{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,1,20]],"date-time":"2025-01-20T07:40:11Z","timestamp":1737358811261,"version":"3.33.0"},"publisher-location":"Berlin, Heidelberg","reference-count":14,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540583332"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/3-540-48658-5_7","type":"book-chapter","created":{"date-parts":[[2007,8,9]],"date-time":"2007-08-09T20:50:39Z","timestamp":1186692639000},"page":"56-60","source":"Crossref","is-referenced-by-count":1,"title":["Cryptographic Protocols Based on Discrete Logarithms in Real-quadratic Orders"],"prefix":"10.1007","author":[{"given":"Ingrid","family":"Biehl","sequence":"first","affiliation":[]},{"given":"Johannes","family":"Buchmann","sequence":"additional","affiliation":[]},{"given":"Christoph","family":"Thiel","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"7_CR1","doi-asserted-by":"crossref","unstructured":"Bernstein, D.J., Lenstra, A.K.: A general number field sieve implementation. In: A. K. Lenstra, H. W. Lenstra, Jr. (Eds.) The Development of the Number Field Sieve (LNM 1554) (1993), Springer-Verlag, pp. 103\u2013126","DOI":"10.1007\/BFb0091541"},{"key":"7_CR2","unstructured":"Buchmann, J., Thiel, C., Williams, H.C.: Short representation of quadratic integers. To appear in Proc. of CANT 1992"},{"key":"7_CR3","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"16","DOI":"10.1007\/3-540-54458-5_45","volume-title":"Proc. of FCT\u201991","author":"J. Buchmann","year":"1991","unstructured":"Buchmann, J.: Number Theoretic Algorithms and Cryptology. Proc. of FCT\u201991 (LNCS 529) (1991), Springer-Verlag, pp. 16\u201321"},{"key":"7_CR4","series-title":"Lect Notes Comput Sci","first-page":"335","volume-title":"Proc. of CRYPTO\u201989","author":"J. Buchmann","year":"1989","unstructured":"Buchmann, J., Williams, H.C.: A Key Exchange System Based on Real-quadratic Fields. Proc. of CRYPTO\u201989 (LNCS 435) (1989), Springer-Verlag, pp. 335\u2013343"},{"key":"7_CR5","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"159","DOI":"10.1007\/3-540-56496-9","volume-title":"Proc. of CRYPTO\u201993","author":"J. Buchmann","year":"1993","unstructured":"Buchmann, J., Loho, J., Zayer, J.: An Implementation of the General Number Field Sieve. Proc. of CRYPTO\u201993 (LNCS 773) (1993), Springer-Verlag, pp. 159\u2013165"},{"key":"7_CR6","doi-asserted-by":"crossref","unstructured":"Biehl, I., Buchmann, J.: Algorithms for quadratic orders. To appear in Proc. of Symposia in Applied Mathematics (1993)","DOI":"10.1090\/psapm\/048\/1314882"},{"key":"7_CR7","doi-asserted-by":"publisher","first-page":"472","DOI":"10.1109\/TIT.1976.1055638","volume":"22","author":"W. Diffie","year":"1976","unstructured":"Diffie, W., Hellman, M.: New directions in Cryptography. IEEE Trans. Inform. Theory 22 (1976), pp. 472\u2013492","journal-title":"IEEE Trans. Inform. Theory"},{"key":"7_CR8","doi-asserted-by":"publisher","first-page":"469","DOI":"10.1109\/TIT.1985.1057074","volume":"31","author":"T. ElGamal","year":"1985","unstructured":"ElGamal, T.: A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Trans. Inform. Theory 31 (1985), pp. 469\u2013472","journal-title":"IEEE Trans. Inform. Theory"},{"key":"7_CR9","doi-asserted-by":"publisher","first-page":"124","DOI":"10.1137\/0406010","volume":"6","author":"D. Gordon","year":"1993","unstructured":"Gordon, D.: Discrete Logarithms in GF(p) Using the Number Field Sieve. Siam Jour. on Discrete Math. 6 (1993), pp. 124\u2013138","journal-title":"Siam Jour. on Discrete Math."},{"key":"7_CR10","doi-asserted-by":"publisher","first-page":"203","DOI":"10.2307\/2007884","volume":"48","author":"N. Koblitz","year":"1987","unstructured":"Koblitz, N.: Elliptic curve cryptosystems. Math. Comp. 48 (1987), pp. 203\u2013209","journal-title":"Math. Comp."},{"key":"7_CR11","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"417","DOI":"10.1007\/3-540-39799-X_31","volume-title":"Proc. of CRYPTO\u201985","author":"V. Miller","year":"1986","unstructured":"Miller, V.: Use of Elliptic Curves in Cryptography. Proc. of CRYPTO\u201985 (LNCS 218) (1986), Springer-Verlag, pp. 417\u2013426"},{"issue":"7","key":"7_CR12","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1145\/129902.129904","volume":"35","author":"National Institute of Standards and Technology.","year":"1992","unstructured":"National Institute of Standards and Technology. The Digital Signature Standard, proposal and discussion. Comm. of the ACM, 35(7), Juli 1992, pp. 36\u201354","journal-title":"Comm. of the ACM"},{"key":"7_CR13","series-title":"Lect Notes Comput Sci","first-page":"98","volume-title":"Proc. of EUROCRYPT\u201990","author":"R. Scheidler","year":"1990","unstructured":"Scheidler, R., Buchmann, J., Williams, H.C.: Implementation of a Key Exchange Protocol Using Real Quadratic Fields. Proc. of EUROCRYPT\u201990 (LNCS 473) (1990), Springer-Verlag, pp. 98\u2013109"},{"key":"7_CR14","unstructured":"Shanks, D.: The infrastructure of a real quadratic field and its applications. Proc. of the 1972 Number Theory Conference, Boulder (1972), pp. 217\u2013224"}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2014 CRYPTO \u201994"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-48658-5_7.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,20]],"date-time":"2025-01-20T07:02:43Z","timestamp":1737356563000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-48658-5_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540583332"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/3-540-48658-5_7","relation":{},"subject":[]}}