{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T19:35:49Z","timestamp":1725564949216},"publisher-location":"Berlin, Heidelberg","reference-count":11,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540223795"},{"type":"electronic","value":"9783540278009"}],"license":[{"start":{"date-parts":[[2004,1,1]],"date-time":"2004-01-01T00:00:00Z","timestamp":1072915200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2004]]},"DOI":"10.1007\/978-3-540-27800-9_13","type":"book-chapter","created":{"date-parts":[[2010,9,5]],"date-time":"2010-09-05T23:00:38Z","timestamp":1283727638000},"page":"149-156","source":"Crossref","is-referenced-by-count":2,"title":["The Security of Cryptosystems Based on Class Semigroups of Imaginary Quadratic Non-maximal Orders"],"prefix":"10.1007","author":[{"suffix":"Jr.","given":"Michael J.","family":"Jacobson","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"13_CR1","volume-title":"Number theory","author":"Z.I. Borevich","year":"1966","unstructured":"Borevich, Z.I., Shafarevich, I.R.: Number theory. Academic Press, New York (1966)"},{"key":"13_CR2","doi-asserted-by":"publisher","first-page":"107","DOI":"10.1007\/BF02351719","volume":"1","author":"J. Buchmann","year":"1988","unstructured":"Buchmann, J., Williams, H.C.: A key-exchange system based on imaginary quadratic fields. Journal of Cryptology\u00a01, 107\u2013118 (1988)","journal-title":"Journal of Cryptology"},{"key":"13_CR3","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-662-02945-9","volume-title":"A course in computational algebraic number theory","author":"H. Cohen","year":"1993","unstructured":"Cohen, H.: A course in computational algebraic number theory. Springer, Berlin (1993)"},{"key":"13_CR4","volume-title":"Primes of the form x2 + ny2","author":"D.A. Cox","year":"1989","unstructured":"Cox, D.A.: Primes of the form x2 + ny2. John Wiley & Sons, New York (1989)"},{"key":"13_CR5","doi-asserted-by":"publisher","first-page":"837","DOI":"10.1090\/S0894-0347-1989-1002631-0","volume":"2","author":"J.L. Hafner","year":"1989","unstructured":"Hafner, J.L., McCurley, K.S.: A rigorous subexponential algorithm for computation of class groups. J. Amer. Math. Soc.\u00a02, 837\u2013850 (1989)","journal-title":"J. Amer. Math. Soc."},{"issue":"3","key":"13_CR6","doi-asserted-by":"publisher","first-page":"281","DOI":"10.1023\/A:1025746127771","volume":"30","author":"D. H\u00fchnlein","year":"2003","unstructured":"H\u00fchnlein, D., Jacobson Jr., M.J., Weber, D.: Towards practical non-interactive public-key cryptosystems using non-maximal imaginary quadratic orders. Designs, Codes and Cryptography\u00a030(3), 281\u2013299 (2003)","journal-title":"Designs, Codes and Cryptography"},{"key":"13_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"120","DOI":"10.1007\/3-540-45455-1_10","volume-title":"Algorithmic Number Theory","author":"M.J. Jacobson Jr.","year":"2002","unstructured":"Jacobson Jr., M.J., van der Poorten, A.J.: Computational aspects of NUCOMP. In: Fieker, C., Kohel, D.R. (eds.) ANTS 2002. LNCS, vol.\u00a02369, pp. 120\u2013133. Springer, Heidelberg (2002)"},{"key":"13_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"488","DOI":"10.1007\/3-540-45067-X_42","volume-title":"Information Security and Privacy","author":"H. Kim","year":"2003","unstructured":"Kim, H., Moon, S.: Public-key cryptosystems based on class semigroups of imaginary quadratic non-maximal orders. In: Safavi-Naini, R., Seberry, J. (eds.) ACISP 2003. LNCS, vol.\u00a02727, pp. 488\u2013497. Springer, Heidelberg (2003)"},{"key":"13_CR9","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-540-37663-7","volume-title":"Algebraische zahlentheorie","author":"J. Neukirch","year":"1992","unstructured":"Neukirch, J.: Algebraische zahlentheorie. Springer, Berlin (1992)"},{"key":"13_CR10","doi-asserted-by":"publisher","first-page":"263","DOI":"10.1007\/s001459910010","volume":"13","author":"S. Paulus","year":"2000","unstructured":"Paulus, S., Takagi, T.: A new public-key cryptosystem over a quadratic order with quadratic decryption time. Journal of Cryptology\u00a013, 263\u2013272 (2000)","journal-title":"Journal of Cryptology"},{"key":"13_CR11","doi-asserted-by":"publisher","first-page":"379","DOI":"10.1017\/S0305004100072170","volume":"115","author":"P. Zanardo","year":"1994","unstructured":"Zanardo, P., Zannier, U.: The class semigroup of orders in number fields. Math. Proc. Camb. Phil. Soc.\u00a0115, 379\u2013391 (1994)","journal-title":"Math. Proc. Camb. Phil. Soc."}],"container-title":["Lecture Notes in Computer Science","Information Security and Privacy"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-27800-9_13","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,1,29]],"date-time":"2020-01-29T22:03:07Z","timestamp":1580335387000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-27800-9_13"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004]]},"ISBN":["9783540223795","9783540278009"],"references-count":11,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-27800-9_13","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2004]]}}}