pp. 291\u2013304.","DOI":"10.1145\/22145.22178"},{"key":"21_CR5","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"123","DOI":"10.1007\/3-540-45961-8_11","volume-title":"Advances of Cryptology: Proceedings of EUROCRYPT\u201988","author":"L.C. Guillou","year":"1988","unstructured":"L.C. Guillou and J.J. Quisquater, A practical zero-knowledge protocol fitted to security microprocessors minimizing both transmission and memory, Advances of Cryptology: Proceedings of EUROCRYPT\u201988, Lecture Notes in Computer Science, Vol. 330, Springer-Verlag, Berlin, 1988, pp. 123\u2013128."},{"issue":"5","key":"21_CR6","doi-asserted-by":"publisher","first-page":"702","DOI":"10.1109\/TIT.1987.1057350","volume":"IT-33","author":"J.M. Pollard","year":"1987","unstructured":"J.M. Pollard and C.P. Schnorr, An efficient solution of the congruence x 2 + ky 2 = m (mod n), IEEE Transactions on Information Theory, Vol. IT-33, No5, 1987, pp. 702\u2013709.","journal-title":"IEEE Transactions on Information Theory"},{"key":"21_CR7","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"239","DOI":"10.1007\/0-387-34805-0_22","volume-title":"Advances of Cryptology: Proceedings of CRYPTO\u201989","author":"C.P. Schnorr","year":"1987","unstructured":"C.P. Schnorr, Efficient identification and signature for smart cards, Advances of Cryptology: Proceedings of CRYPTO\u201989, Lecture Notes in Computer Science, Vol. 435, Springer-Verlag, Berlin, 1987, pp. 239\u2013252."},{"key":"21_CR8","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"606","DOI":"10.1007\/0-387-34805-0_54","volume-title":"Advances of Cryptology: Proceedings of CRYPTO\u201989","author":"A. Shamir","year":"1987","unstructured":"A. Shamir, An efficient identification scheme based on permuted kernels, Advances of Cryptology: Proceedings of CRYPTO\u201989, Lecture Notes in Computer Science, Vol. 435, Springer-Verlag, Berlin, 1987, pp. 606\u2013609."},{"key":"21_CR9","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"173","DOI":"10.1007\/3-540-46885-4_19","volume-title":"Advances of Cryptology: Proceedings of EUROCRYPT\u201989","author":"J. Stern","year":"1990","unstructured":"J. Stern, An alternative to the Fiat-Shamir protocol, Advances of Cryptology: Proceedings of EUROCRYPT\u201989, Lecture Notes in Computer Science, Vol. 434, Springer-Verlag, Berlin, 1990, pp. 173\u2013180."},{"key":"21_CR10","unstructured":"J. Stern, A new identification scheme based on syndrome decoding, Advances of Cryptology: Proceedings of CRYPTO\u201993, to appear."}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2014 CRYPTO \u201994"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-48658-5_21.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,17]],"date-time":"2020-11-17T21:16:11Z","timestamp":1605647771000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-48658-5_21"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540583332"],"references-count":10,"URL":"https:\/\/doi.org\/10.1007\/3-540-48658-5_21","relation":{},"subject":[]}}