{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T19:42:11Z","timestamp":1725565331105},"publisher-location":"Berlin, Heidelberg","reference-count":11,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540220602"},{"type":"electronic","value":"9783540247685"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2004]]},"DOI":"10.1007\/978-3-540-24768-5_67","type":"book-chapter","created":{"date-parts":[[2010,9,11]],"date-time":"2010-09-11T01:14:08Z","timestamp":1284167648000},"page":"627-636","source":"Crossref","is-referenced-by-count":0,"title":["A Two-Public Key Scheme Omitting Collision Problem in Digital Signature"],"prefix":"10.1007","author":[{"given":"Sung Keun","family":"Song","sequence":"first","affiliation":[]},{"given":"Hee Yong","family":"Youn","sequence":"additional","affiliation":[]},{"given":"Chang Won","family":"Park","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"67_CR1","doi-asserted-by":"crossref","unstructured":"Rivest, R., Shamir, A., Adleman, L.: A Method for Obtaining Digital Signatures and Public Key Cryptosystems. Communications of the ACM, 120\u2013126 (1978)","DOI":"10.1145\/359340.359342"},{"issue":"4","key":"67_CR2","doi-asserted-by":"publisher","first-page":"469","DOI":"10.1109\/TIT.1985.1057074","volume":"IT-31","author":"T. ElGamal","year":"1985","unstructured":"ElGamal, T.: A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Trans. Info. Theory\u00a0IT-31(4), 469\u2013472 (1985)","journal-title":"IEEE Trans. Info. Theory"},{"key":"67_CR3","unstructured":"National Institute of Standards and Technology (NIST).: Digital Signature Standard. FIPS PUB 186-2 (2000), http:\/\/csrc.nist.gov\/publications\/fips\/fips186-2\/fips186-2-change1.pdf"},{"key":"67_CR4","unstructured":"National Institute of Standards and Technology (NIST).: Secure Hash Standard. FIPS PUB 180-1 (1995), http:\/\/www.itl.nist.gov\/fipspubs\/fip180-1.htm"},{"key":"67_CR5","unstructured":"Dobbertin, H.: The status of MD5 after a recent attack. RSA Laboratories, CryptoBytes\u00a02(2) (1996)"},{"key":"67_CR6","doi-asserted-by":"crossref","unstructured":"Eastlake III, D., Jones, P.: US Secure Hash Algorithm 1 (SHA1). RFC 3174 (2001), http:\/\/www.faqs.org\/rfcs\/rfc3174.html","DOI":"10.17487\/rfc3174"},{"key":"67_CR7","doi-asserted-by":"crossref","unstructured":"Keromytis, A., Provos, N.: The Use of HMAC-RIPEMD-160-96 within ESP and AH. RFC 2857 (2000)","DOI":"10.17487\/rfc2857"},{"key":"67_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"71","DOI":"10.1007\/3-540-60865-6_44","volume-title":"Fast Software Encryption","author":"H. Dobbertin","year":"1996","unstructured":"Dobbertin, H., Bosselaers, A., Preneel, B.: RIPEMD-160: a strengthened version of RIPEMD. In: Gollmann, D. (ed.) FSE 1996. LNCS, vol.\u00a01039, pp. 71\u201382. Springer, Heidelberg (1996)"},{"key":"67_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"416","DOI":"10.1007\/0-387-34805-0_39","volume-title":"Advances in Cryptology - CRYPTO \u201989","author":"I.B. Damgard","year":"1990","unstructured":"Damgard, I.B.: A design principle for hash functions. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol.\u00a0435, pp. 416\u2013427. Springer, Heidelberg (1990)"},{"key":"67_CR10","unstructured":"Adams, C., Cain, P., Pinkas, D., Zuccherato, R.: Internet X.509 Public Key Infrastructure Time Stamp Protocol, draft-ietf-pkix-time-stamp-00.txt (1998)"},{"key":"67_CR11","doi-asserted-by":"crossref","unstructured":"Housely, R., Ford, W., Polk, W., Solo, D.: Internet X.509 Public Key Infrastructure. IETF RFC 2459 (1999)","DOI":"10.17487\/rfc2459"}],"container-title":["Lecture Notes in Computer Science","Computational Science and Its Applications \u2013 ICCSA 2004"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-24768-5_67.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,19]],"date-time":"2020-11-19T04:55:53Z","timestamp":1605761753000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-24768-5_67"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004]]},"ISBN":["9783540220602","9783540247685"],"references-count":11,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-24768-5_67","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2004]]}}}