{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T16:47:24Z","timestamp":1725814044310},"publisher-location":"Cham","reference-count":12,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319140537"},{"type":"electronic","value":"9783319140544"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-14054-4_5","type":"book-chapter","created":{"date-parts":[[2014,12,10]],"date-time":"2014-12-10T03:39:19Z","timestamp":1418182759000},"page":"69-78","source":"Crossref","is-referenced-by-count":0,"title":["Size-Efficient Digital Signatures with Appendix by Truncating Unnecessarily Long Hashcode"],"prefix":"10.1007","author":[{"given":"Jinwoo","family":"Lee","sequence":"first","affiliation":[]},{"given":"Pil Joong","family":"Lee","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"5_CR1","unstructured":"ISO\/IEC 10118-1 (3rd edn.): Information technology \u2014 Security techniques \u2014 Hash-functions \u2014 Part 1: General (2000)"},{"key":"5_CR2","unstructured":"ISO\/IEC 10118-3 (3rd edn.): Information technology \u2014 Security techniques \u2014 Hash-functions \u2014 Part 3: Dedicated hash-functions (2004)"},{"key":"5_CR3","unstructured":"ISO\/IEC 14888-1 (2nd edn.): Information technology \u2014 Security techniques \u2014 Digital signatures with appendix \u2014 Part 1: General (2008)"},{"key":"5_CR4","unstructured":"ISO\/IEC 14888-3 (2nd edn.): Information technology \u2014 Security techniques \u2014 Digital signatures with appendix \u2014 Part 3: Discrete logarithm based mechanisms (2006)"},{"key":"5_CR5","unstructured":"N13975 Text of ISO\/IEC 3rd WD for 3rd edition of 14888-3: Information technology \u2014 Security techniques \u2014 Digital signatures with appendix \u2014 Part 3: Discrete logarithm based mechanisms (2014)"},{"key":"5_CR6","unstructured":"FIPS 180-4: Secure Hash Standard (SHS) (2012)"},{"key":"5_CR7","unstructured":"TTAK.KO-12.0001\/R3: Digital Signature Mechanism with Appendix \u2014 Part 2: Korean Certificate-based Digital Signature Algorithm KCDSA (2014)"},{"key":"5_CR8","unstructured":"TTAK.KO-12.0015\/R2: Digital Signature Mechanism with Appendix \u2014 Part 3: Korean Certificate-based Digital Signature Algorithm using Elliptic Curves EC-KCDSA (2014)"},{"key":"5_CR9","doi-asserted-by":"crossref","unstructured":"Diffie, W., Hellman, M.E.: New directions in cryptography. IEEE Trans. Inform. Theory, 644\u2013654 (1976)","DOI":"10.1109\/TIT.1976.1055638"},{"key":"5_CR10","unstructured":"Kelsey, J.: SHA-160: A Truncation Mode for SHA256 (and most other hashes). Cryptographic Hash Workshop, NIST (2005)"},{"key":"5_CR11","doi-asserted-by":"crossref","unstructured":"Matyas, S.: Digital signatures \u2014 an overview. Computer Networks, 87\u201394 (1979)","DOI":"10.1016\/0376-5075(79)90007-2"},{"key":"5_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"290","DOI":"10.1007\/978-3-540-28628-8_18","volume-title":"Advances in Cryptology \u2013 CRYPTO 2004","author":"E. Biham","year":"2004","unstructured":"Biham, E., Chen, R.: Near-collisions of SHA-0. In: Franklin, M. (ed.) CRYPTO 2004. LNCS, vol.\u00a03152, pp. 290\u2013305. Springer, Heidelberg (2004)"}],"container-title":["Lecture Notes in Computer Science","Security Standardisation Research"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-14054-4_5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,29]],"date-time":"2019-05-29T00:07:52Z","timestamp":1559088472000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-14054-4_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319140537","9783319140544"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-14054-4_5","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2014]]}}}