{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T23:08:36Z","timestamp":1725491316450},"publisher-location":"Berlin, Heidelberg","reference-count":9,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540743767"},{"type":"electronic","value":"9783540743774"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2007]]},"DOI":"10.1007\/978-3-540-74377-4_56","type":"book-chapter","created":{"date-parts":[[2007,9,12]],"date-time":"2007-09-12T05:38:34Z","timestamp":1189575514000},"page":"534-544","source":"Crossref","is-referenced-by-count":0,"title":["XTR\u2009+\u2009: A Provable Security Public Key Cryptosystem"],"prefix":"10.1007","author":[{"given":"Zehui","family":"Wang","sequence":"first","affiliation":[]},{"given":"Zhiguo","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"56_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/3-540-44598-6_1","volume-title":"Advances in Cryptology - CRYPTO 2000","author":"A.K. Lenstra","year":"2000","unstructured":"Lenstra, A.K., Verheul, E.R.: The XTR public system. In: Bellare, M. (ed.) CRYPTO 2000. LNCS, vol.\u00a01880, pp. 1\u201319. Springer, Heidelberg (2000)"},{"key":"56_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"220","DOI":"10.1007\/3-540-44448-3_17","volume-title":"Advances in Cryptology - ASIACRYPT 2000","author":"A.K. Lenstra","year":"2000","unstructured":"Lenstra, A.K., Verheul, E.R.: Key improvements to XTR. In: Okamoto, T. (ed.) ASIACRYPT 2000. LNCS, vol.\u00a01976, pp. 220\u2013233. Springer, Heidelberg (2000)"},{"key":"56_CR3","doi-asserted-by":"publisher","first-page":"357","DOI":"10.1007\/s00145-004-0229-5","volume":"18","author":"R.M. Avanzi","year":"2005","unstructured":"Avanzi, R.M.: The Complexity of Certain Multi-Exponentiation Techniques in Cryptography. J. Cryptology\u00a018, 357\u2013373 (2005)","journal-title":"J. Cryptology"},{"issue":"8","key":"56_CR4","first-page":"109","volume":"25","author":"X. Chen","year":"2004","unstructured":"Chen, X., Wang, Y.: Asurvey of public key cryptography. Journal of China institute of communications\u00a025(8), 109\u2013118 (2004)(in Chinese)","journal-title":"Journal of China institute of communications"},{"issue":"4","key":"56_CR5","doi-asserted-by":"publisher","first-page":"277","DOI":"10.1007\/s00145-004-0313-x","volume":"17","author":"E.R. Verheul","year":"2004","unstructured":"Verheul, E.R.: Evidence that XTR Is More Secure than Supersingular Elliptic Curve Cryptosystems. J. Cryptology\u00a017(4), 277\u2013296 (2004)","journal-title":"J. Cryptology"},{"key":"56_CR6","series-title":"Lecture Notes in Computer Science","volume-title":"Advances in Cryptology - ASIACRYPT 2001","author":"S. Martijn","year":"2001","unstructured":"Martijn, S., Lenstra, A.K.: Speeding Up XTR. In: Boyd, C. (ed.) ASIACRYPT 2001. LNCS, vol.\u00a02248, Springer, Heidelberg (2001)"},{"key":"56_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"386","DOI":"10.1007\/978-3-540-28632-5_28","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2004","author":"E. Peeters","year":"2004","unstructured":"Peeters, E., Neve, M., Ciet, M.: XTR implementation on reconfigurable hardware. In: Joye, M., Quisquater, J.-J. (eds.) CHES 2004. LNCS, vol.\u00a03156, pp. 386\u2013399. Springer, Heidelberg (2004)"},{"key":"56_CR8","series-title":"Lecture Notes in Computer Science","first-page":"443","volume-title":"Advances in Cryptology - CRYPTO \u201991","author":"C. Rackoff","year":"1992","unstructured":"Rackoff, C., Simon, D.: Non-interactive zero-knowledge proof of knowledge and chosen ciphertext attack. In: Feigenbaum, J. (ed.) CRYPTO 1991. LNCS, vol.\u00a0576, pp. 443\u2013444. Springer, Heidelberg (1992)"},{"key":"56_CR9","unstructured":"ISO\/IEC 18033-2:2006. Information Technology - Security Techniques - Encryption Algorithms - Part 2: Asymmetrc Ciphers (2006)"}],"container-title":["Lecture Notes in Computer Science","Computational Intelligence and Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-74377-4_56.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T10:21:39Z","timestamp":1619518899000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-74377-4_56"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007]]},"ISBN":["9783540743767","9783540743774"],"references-count":9,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-74377-4_56","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2007]]}}}