{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T05:44:31Z","timestamp":1725515071483},"publisher-location":"Berlin, Heidelberg","reference-count":9,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540691365"},{"type":"electronic","value":"9783540693048"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008]]},"DOI":"10.1007\/978-3-540-69304-8_5","type":"book-chapter","created":{"date-parts":[[2008,6,9]],"date-time":"2008-06-09T01:47:18Z","timestamp":1212976038000},"page":"44-49","source":"Crossref","is-referenced-by-count":4,"title":["The Banknote Anti-forgery System Based on Digital Signature Algorithms"],"prefix":"10.1007","author":[{"given":"Shenghui","family":"Su","sequence":"first","affiliation":[]},{"given":"Yongquan","family":"Cai","sequence":"additional","affiliation":[]},{"given":"Changxiang","family":"Shen","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"6","key":"5_CR1","doi-asserted-by":"publisher","first-page":"644","DOI":"10.1109\/TIT.1976.1055638","volume":"22","author":"W. Diffie","year":"1976","unstructured":"Diffie, W., Hellman, M.E.: New Directions in Cryptography. IEEE Transactions on Information Theory\u00a022(6), 644\u2013654 (1976)","journal-title":"IEEE Transactions on Information Theory"},{"key":"5_CR2","volume-title":"Applied Cryptography: Protocols, Algorithms, and Source Code in C","author":"B. Schneier","year":"1996","unstructured":"Schneier, B.: Applied Cryptography: Protocols, Algorithms, and Source Code in C, 2nd edn. John Wiley & Sons, New York (1996)","edition":"2"},{"key":"5_CR3","volume-title":"Handbook of Applied Cryptography","author":"A. Menezes","year":"1997","unstructured":"Menezes, A., van Oorschot, P., Vanstone, S.: Handbook of Applied Cryptography. CRC Press, London (1997)"},{"key":"5_CR4","volume-title":"Digital Integrated Circuits","author":"J.M. Rabaey","year":"2002","unstructured":"Rabaey, J.M., Chandrakasan, A., Nikolic, B.: Digital Integrated Circuits, 2nd edn. Prentice-Hall, New Jersey (2002)","edition":"2"},{"key":"5_CR5","volume-title":"Digital Integrated Circuit Design","author":"K. Martin","year":"1999","unstructured":"Martin, K.: Digital Integrated Circuit Design. Oxford University Press, Oxford (1999)"},{"issue":"2","key":"5_CR6","doi-asserted-by":"publisher","first-page":"12","DOI":"10.1145\/359340.359342","volume":"21","author":"R.L. Rivest","year":"1978","unstructured":"Rivest, R.L., Shamir, A., Adleman, L.M.: A Method for Obtaining Digital Signatures and Public-key Cryptosystems. Communications of the ACM\u00a021(2), 12\u2013126 (1978)","journal-title":"Communications of the ACM"},{"key":"5_CR7","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-04773-6","volume-title":"Number Theory for Computing","author":"S.Y. Yan","year":"2002","unstructured":"Yan, S.Y.: Number Theory for Computing, 2nd edn. Springer, New York (2002)","edition":"2"},{"issue":"4","key":"5_CR8","doi-asserted-by":"publisher","first-page":"469","DOI":"10.1109\/TIT.1985.1057074","volume":"31","author":"T. ElGamal","year":"1985","unstructured":"ElGamal, T.: A Public-key Cryptosystem and a Signature Scheme Based on Discrete Logarithms. IEEE Transactions on Information Theory\u00a031(4), 469\u2013472 (1985)","journal-title":"IEEE Transactions on Information Theory"},{"key":"5_CR9","volume-title":"Cryptography and Network Security: Principles and Practice","author":"W. Stallings","year":"1999","unstructured":"Stallings, W.: Cryptography and Network Security: Principles and Practice, 2nd edn. Prentice-Hall, New Jersey (1999)","edition":"2"}],"container-title":["Lecture Notes in Computer Science","Intelligence and Security Informatics"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-69304-8_5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,3,2]],"date-time":"2019-03-02T03:21:51Z","timestamp":1551496911000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-69304-8_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008]]},"ISBN":["9783540691365","9783540693048"],"references-count":9,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-69304-8_5","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2008]]}}}