{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T13:30:10Z","timestamp":1725888610247},"publisher-location":"Cham","reference-count":7,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319598697"},{"type":"electronic","value":"9783319598703"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-59870-3_31","type":"book-chapter","created":{"date-parts":[[2017,5,29]],"date-time":"2017-05-29T22:14:17Z","timestamp":1496096057000},"page":"460-467","source":"Crossref","is-referenced-by-count":0,"title":["Solving the DLP with Low Hamming Weight Product Exponents and Improved Attacks on the GPS Identification Scheme"],"prefix":"10.1007","author":[{"given":"Jason H. M.","family":"Ying","sequence":"first","affiliation":[]},{"given":"Noboru","family":"Kunihiro","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,5,31]]},"reference":[{"key":"31_CR1","series-title":"LNCS","first-page":"47","volume-title":"CHES 2005","author":"J Coron","year":"2005","unstructured":"Coron, J., Lefranc, D., Poupard, G.: A new baby-step giant-step algorithm and some application to cryptanalysis. In: Rao, J.R., Sunar, B. (eds.) CHES 2005. LNCS, vol. 3659, pp. 47\u201360. Springer, Heidelberg (2005)"},{"key":"31_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"490","DOI":"10.1007\/3-540-46416-6_42","volume-title":"Advances in Cryptology \u2014 EUROCRYPT 1991","author":"M Girault","year":"1991","unstructured":"Girault, M.: Self-certified public keys. In: Davies, D.W. (ed.) EUROCRYPT 1991. LNCS, vol. 547, pp. 490\u2013497. Springer, Heidelberg (1991). doi:\n10.1007\/3-540-46416-6_42"},{"key":"31_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"328","DOI":"10.1007\/978-3-540-78440-1_19","volume-title":"Public Key Cryptography \u2013 PKC 2008","author":"S Kim","year":"2008","unstructured":"Kim, S., Cheon, J.H.: A parameterized splitting system and its application to the discrete logarithm problem with low hamming weight product exponents. In: Cramer, R. (ed.) PKC 2008. LNCS, vol. 4939, pp. 328\u2013343. Springer, Heidelberg (2008). doi:\n10.1007\/978-3-540-78440-1_19"},{"issue":"5","key":"31_CR4","doi-asserted-by":"crossref","first-page":"2528","DOI":"10.1109\/TIT.2010.2044071","volume":"56","author":"S Kim","year":"2010","unstructured":"Kim, S., Cheon, J.H.: Parameterized splitting systems for the discrete logarithm. IEEE Trans. Inf. Theory 56(5), 2528\u20132535 (2010)","journal-title":"IEEE Trans. Inf. Theory"},{"key":"31_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"422","DOI":"10.1007\/BFb0054143","volume-title":"Advances in Cryptology \u2014 EUROCRYPT 1998","author":"G Poupard","year":"1998","unstructured":"Poupard, G., Stern, J.: Security analysis of a practical \u201con the fly\u201d authentication and signature generation. In: Nyberg, K. (ed.) EUROCRYPT 1998. LNCS, vol. 1403, pp. 422\u2013436. Springer, Heidelberg (1998). doi:\n10.1007\/BFb0054143"},{"issue":"237","key":"31_CR6","doi-asserted-by":"crossref","first-page":"379","DOI":"10.1090\/S0025-5718-01-01310-2","volume":"71","author":"D Stinson","year":"2002","unstructured":"Stinson, D.: Some baby-step giant-step algorithms for the low hamming weight discrete logarithm problem. Math. Comput. 71(237), 379\u2013391 (2002)","journal-title":"Math. Comput."},{"key":"31_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"413","DOI":"10.1007\/978-3-540-28632-5_30","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2004","author":"M Girault","year":"2004","unstructured":"Girault, M., Lefranc, D.: Public key authentication with one (online) single addition. In: Joye, M., Quisquater, J.-J. (eds.) CHES 2004. LNCS, vol. 3156, pp. 413\u2013427. Springer, Heidelberg (2004). doi:\n10.1007\/978-3-540-28632-5_30"}],"container-title":["Lecture Notes in Computer Science","Information Security and Privacy"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-59870-3_31","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,5,29]],"date-time":"2017-05-29T22:23:50Z","timestamp":1496096630000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-59870-3_31"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319598697","9783319598703"],"references-count":7,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-59870-3_31","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]}}}