{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,27]],"date-time":"2025-07-27T07:55:58Z","timestamp":1753602958804},"publisher-location":"Berlin, Heidelberg","reference-count":12,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540583332"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/3-540-48658-5_9","type":"book-chapter","created":{"date-parts":[[2007,8,9]],"date-time":"2007-08-09T20:50:39Z","timestamp":1186692639000},"page":"75-82","source":"Crossref","is-referenced-by-count":27,"title":["Directed Acyclic Graphs, One-way Functions and Digital Signatures"],"prefix":"10.1007","author":[{"given":"Daniel","family":"Bleichenbacher","sequence":"first","affiliation":[]},{"given":"Ueli M.","family":"Maurer","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"9_CR1","series-title":"Lect Notes Comput Sci","first-page":"1","volume-title":"Advances in Cryptology \u2014 CRYPTO\u2019 92","author":"J.N.E. Bos","year":"1993","unstructured":"J.N.E. Bos and D. Chaum, Provably unforgeable signatures, Advances in Cryptology \u2014 CRYPTO\u2019 92 (E. Brickell, ed.), Lecture Notes in Computer Science, vol. 740, Springer Verlag, 1993, pp. 1\u201314."},{"key":"9_CR2","first-page":"191","volume":"23","author":"N. Brujin de","year":"1952","unstructured":"N. de Brujin, C. A. van Ebbenhorst Tengebergen, and D. R. Kruyswijk, \u201cOn the set of divisors of a number,\u201d Nieuw Arch. Wisk, vol. 23, pp. 191\u2013193, 1952.","journal-title":"Nieuw Arch. Wisk"},{"key":"9_CR3","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"263","DOI":"10.1007\/0-387-34805-0_24","volume-title":"Advances in Cryptology \u2014 CRYPTO\u2019 89","author":"S. Even","year":"1990","unstructured":"S. Even, O. Goldreich and S. Micali, On-line\/off-line digital signatures, Advances in Cryptology \u2014 CRYPTO\u2019 89, Lecture Notes in Computer Science, vol. 435 (G. Brassard, ed.), Springer Verlag, 1990, pp. 263\u2013275."},{"key":"9_CR4","unstructured":"W. Feller, An Introduction to Probability Theory and Its Applications, vol. II., second corrected printing, Wiley & Sons, 1966."},{"key":"9_CR5","unstructured":"L. Lamport, Constructing digital signatures from a one-way function, Technical Report SRI Intl. CSL 98, 1979."},{"key":"9_CR6","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"218","DOI":"10.1007\/0-387-34805-0_21","volume-title":"Advances in Cryptology \u2014 CRYPTO\u2019 89","author":"R. Merkle","year":"1990","unstructured":"R. Merkle, A certified digital signature, Advances in Cryptology \u2014 CRYPTO\u2019 89, Lecture Notes in Computer Science, vol. 435 (G. Brassard, ed.), Springer Verlag, 1990, pp. 218\u2013238."},{"key":"9_CR7","unstructured":"C. Meyer and S. Matyas, Cryptography \u2014 a new dimension in computer data security, John Wiley & Sons, Inc., 1982."},{"issue":"2","key":"9_CR8","doi-asserted-by":"publisher","first-page":"120","DOI":"10.1145\/359340.359342","volume":"21","author":"R. L. Rivest","year":"1978","unstructured":"R. L. Rivest, A. Shamir, and L. Adleman, A method for obtaining digital signatures and public-key cryptosystems, Communications of the ACM, Vol. 21, No. 2, pp. 120\u2013126, 1978.","journal-title":"Communications of the ACM"},{"key":"9_CR9","doi-asserted-by":"crossref","unstructured":"J. Rompel, One-way functions are necessary and sufficient for secure signatures, Proc. 22nd ACM Symp. on Theory of Computing (STOC), 1990, pp. 387\u2013394.","DOI":"10.1145\/100216.100269"},{"key":"9_CR10","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"239","DOI":"10.1007\/0-387-34805-0_22","volume-title":"Advances in Cryptology \u2014 Crypto\u2019 89","author":"C. P. Schnorr","year":"1990","unstructured":"C. P. Schnorr, Efficient identification and signatures for smart cards, Advances in Cryptology \u2014 Crypto\u2019 89, Lecture Notes in Computer Science, vol. 435 (G. Brassard, ed.), Springer-Verlag 1990, pp. 239\u2013252."},{"key":"9_CR11","doi-asserted-by":"publisher","first-page":"544","DOI":"10.1007\/BF01171114","volume":"27","author":"E. Sperner","year":"1928","unstructured":"E. Sperner, Ein Satz \u00fcber Untermengen einer endlichen Menge, Mathematische Zeitschrift, vol. 27, pp. 544\u2013548, 1928.","journal-title":"Mathematische Zeitschrift"},{"key":"9_CR12","series-title":"Lect Notes Comput Sci","volume-title":"Proc. of EUROCODE\u2019 92","author":"S. Vaudenay","year":"1992","unstructured":"S. Vaudenay, One-time identification with low memory, Proc. of EUROCODE\u2019 92, Lecture Notes in Computer Science, Springer Verlag. CISM Courses and Lectures, No. 339, International Centre for Mechanical Sciences, P. Camion, P. Charpin and S. Harari (eds.), Springer-Verlag, pp. 217\u2013228."}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2014 CRYPTO \u201994"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-48658-5_9.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,17]],"date-time":"2020-11-17T21:16:20Z","timestamp":1605647780000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-48658-5_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540583332"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/3-540-48658-5_9","relation":{},"subject":[]}}