{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,20]],"date-time":"2026-04-20T05:23:50Z","timestamp":1776662630846,"version":"3.51.2"},"publisher-location":"Berlin, Heidelberg","reference-count":17,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540583332","type":"print"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/3-540-48658-5_22","type":"book-chapter","created":{"date-parts":[[2007,8,9]],"date-time":"2007-08-09T20:50:39Z","timestamp":1186692639000},"page":"216-233","source":"Crossref","is-referenced-by-count":165,"title":["Incremental Cryptography: The Case of Hashing and Signing"],"prefix":"10.1007","author":[{"given":"Mihir","family":"Bellare","sequence":"first","affiliation":[]},{"given":"Oded","family":"Goldreich","sequence":"additional","affiliation":[]},{"given":"Shafi","family":"Goldwasser","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"22_CR1","unstructured":"M. Bellare, J. Kilian and P. Rogaway. The security of cipher block chaining. Advances in Cryptology \u2014 Crypto 94 Proceedings."},{"key":"22_CR2","doi-asserted-by":"crossref","unstructured":"M. Bellare and P. Rogaway. Random oracles are practical: A paradigm for designing efficient protocols. Proceedings of the First Annual Conference on Computer and Communications Security, ACM, 1993.","DOI":"10.1145\/168588.168596"},{"key":"22_CR3","unstructured":"M. Bellare, O. Goldreich and S. Gpldwasser. Work in progress."},{"key":"22_CR4","series-title":"Lect Notes Comput Sci","volume-title":"Advances in Cryptology \u2014 Crypto 89 Proceedings","author":"J. Bos","year":"1989","unstructured":"J. Bos and M. Coster. Addition chain heuristics. Advances in Cryptology \u2014 Crypto 89 Proceedings, Lecture Notes in Computer Science Vol. 435, Springer-Verlag, G. Brassard, ed., 1989."},{"key":"22_CR5","unstructured":"S. Brands. An efficient off-line electronic cash system based on the representation problem. CWI Technical Report CS-R9323."},{"key":"22_CR6","series-title":"Lect Notes Comput Sci","volume-title":"Advances in Cryptology \u2014 Crypto 89 Proceedings","author":"D. Chaum","year":"1989","unstructured":"D. Chaum and H. Van Antwerpen. Undeniable signatures. Advances in Cryptology \u2014 Crypto 89 Proceedings, Lecture Notes in Computer Science Vol. 435, Springer-Verlag, G. Brassard, ed., 1989."},{"key":"22_CR7","series-title":"Lect Notes Comput Sci","volume-title":"Advances in Cryptology \u2014 Crypto 91 Proceedings","author":"D. Chaum","year":"1991","unstructured":"D. Chaum, E. Heijst and B. Pfitzmann. Cryptographically strong undeniable signatures, unconditionally secure for the signer. Advances in Cryptology \u2014 Crypto 91 Proceedings, Lecture Notes in Computer Science Vol. 576, Springer-Verlag, J. Feigenbaum, ed., 1991."},{"key":"22_CR8","unstructured":"Croft and Harris. Public key cryptography and re-usable shared secrets. In Cryptography and Coding, Clarendon Press, 1989."},{"key":"22_CR9","series-title":"Lect Notes Comput Sci","volume-title":"Advances in Cryptology \u2014 Eurocrypt 87 Proceedings","author":"I. Damg\u00e5rd","year":"1987","unstructured":"I. Damg\u00e5rd. Collision free hash functions and public key signature schemes. Advances in Cryptology \u2014 Eurocrypt 87 Proceedings, Lecture Notes in Computer Science Vol. 304, Springer-Verlag, D. Chaum, ed., 1987."},{"key":"22_CR10","doi-asserted-by":"crossref","unstructured":"T. El Gamal. A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Trans. Info. Theory, Vol. IT 31, 1985.","DOI":"10.1109\/TIT.1985.1057074"},{"key":"22_CR11","unstructured":"S. Even, O. Goldrech and S. Micali. On-line\/Off line digital signatures. Manuscript. Preliminary version in Crypto 89."},{"key":"22_CR12","doi-asserted-by":"crossref","unstructured":"O. Goldreich and L. Levin. A hard predicate for all one-way functions. Proceedings of the Twenty First Annual Symposium on the Theory of Computing, ACM, 1989.","DOI":"10.1145\/73007.73010"},{"issue":"2","key":"22_CR13","doi-asserted-by":"publisher","first-page":"281","DOI":"10.1137\/0217017","volume":"17","author":"S. Goldwasser","year":"1988","unstructured":"S. Goldwasser, S. Micali and R. Rivest. A digital signature scheme secure against adaptive chosen-message attacks. SIAM Journal of Computing, 17(2):281\u2013308, April 1988.","journal-title":"SIAM Journal of Computing"},{"key":"22_CR14","doi-asserted-by":"crossref","unstructured":"R. Impagliazzo, L. Levin and M. Luby. Pseudo-random generation from one-way functions. Proceedings of the Twenty First Annual Symposium on the Theory of Computing, ACM, 1989.","DOI":"10.1145\/73007.73009"},{"key":"22_CR15","doi-asserted-by":"crossref","unstructured":"M. Naor and M. Yung. Universal One-Way Hash Functions and their Cryptographic Applications. Proceedings of the Twenty First Annual Symposium on the Theory of Computing, ACM, 1989.","DOI":"10.1145\/73007.73011"},{"key":"22_CR16","doi-asserted-by":"crossref","unstructured":"R. Rivest. The MD5 message-digest algorithm. IETF Network Working Group, RFC 1321, April 1992.","DOI":"10.17487\/rfc1321"},{"key":"22_CR17","series-title":"Lect Notes Comput Sci","volume-title":"Advances in Cryptology \u2014 Crypto 89 Proceedings","author":"C. Schnorr","year":"1989","unstructured":"C. Schnorr. Efficient identification and signatures for smart cards. Advances in Cryptology \u2014 Crypto 89 Proceedings, Lecture Notes in Computer Science Vol. 435, Springer-Verlag, G. Brassard, ed., 1989."}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2014 CRYPTO \u201994"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-48658-5_22.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,17]],"date-time":"2020-11-17T21:16:12Z","timestamp":1605647772000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-48658-5_22"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540583332"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/3-540-48658-5_22","relation":{},"subject":[]}}