{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T23:10:17Z","timestamp":1725664217003},"publisher-location":"Berlin, Heidelberg","reference-count":10,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540606932"},{"type":"electronic","value":"9783540492801"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1995]]},"DOI":"10.1007\/3-540-60693-9_17","type":"book-chapter","created":{"date-parts":[[2012,2,26]],"date-time":"2012-02-26T20:53:43Z","timestamp":1330289623000},"page":"150-157","source":"Crossref","is-referenced-by-count":0,"title":["An elliptic curve analogue of McCurley's key agreement scheme"],"prefix":"10.1007","author":[{"given":"Andrew","family":"Smith","sequence":"first","affiliation":[]},{"given":"Colin","family":"Boyd","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2005,6,7]]},"reference":[{"key":"17_CR1","doi-asserted-by":"crossref","unstructured":"N.Demytko, \u201cA New Elliptic curve Based Analogue of RSA\u201d, Advances in Cryptology \u2014 EUROCRYPT 93, pp. 40\u201349, Springer-Verlag, 1994.","DOI":"10.1007\/3-540-48285-7_4"},{"key":"17_CR2","doi-asserted-by":"publisher","first-page":"644","DOI":"10.1109\/TIT.1976.1055638","volume":"22","author":"W. Diffie","year":"1976","unstructured":"W. Diffie and M. Hellman, \u201cNew Directions in Cryptography\u201d, IEEE Transactions on Information Theory, 22, pp. 644\u2013654, (1976).","journal-title":"IEEE Transactions on Information Theory"},{"key":"17_CR3","doi-asserted-by":"crossref","unstructured":"K. Koyama, U.M. Maurer, T. Okamoto, S.A. Vanstone, \u201cNew Public-Key Schemes Based on Elliptic Curves over the Ring Zn\u201d, Proceedings of Crypto 91, pp. 252\u2013266, Springer-Verlag, 1992.","DOI":"10.1007\/3-540-46766-1_20"},{"key":"17_CR4","doi-asserted-by":"crossref","unstructured":"G. Lay and H. Zimmer, \u201cConstructing elliptic curves with given group order over large finite fields\u201d, Algorithmic Number Theory: First International Symposium, Lecture Notes in Computer Science, 877, Springer-Verlag, pp. 250\u2013263.","DOI":"10.1007\/3-540-58691-1_64"},{"key":"17_CR5","doi-asserted-by":"crossref","first-page":"649","DOI":"10.2307\/1971363","volume":"126","author":"H.W. Lenstra Jr.","year":"1987","unstructured":"H.W. Lenstra, Jr., \u201cFactoring with Elliptic Curves\u201d, Annals of Mathematics, 126, pp. 649\u2013673, 1987.","journal-title":"Annals of Mathematics"},{"key":"17_CR6","doi-asserted-by":"crossref","unstructured":"U.M. Maurer, \u201cTowards the Equivalence of Breaking the Diffie-Hellman Proto col and Computing Discrete Logarithms\u201d, Proceedings of Crypto '94, pp. 271\u2013281, Springer-Verlag, 1994.","DOI":"10.1007\/3-540-48658-5_26"},{"key":"17_CR7","doi-asserted-by":"crossref","unstructured":"K. S. McCurley, \u201cA Key Distribution Scheme Equivalent to Factoring\u201d, Journal of Cryptology, Vol. 1, No. 2 (1988).","DOI":"10.1007\/BF02351718"},{"key":"17_CR8","doi-asserted-by":"crossref","unstructured":"A. Menezes, Elliptic Curve Public Key Cryptosystems, Kluwer Academic Publishers (1993).","DOI":"10.1007\/978-1-4615-3198-2"},{"key":"17_CR9","doi-asserted-by":"publisher","first-page":"1639","DOI":"10.1109\/18.259647","volume":"39","author":"A. Menezes","year":"1993","unstructured":"A. Menezes, T. Okamoto and S.A. Vanstone, \u201cReducing Elliptic Curve Logarithms to Logarithms in a Finite Field\u201d, IEEE Transactions on Information Theory, (39), 1993, pp. 1639\u20131646.","journal-title":"IEEE Transactions on Information Theory"},{"key":"17_CR10","doi-asserted-by":"crossref","unstructured":"P.C. van Oorschot, \u201cA Comparison of Practical Public Key Cryptosystems Based on Integer Factorization and Discrete Logarithms\u201d, in G.J.Simmons (Ed.), Contemporary Cryptology, IEEE Press 1992.","DOI":"10.1007\/3-540-38424-3_40"}],"container-title":["Lecture Notes in Computer Science","Cryptography and Coding"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-60693-9_17.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,17]],"date-time":"2020-11-17T21:01:28Z","timestamp":1605646888000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-60693-9_17"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1995]]},"ISBN":["9783540606932","9783540492801"],"references-count":10,"URL":"https:\/\/doi.org\/10.1007\/3-540-60693-9_17","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[1995]]}}}