{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,30]],"date-time":"2025-07-30T15:26:36Z","timestamp":1753889196317},"publisher-location":"Berlin, Heidelberg","reference-count":3,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540606932"},{"type":"electronic","value":"9783540492801"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1995]]},"DOI":"10.1007\/3-540-60693-9_6","type":"book-chapter","created":{"date-parts":[[2012,2,26]],"date-time":"2012-02-26T20:53:59Z","timestamp":1330289639000},"page":"34-43","source":"Crossref","is-referenced-by-count":3,"title":["Minimal weight k-SR representations"],"prefix":"10.1007","author":[{"given":"Yongfei","family":"Han","sequence":"first","affiliation":[]},{"given":"Dieter","family":"Gollmann","sequence":"additional","affiliation":[]},{"given":"Chris","family":"Mitchell","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2005,6,7]]},"reference":[{"key":"6_CR1","unstructured":"D. Gollmann, Yongfei Han, and C. Mitchell. Redundant integer representations and fast exponentiation, to appear in International Journal: Designs, Codes and Cryptography."},{"key":"6_CR2","volume-title":"The art of computer programming, Volume 2: seminumerical algorithms","author":"D.E. Knuth","year":"1981","unstructured":"D.E. Knuth. The art of computer programming, Volume 2: seminumerical algorithms. Addison-Wesley, Reading, Mass., 2nd edition, 1981.","edition":"2nd edition"},{"key":"6_CR3","doi-asserted-by":"publisher","first-page":"120","DOI":"10.1145\/359340.359342","volume":"21","author":"R.L. Rivest","year":"1978","unstructured":"R.L. Rivest, A. Shamir, and L. Adleman. A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM, 21:120\u2013126, 1978.","journal-title":"Communications of the ACM"}],"container-title":["Lecture Notes in Computer Science","Cryptography and Coding"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-60693-9_6.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,28]],"date-time":"2021-04-28T01:27:07Z","timestamp":1619573227000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-60693-9_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1995]]},"ISBN":["9783540606932","9783540492801"],"references-count":3,"URL":"https:\/\/doi.org\/10.1007\/3-540-60693-9_6","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[1995]]}}}