{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,24]],"date-time":"2026-04-24T10:06:43Z","timestamp":1777025203690,"version":"3.51.4"},"publisher-location":"Berlin, Heidelberg","reference-count":39,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783642349300","type":"print"},{"value":"9783642349317","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-34931-7_26","type":"book-chapter","created":{"date-parts":[[2012,12,5]],"date-time":"2012-12-05T22:24:04Z","timestamp":1354746244000},"page":"454-473","source":"Crossref","is-referenced-by-count":27,"title":["Faster Batch Forgery Identification"],"prefix":"10.1007","author":[{"given":"Daniel J.","family":"Bernstein","sequence":"first","affiliation":[]},{"given":"Jeroen","family":"Doumen","sequence":"additional","affiliation":[]},{"given":"Tanja","family":"Lange","sequence":"additional","affiliation":[]},{"given":"Jan-Jaap","family":"Oosterwijk","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"26_CR1","unstructured":"\u2013(no editor): 17th annual symposium on foundations of computer science. IEEE Computer Society, Long Beach, California (1976). MR 56:1766. See [28]"},{"key":"26_CR2","doi-asserted-by":"crossref","unstructured":"Bellare, M., Garay, J.A., Rabin, T.: Fast batch verification for modular exponentiation and digital signatures. In: Eurocrypt \u201998 [24], pp. 236\u2013250 (1998), http:\/\/cseweb.ucsd.edu\/~mihir\/papers\/batch.html . Citations in this document: \u00a71","DOI":"10.1007\/BFb0054130"},{"key":"26_CR3","doi-asserted-by":"crossref","unstructured":"Bernstein, D.J.: Curve25519: new Diffie-Hellman speed records. In: PKC 2006 [38], pp. 207\u2013228 (2006), http:\/\/cr.yp.to\/papers.html#curve25519 . Citations in this document: \u00a73","DOI":"10.1007\/11745853_14"},{"key":"26_CR4","unstructured":"Bernstein, D.J., Duif, N., Lange, T., Schwabe, P., Yang, B.-Y.: High-speed high security signatures. In: CHES 2011 [31] (2011), http:\/\/eprint.iacr.org\/2011\/368 . Citations in this document: \u00a71, \u00a71, \u00a71, \u00a71, \u00a71, \u00a71, \u00a71, \u00a73, \u00a73, \u00a74"},{"key":"26_CR5","unstructured":"Brassard, G. (ed.): Advances in cryptology|CRYPTO \u201989, 9th annual international cryptology conference, Santa Barbara, California, USA, August 20-24,1989, proceedings. LNCS, vol. 435. Springer (1990). ISBN 3-540-97317-6. MR91b:94002. See [34]"},{"key":"26_CR6","doi-asserted-by":"crossref","unstructured":"Brickell, E.F., Gordon, D.M., McCurley, K.S., Wilson, D.B.: Fast exponentiation with precomputation (extended abstract). In: Eurocrypt \u201992 [33], pp. 200\u2013207(1993); see also newer version [7]. Citations in this document: \u00a74, \u00a74","DOI":"10.1007\/3-540-47555-9_18"},{"key":"26_CR7","unstructured":"Brickell, E.F., Gordon, D.M., McCurley, K.S., Wilson, D.B.: Fast exponentiation with precomputation: algorithms and lower bounds (1995); see also older version [6], http:\/\/research.microsoft.com\/~dbwilson\/bgmw\/"},{"key":"26_CR8","doi-asserted-by":"crossref","unstructured":"de Rooij, P.: Efficient exponentiation using precomputation and vector addition chains. In: Eurocrypt \u201994 [9], pp. 389\u2013399 (1995). MR 1479665. Citations in thisdocument: \u00a74","DOI":"10.1007\/BFb0053453"},{"key":"26_CR9","unstructured":"De Santis, A. (ed.): Advances in cryptology|EUROCRYPT \u201994, workshop on the theory and application of cryptographic techniques, Perugia, Italy, May 9-12, 1994, proceedings. LNCS, vol. 950. Springer (1995). ISBN 3-540-60176-7. MR98h:94001. See [8], [23]"},{"key":"26_CR10","doi-asserted-by":"crossref","unstructured":"Desmedt, Y. (ed.): Advances in cryptology|CRYPTO \u201994, 14th annual international cryptology conference, Santa Barbara, California, USA, August 21-25,1994, proceedings. LNCS, vol. 839. Springer (1994). ISBN 3-540-58333-5. See [19]","DOI":"10.1007\/3-540-48658-5"},{"key":"26_CR11","unstructured":"Galbraith, S.D. (ed.): Cryptography and coding, 11th IMA international conference, Cirencester, UK, December 18-20, 2007, proceedings. LNCS, vol. 4887. Springer (2007). ISBN 978-3-540-77271-2. See [18]"},{"key":"26_CR12","doi-asserted-by":"crossref","unstructured":"Hisil, H., Wong, K.K.-H., Carter, G., Dawson, E.: Twisted Edwards curves revisited.In: Asiacrypt 2008 [27], pp. 326\u2013343 (2008), http:\/\/eprint.iacr.org\/2008\/522 . Citations in this document: \u00a71","DOI":"10.1007\/978-3-540-89255-7_20"},{"key":"26_CR13","doi-asserted-by":"crossref","unstructured":"Imai, H., Zheng, Y. (eds.): Public key cryptography, third international workshop on practice and theory in public key cryptography, PKC 2000, Melbourne, Victoria, Australia, January 18-20, 2000, proceedings. LNCS, vol. 1751. Springer (2000). ISBN 3-540-66967-1. See [25]","DOI":"10.1007\/b75033"},{"key":"26_CR14","doi-asserted-by":"crossref","unstructured":"Jarecki, S., Tsudik, G. (eds.): Public key cryptography|PKC 2009, 12th international conference on practice and theory in public key cryptography, Irvine, CA, USA, March 18-20, 2009, proceedings. LNCS, vol. 5443. Springer (2009).ISBN 978-3-642-00467-4. See [20]","DOI":"10.1007\/978-3-642-00468-1"},{"key":"26_CR15","doi-asserted-by":"crossref","unstructured":"Joye, M., Miyaji, A., Otsuka, A. (eds.): Pairing-based cryptography\u2013Pairing 2010\u20134th international conference, Yamanaka Hot Spring, Japan, December 2010, proceedings. LNCS, vol. 6487. Springer (2010). ISBN 978-3-642-17454-4. See [21]","DOI":"10.1007\/978-3-642-17455-1"},{"key":"26_CR16","doi-asserted-by":"crossref","unstructured":"Karati, S., Das, A., Roychowdhury, D., Bellur, B., Bhattacharya, D., Iyer, A.: Batch verification of ECDSA signatures. In: Africacrypt 2012 [22], pp. 1-18 (2012). Citations in this document: \u00a72, \u00a72, \u00a72, \u00a72, \u00a72, \u00a72, \u00a72, \u00a72","DOI":"10.1007\/978-3-642-31410-0_1"},{"key":"26_CR17","unstructured":"Kurosawa, K. (ed.): Information theoretic security, 4th international conference, ICITS 2009, Shizuoka, Japan, December 3-6, 2009, revised selected papers. LNCS, vol. 5973. Springer (2010). ISBN 978-3-642-14495-0. See [39]"},{"key":"26_CR18","doi-asserted-by":"crossref","unstructured":"Law, L., Matt, B.J.: Finding invalid signatures in pairing-based batches. In: Cirencester 2007 [11], pp. 34\u201353 (2007). Citations in this document: \u00a71, \u00a71, \u00a73","DOI":"10.1007\/978-3-540-77272-9_3"},{"key":"26_CR19","doi-asserted-by":"crossref","unstructured":"Lim, C.H., Lee, P.J.: More flexible exponentiation with precomputation. In: Crypto \u201994 [10], pp. 95\u2013107 (1994). Citations in this document: \u00a74","DOI":"10.1007\/3-540-48658-5_11"},{"key":"26_CR20","doi-asserted-by":"crossref","unstructured":"Matt, B.J.: Identification of multiple invalid signatures in pairing-based batched signatures. In: PKC 2009 [14], pp. 337\u2013356 (2009). Citations in this document: \u00a71","DOI":"10.1007\/978-3-642-00468-1_19"},{"key":"26_CR21","doi-asserted-by":"crossref","unstructured":"Matt, B.J.: Identification of multiple invalid pairing-based signatures in constrained batches. In: Pairing 2010 [15], pp. 78-95 (2010). Citations in this document: \u00a71, \u00a71","DOI":"10.1007\/978-3-642-17455-1_6"},{"key":"26_CR22","doi-asserted-by":"crossref","unstructured":"Mitrokotsa, A., Vaudenay, S. (eds.): Progress in cryptology\u2013AFRICACRYPT 2012, 5th international conference on cryptology in Africa, Ifrane, Morocco, July 10-12, 2012, proceedings. LNCS, vol. 7374. Springer (2012). See [16]","DOI":"10.1007\/978-3-642-31410-0"},{"key":"26_CR23","unstructured":"Naccache, D., M\u2019Raihi, D., Vaudenay, S., Raphaeli, D.: Can D.S.A. be improved? Complexity trade-offs with the digital signature standard. In: Eurocrypt \u201994 [9] (1994). Citations in this document: \u00a71, \u00a71, \u00a71, \u00a71, \u00a72"},{"key":"26_CR24","unstructured":"Nyberg, K. (ed.): Advances in cryptology\u2013EUROCRYPT \u201998, international conference on the theory and application of cryptographic techniques, Espoo, Finland, May 31-June 4, 1998, proceedings. LNCS, vol. 1403. Springer (1998). ISBN 3-540-64518-7. See [2]"},{"key":"26_CR25","doi-asserted-by":"crossref","unstructured":"Pastuszak, J., Michalek, D., Pieprzyk, J., Seberry, J.: Identi_cation of bad signatures in batches. In: PKC 2000 [13], pp. 28\u201345 (2000). Citations in this document: \u00a71, \u00a71, \u00a71, \u00a73","DOI":"10.1007\/978-3-540-46588-1_3"},{"key":"26_CR26","doi-asserted-by":"crossref","unstructured":"Pastuszak, J., Pieprzyk, J., Seberry, J.: Codes identifying bad signature in batches. In: Indocrypt 2000 [32], pp. 143\u2013154 (2000). Citations in this document: \u00a71, \u00a71","DOI":"10.1007\/3-540-44495-5_13"},{"key":"26_CR27","unstructured":"Pieprzyk, J. (ed.): Advances in cryptology\u2013ASIACRYPT 2008, 14th international conference on the theory and application of cryptology and information security, Melbourne, Australia, December 7-11, 2008. LNCS, vol. 5350 (2008). ISBN 978-3-540-89254-0. See [12]"},{"key":"26_CR28","doi-asserted-by":"crossref","unstructured":"Pippenger, N.: On the evaluation of powers and related problems (preliminary version). In: FOCS \u201976 [1], pp. 258-263 (1976); newer version split into [29] and[30]. MR 58:3682. Citations in this document: \u00a74","DOI":"10.1109\/SFCS.1976.21"},{"key":"26_CR29","unstructured":"Pippenger, N.: The minimum number of edges in graphs with prescribed paths. Mathematical Systems Theory 12, 325-346 (1979); see also older version [28]. ISSN 0025-5661. MR 81e:05079"},{"key":"26_CR30","doi-asserted-by":"crossref","first-page":"230","DOI":"10.1137\/0209022","volume":"9","author":"N. Pippenger","year":"1980","unstructured":"Pippenger, N.: On the evaluation of powers and monomials. SIAM Journal on Computing 9, 230-250 (1980); see also older version [28]. ISSN 0097-5397. MR 82c:10064. Citations in this document: \u00a74","journal-title":"SIAM Journal on Computing"},{"key":"26_CR31","unstructured":"Preneel, B., Takagi, T. (eds.): Cryptographic hardware and embedded systems\u2013CHES 2011, 13th international workshop, Nara, Japan, September 28-October 1, 2011, proceedings. LNCS, vol. 6917. Springer (2011). ISBN 978-3-642-23950-2. See [4]"},{"key":"26_CR32","unstructured":"Roy, B.K., Okamoto, E. (eds.): Progress in cryptology\u2013INDOCRYPT 2000,First international conference in cryptology in India, Calcutta, India, December 10-13,2000, proceedings. LNCS, vol. 1977. Springer (2000). ISBN 3-540-41452-5. See [26]"},{"key":"26_CR33","unstructured":"Rueppel, R.A. (ed.): Advances in cryptology\u2013EUROCRYPT \u201992, workshop on the theory and application of cryptographic techniques, Balatonf\u00fcred, Hungary, May 24-28, 1992, proceedings. LNCS, vol. 658. Springer (1993). ISBN 3-540-56413-6. MR 94e:94002. See [6]"},{"key":"26_CR34","doi-asserted-by":"crossref","unstructured":"Schnorr, C.P.: Efficient identification and signatures for smart cards. In: Crypto \u201989 [5], pp. 239\u2013252 (1990); see also newer version [35]","DOI":"10.1007\/0-387-34805-0_22"},{"key":"26_CR35","doi-asserted-by":"crossref","unstructured":"Schnorr, C.P.: Efficient signature generation by smart cards. Journal of Cryptology 4, 161-174 (1991); see also older version [34], http:\/\/www.mi.informatik.uni-frankfurt.de\/research\/papers.html . Citations in this document: \u00a71","DOI":"10.1007\/BF00196725"},{"key":"26_CR36","unstructured":"Solinas, J.A.: Low-weight binary representations for pairs of integers CORR 2001-41 (2001), http:\/\/www.cacr.math.uwaterloo.ca\/techreports\/2001\/corr2001-41.ps . Citations in this document: \u00a75"},{"key":"26_CR37","first-page":"806","volume":"70","author":"E.G. Straus","year":"1964","unstructured":"Straus, E.G.: Addition chains of vectors (problem 5125). American Mathematical Monthly 70, 806-808 (1964). Citations in this document: \u00a74","journal-title":"American Mathematical Monthly"},{"key":"26_CR38","doi-asserted-by":"crossref","unstructured":"Yung, M., Dodis, Y., Kiayias, A., Malkin, T. (eds.): Public key cryptography| 9th international conference on theory and practice in public-key cryptography, New York, NY, USA, April 24-26, 2006, proceedings. LNCS, vol. 3958. Springer(2006). ISBN 978-3-540-33851-2. See [3]","DOI":"10.1007\/11745853"},{"key":"26_CR39","doi-asserted-by":"crossref","unstructured":"Zaverucha, G.M., Stinson, D.M.: Group testing and batch verification. In: ICITS 2009 [17], pp. 140-157 (2010). Citations in this document: \u00a71, \u00a71","DOI":"10.1007\/978-3-642-14496-7_12"}],"container-title":["Lecture Notes in Computer Science","Progress in Cryptology - INDOCRYPT 2012"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-34931-7_26.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,23]],"date-time":"2025-04-23T09:24:06Z","timestamp":1745400246000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-34931-7_26"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642349300","9783642349317"],"references-count":39,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-34931-7_26","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2012]]}}}