{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,21]],"date-time":"2025-10-21T14:50:19Z","timestamp":1761058219846},"reference-count":18,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[1992,3,1]],"date-time":"1992-03-01T00:00:00Z","timestamp":699408000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["AAECC"],"published-print":{"date-parts":[[1992,3]]},"DOI":"10.1007\/bf01189025","type":"journal-article","created":{"date-parts":[[2005,2,18]],"date-time":"2005-02-18T10:58:48Z","timestamp":1108724328000},"page":"67-74","source":"Crossref","is-referenced-by-count":14,"title":["A note on cyclic groups, finite fields, and the discrete logarithm problem"],"prefix":"10.1007","volume":"3","author":[{"given":"Alfred J.","family":"Menezes","sequence":"first","affiliation":[]},{"given":"Scott A.","family":"Vanstone","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"CR1","doi-asserted-by":"crossref","unstructured":"Ben-Or, M.: Probabilistic algorithms in finite fields, 22nd Annual Symposium on Foundations of Computer Science, 394?398 (1981)","DOI":"10.1109\/SFCS.1981.37"},{"key":"CR2","doi-asserted-by":"crossref","first-page":"107","DOI":"10.1007\/BF02351719","volume":"1","author":"J. Buchmann","year":"1988","unstructured":"Buchmann, J., Williams, H.: A key-exchange system based on imaginary quadratic fields. J. Cryptol.1, 107?118 (1988)","journal-title":"J. Cryptol."},{"key":"CR3","doi-asserted-by":"crossref","first-page":"587","DOI":"10.1109\/TIT.1984.1056941","volume":"30","author":"D. Coppersmith","year":"1984","unstructured":"Coppersmith, D.: Fast evaluation of logarithms in fields of characteristic two. IEEE Trans. Inf. Theory30, 587?594 (1984)","journal-title":"IEEE Trans. Inf. Theory"},{"key":"CR4","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/BF01840433","volume":"1","author":"D. Coppersmith","year":"1986","unstructured":"Coppersmith, D., Odlyzko, A., Schroeppel, R.: Discrete logarithms inGF(p). Algorithmica1, 1?15 (1986)","journal-title":"Algorithmica"},{"key":"CR5","doi-asserted-by":"crossref","first-page":"644","DOI":"10.1109\/TIT.1976.1055638","volume":"22","author":"W. Diffie","year":"1976","unstructured":"Diffie, W., Hellman, M.: New directions in cryptography. IEEE Trans. Inf. Theory22, 644?654 (1976)","journal-title":"EEE Trans. Inf. Theory"},{"key":"CR6","doi-asserted-by":"crossref","first-page":"473","DOI":"10.1109\/TIT.1985.1057075","volume":"31","author":"T. ElGamal","year":"1985","unstructured":"ElGamal, T.: A subexponential-time algorithm for computing discrete logarithms over GF(p2). IEEE Trans. Inf. Theory31, 473?481 (1985)","journal-title":"IEEE Trans. Inf. Theory"},{"key":"CR7","volume-title":"Linear Algebra","author":"K. Hoffman","year":"1971","unstructured":"Hoffman, K., Kunze, R.: Linear Algebra. New York: Prentice-Hall, NJ 1971"},{"key":"CR8","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4757-5119-2","volume-title":"Elliptic Curves","author":"D. Husem\u00f6ller","year":"1987","unstructured":"Husem\u00f6ller, D.: Elliptic Curves. Berlin, Heidelberg, New York: Springer 1987"},{"key":"CR9","doi-asserted-by":"crossref","first-page":"203","DOI":"10.1090\/S0025-5718-1987-0866109-5","volume":"48","author":"N. Koblitz","year":"1987","unstructured":"Koblitz, N.: Elliptic curve cryptosystems. Math. Comput.48, 203?209 (1987)","journal-title":"Math. Comput."},{"key":"CR10","doi-asserted-by":"crossref","first-page":"139","DOI":"10.1007\/BF02252872","volume":"1","author":"N. Koblitz","year":"1989","unstructured":"Koblitz, N.: Hyperelliptic cryptosystems. J. Cryptol.1, 139?150 (1989)","journal-title":"J. Cryptol."},{"key":"CR11","doi-asserted-by":"crossref","first-page":"49","DOI":"10.1090\/psapm\/042\/1095551","volume":"42","author":"K. McCurley","year":"1990","unstructured":"McCurley, K.: The discrete logarithm problem. Cryptol. Comput. Number Theory. Proc. Symp. Appl. Math.42, 49?74 (1990)","journal-title":"Cryptol. Comput. Number Theory. Proc. Symp. Appl. Math."},{"key":"CR12","doi-asserted-by":"crossref","unstructured":"Menezes, A., Okamoto, T., Vanstone, S.: Reducing elliptic curve logarithms to logarithms in a finite field. Proceedings of the 22nd Annual ACM Symposium on the Theory of Computing, 80?89 (1991)","DOI":"10.1145\/103418.103434"},{"key":"CR13","first-page":"417","volume-title":"Lecture Notes in Computer Science vol. 218","author":"V. Miller","year":"1986","unstructured":"Miller, V.: Uses of elliptic curves in cryptography. Advances in Cryptology ? Proceedings of Crypto '85. Lecture Notes in Computer Science vol. 218, pp. 417?426. Berlin, Heidelberg, New York: Springer 1986"},{"key":"CR14","first-page":"224","volume-title":"Lecture Notes in Computer Science vol. 209","author":"A. Odlyzko","year":"1985","unstructured":"Odlyzko, A.: Discrete logarithms in finite fields and their cryptographic significance. Advances in Cryptology ? Proceedings of Eurocrypt '84. Lecture Notes in Computer Science vol. 209, pp. 224?314. Berlin, Heidelberg, New York: Springer 1985"},{"key":"CR15","doi-asserted-by":"crossref","first-page":"386","DOI":"10.1049\/el:19840267","volume":"20","author":"R. Odoni","year":"1984","unstructured":"Odoni, R., Varadharajan, V., Sanders, R.: Public key distribution in matrix rings, Electronic Letters,20, 386?387 (1984)","journal-title":"Electronic Letters"},{"key":"CR16","doi-asserted-by":"crossref","first-page":"64","DOI":"10.1215\/ijm\/1255631807","volume":"6","author":"J. Rosser","year":"1962","unstructured":"Rosser, J., Schoenfield, L.: Approximate formulas for some functions of prime numbers. Illinois J. Math.6, 64?94 (1962)","journal-title":"Illinois J. Math."},{"key":"CR17","unstructured":"Shallit, J.: personal communication (1991)"},{"key":"CR18","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4757-1920-8","volume-title":"The Arithmetic of Elliptic Curves","author":"J. Silverman","year":"1986","unstructured":"Silverman, J.: The Arithmetic of Elliptic Curves. Berlin, Heidelberg, New York: Springer 1986"}],"container-title":["Applicable Algebra in Engineering, Communication and Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/BF01189025.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/BF01189025\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/BF01189025","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,4,5]],"date-time":"2020-04-05T20:51:17Z","timestamp":1586119877000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/BF01189025"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1992,3]]},"references-count":18,"journal-issue":{"issue":"1","published-print":{"date-parts":[[1992,3]]}},"alternative-id":["BF01189025"],"URL":"https:\/\/doi.org\/10.1007\/bf01189025","relation":{},"ISSN":["0938-1279","1432-0622"],"issn-type":[{"value":"0938-1279","type":"print"},{"value":"1432-0622","type":"electronic"}],"subject":[],"published":{"date-parts":[[1992,3]]}}}