{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T04:52:46Z","timestamp":1725511966018},"publisher-location":"Berlin, Heidelberg","reference-count":6,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540747796"},{"type":"electronic","value":"9783540747802"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-74780-2_57","type":"book-chapter","created":{"date-parts":[[2007,8,30]],"date-time":"2007-08-30T07:05:09Z","timestamp":1188457509000},"page":"423-425","source":"Crossref","is-referenced-by-count":0,"title":["Efficient Blind Signatures from Linear Feedback Shift Register"],"prefix":"10.1007","author":[{"given":"Xiangxue","family":"Li","sequence":"first","affiliation":[]},{"given":"Dong","family":"Zheng","sequence":"additional","affiliation":[]},{"given":"Kefei","family":"Chen","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"57_CR1","series-title":"Lecture Notes in Computer Science","volume-title":"Sequences and Their Applications - SETA 2004","author":"K. Giuliani","year":"2005","unstructured":"Giuliani, K., Gong, G.: New LFSR-based cryptosystems and the trace discrete logrithm problem (Trace-DLP). In: Helleseth, T., Sarwate, D., Song, H.-Y., Yang, K. (eds.) SETA 2004. LNCS, vol.\u00a03486, Springer, Heidelberg (2005)"},{"key":"57_CR2","volume-title":"Shift register sequences","author":"S. Golomb","year":"1982","unstructured":"Golomb, S.: Shift register sequences. Aegean Park, Laguna Hills, CA (1982)"},{"issue":"3","key":"57_CR3","first-page":"266","volume":"4","author":"X. Li","year":"2007","unstructured":"Li, X., Zheng, D., Chen, K.: LFSR-based signatures with message recovery. Intenational Journal of Network Security\u00a04(3), 266\u2013270 (2007)","journal-title":"Intenational Journal of Network Security"},{"key":"57_CR4","doi-asserted-by":"crossref","unstructured":"Chaum, D.: Blind signatures for untreaceable payments. In: Crypto 82 (1982)","DOI":"10.1007\/978-1-4757-0602-4_18"},{"key":"57_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"288","DOI":"10.1007\/3-540-45708-9_19","volume-title":"Advances in Cryptology - CRYPTO 2002","author":"D. Wagner","year":"2002","unstructured":"Wagner, D.: A generalized birthday problem. In: Yung, M. (ed.) CRYPTO 2002. LNCS, vol.\u00a02442, pp. 288\u2013303. Springer, Heidelberg (2002)"},{"key":"57_CR6","first-page":"1213","volume":"E86-A","author":"C. Tan","year":"2003","unstructured":"Tan, C., Yi, X., Siew, C.: On the n-th order shift register based discrete logrithm. IEICE Transaction on Fundamentals\u00a0E86-A, 1213\u20131216 (2003)","journal-title":"IEICE Transaction on Fundamentals"}],"container-title":["Lecture Notes in Computer Science","Cooperative Design, Visualization, and Engineering"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-74780-2_57.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T10:38:26Z","timestamp":1619519906000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-74780-2_57"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540747796","9783540747802"],"references-count":6,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-74780-2_57","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[]}}