{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T22:20:15Z","timestamp":1725488415485},"publisher-location":"Berlin, Heidelberg","reference-count":15,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540611868"},{"type":"electronic","value":"9783540683391"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1996]]},"DOI":"10.1007\/3-540-68339-9_2","type":"book-chapter","created":{"date-parts":[[2007,8,6]],"date-time":"2007-08-06T01:31:14Z","timestamp":1186363874000},"page":"10-18","source":"Crossref","is-referenced-by-count":19,"title":["Generating EIGamal Signatures Without Knowing the Secret Key"],"prefix":"10.1007","author":[{"given":"Daniel","family":"Bleichenbacher","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2001,7,13]]},"reference":[{"key":"2_CR1","series-title":"Lect Notes Comput Sci","volume-title":"Public-key Cryptography, State of the Art and Future Directions","year":"1992","unstructured":"T. Beth, M. Frisch, and G.J. Simmons (eds). Public-key Cryptography, State of the Art and Future Directions, volume 578 of Lecture Notes in Computer Science. Springer-Verlag, Berlin, 1992."},{"key":"2_CR2","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"200","DOI":"10.1007\/3-540-47555-9_18","volume-title":"Advances in Cryptology-EUROCRYPT\u2019 92","author":"E. F. Brickell","year":"1993","unstructured":"E. F. Brickell, D. M. Gordon, K. S. McCurley, and D. B. Wilson. Fast exponentiation with precomputation. Advances in Cryptology-EUROCRYPT\u2019 92, volume 658 of Lecture Notes in Computer Science, pages 200\u2013207, 1993."},{"issue":"1","key":"2_CR3","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1007\/BF00191319","volume":"5","author":"E. F. Brickell","year":"1992","unstructured":"E. F. Brickell and K. S. McCurley. An interactive identification scheme based on discrete logarithms and factoring. Journal of Cryptology, 5(1):29\u201339, 1992.","journal-title":"Journal of Cryptology"},{"key":"2_CR4","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"10","DOI":"10.1007\/3-540-39568-7_2","volume-title":"Advances in Cryptology: Proceedings of CRYPTO\u2019 94","author":"T. Gamal El","year":"1985","unstructured":"T. El Gamal. A public key cryptosystem and a signature scheme based on discrete logarithms. Advances in Cryptology: Proceedings of CRYPTO\u2019 94, volume 196 of Lecture Notes in Computer Science, pages 10\u201318. Springer-Verlag, 1985."},{"key":"2_CR5","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"66","DOI":"10.1007\/3-540-48071-4_5","volume-title":"Advances in Cryptology\u2014CRYPTO\u2019 92","author":"D. M. Gordon","year":"1992","unstructured":"D. M. Gordon. Designing and detecting trapdoors for discrete log cryptosystems. Advances in Cryptology\u2014CRYPTO\u2019 92, volume 740 of Lecture Notes in Computer Science, pages 66\u201375. Springer-Verlag, 1992."},{"issue":"1","key":"2_CR6","doi-asserted-by":"publisher","first-page":"124","DOI":"10.1137\/0406010","volume":"6","author":"D. M. Gordon","year":"1993","unstructured":"D. M. Gordon. Discrete logarithms in GF(p) using the number field sieve. SIAM J. Disc. Math., 6(1):124\u2013138, February 1993.","journal-title":"SIAM J. Disc. Math."},{"key":"2_CR7","volume-title":"An introduction to the theory of numbers","author":"G. H. Hardy","year":"1979","unstructured":"G. H. Hardy and E. M. Wright. An introduction to the theory of numbers. Clarendon Press, Oxford, 5th edition, 1979.","edition":"5th edition"},{"issue":"3","key":"2_CR8","doi-asserted-by":"publisher","first-page":"193","DOI":"10.1049\/ip-cdt:19941040","volume":"141","author":"L. Harn","year":"1994","unstructured":"L. Harn. Public-key cryptosystem design based on factoring and discrete logarithm. IEE Proc. Comput. Digit. Tech., 141(3):193\u2013195, 1994.","journal-title":"IEE Proc. Comput. Digit. Tech."},{"key":"2_CR9","unstructured":"P. Horster, M. Michels, and H. Petersen. Generalized ElGamal signatures for one message block. Technical Report TR-94-3, University of Technology Chemnitz-Zwickau, May 1994."},{"key":"2_CR10","doi-asserted-by":"crossref","unstructured":"P. Horster, M. Michels, and H. Petersen. Meta-ElGamal signature schemes using a composite module. Technical Report TR-94-16-E, University of Technology Chemnitz-Zwickau, November 1994.","DOI":"10.1145\/191177.191197"},{"key":"2_CR11","unstructured":"A. Menezes, M. Qu, and S. Vanstone. Key agreement and the need for authentication. PKS, November 1995."},{"key":"2_CR12","unstructured":"National Institute of Standards and Technology (NIST). FIPS Publication 186: Digital Signature Standard, May 19, 1994."},{"key":"2_CR13","doi-asserted-by":"publisher","first-page":"106","DOI":"10.1109\/TIT.1978.1055817","volume":"IT-24","author":"S. C. Pohlig","year":"1978","unstructured":"S. C. Pohlig and M. E. Hellman. An improved algorithm for computing logarithms over GF(p) and its cryptographic significance. IEEE Trans. Inform. Theory, IT-24:106\u2013110, January 1978.","journal-title":"IEEE Trans. Inform. Theory"},{"key":"2_CR14","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"194","DOI":"10.1007\/3-540-47555-9_17","volume-title":"Advances in Cryptology \u2014 EUROCRYPT\u2019 92","author":"R. A. Rueppel","year":"1993","unstructured":"R. A. Rueppel, A. K. Lenstra, M. E. Smid, K. S. McCurley, Y. Desmedt, A. Odlyzko, and P. Landrock. Panel discussion: Trapdoor primes and moduli. Advances in Cryptology \u2014 EUROCRYPT\u2019 92, volume 658 of Lecture Notes in Computer Science, pages 194\u2013199. Springer-Verlag, 1993."},{"key":"2_CR15","unstructured":"S. Saryazdi. An extension to ElGamal public key cryptosystem with a new signature scheme. Communication, Control, and Signal Processing, pages 195\u2013198. Elsevier, 1990."}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2014 EUROCRYPT \u201996"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-68339-9_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,1]],"date-time":"2019-05-01T19:32:57Z","timestamp":1556739177000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-68339-9_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1996]]},"ISBN":["9783540611868","9783540683391"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/3-540-68339-9_2","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[1996]]}}}