{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,3]],"date-time":"2022-04-03T13:53:09Z","timestamp":1648993989617},"reference-count":14,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[1995,1,1]],"date-time":"1995-01-01T00:00:00Z","timestamp":788918400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Des Codes Crypt"],"published-print":{"date-parts":[[1995,1]]},"DOI":"10.1007\/bf01388505","type":"journal-article","created":{"date-parts":[[2005,4,2]],"date-time":"2005-04-02T04:28:37Z","timestamp":1112416117000},"page":"73-80","source":"Crossref","is-referenced-by-count":3,"title":["Can Montgomery parasites be avoided? A design methodology based on key and cryptosystem modifications"],"prefix":"10.1007","volume":"5","author":[{"given":"David","family":"Naccache","sequence":"first","affiliation":[]},{"given":"David","family":"M'ra\ufffdhi","sequence":"additional","affiliation":[]},{"given":"Dan","family":"Raphaeli","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"CR1","unstructured":"Arazi, B. 1992. Modular multiplication is equivalent in complexity to a standard multiplication. Fortress U & T Internal Report (1992) available from Fortress U & T Information Safeguards, P.O. Box 1350, Beer-Sheva, IL-84110, Israel."},{"key":"CR2","unstructured":"Benaloh, J., and de Mare, M. One-way accumulators: A decentralised alternative to digital signatures.Advances in cryptology: Proceedings of Eurocrypt'93, Lecture Notes in Computer Science. Springer-Verlag, to appear."},{"key":"CR3","first-page":"644","volume":"22","author":"W. Diffie","year":"1976","unstructured":"Diffie, W., and Hellman, M. 1976. New directions in cryptography.IEEE TIT 22:644?654.","journal-title":"IEEE TIT"},{"key":"CR4","first-page":"230","volume-title":"Advances in Crytology?Eurocrypt'90","author":"S. Dusse","year":"1990","unstructured":"Dusse, S., and Kaliski, B. 1990. A cryptographic library for the Motorola DSP56000. InAdvances in Crytology?Eurocrypt'90, pp. 230?244. Springer-Verlag, New York."},{"issue":"4","key":"CR5","first-page":"469","volume":"31","author":"T. El-Gamal","year":"1985","unstructured":"El-Gamal, T., 1985. A public-key cryptosystem and a signature scheme based on the discrete logarithm.IEEE TIT 31(4):469?472.","journal-title":"IEEE TIT"},{"key":"CR6","first-page":"619","volume-title":"Systolic modular multiplication","author":"S. Even","year":"1991","unstructured":"Even, S. 1991. Systolic modular multiplication. InAdvances in Cryptology, Crypto'90, pp. 619?624. Springer-Verlag, New York."},{"key":"CR7","volume-title":"Advances in Cryptology: Proceedings of Crypto'86, Lecture Notes In Computer Science","author":"A. Fiat","year":"1987","unstructured":"Fiat, A., and Shamir, A. 1987. How to prove yourself: Pratical solutions of identification and signature problems. InAdvances in Cryptology: Proceedings of Crypto'86, Lecture Notes In Computer Science 263:186?194. Springer-Verlag, Berlin."},{"issue":"170","key":"CR8","doi-asserted-by":"crossref","first-page":"519","DOI":"10.1090\/S0025-5718-1985-0777282-X","volume":"44","author":"P. Montgomery","year":"1985","unstructured":"Montgomery, P. 1985. Modular multiplication without trial division.Mathematics of Computation 44(170):519?521.","journal-title":"Mathematics of Computation"},{"key":"CR9","unstructured":"Naccache, D. 1993. Can OSS be repaired?Advances in cryptology. Proceedings of Eurocrypt'93, Lecture Notes in Computer Science. Springer-Verlag, to appear."},{"key":"CR10","unstructured":"National Institute of Standards and Technology, Publication XX: announcement and specifications for a digital signature standard (DSS), Federal Register, August 19, 1992."},{"key":"CR11","first-page":"123","volume-title":"Advances in Cryptology: Proceedings of Eurocrypt'88, Lecture Notes in Computer Science","author":"J. J. Quisquater","year":"1988","unstructured":"Quisquater, J. J., and Guillou, L. 1988. A practical zero-knowledge protocol fitted to security microprocessor minimising both transmission and memory. InAdvances in Cryptology: Proceedings of Eurocrypt'88, Lecture Notes in Computer Science edited by C. G\u00fcnter, 330:123?128. Springer-Verlag, Berlin."},{"key":"CR12","doi-asserted-by":"crossref","first-page":"120","DOI":"10.1145\/359340.359342","volume":"21","author":"R. Rivest","year":"1978","unstructured":"Rivest, R., Shamir, A., and Adlemann, L. 1978. A method for obtaining digital signatures and public-key cryptosystems.CACM 21:120?126.","journal-title":"CACM"},{"key":"CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"239","DOI":"10.1007\/0-387-34805-0_22","volume-title":"Advances in cryptology: Proceedings of Eurocrypt'89","author":"C. Schnorr","year":"1990","unstructured":"Schnorr, C. 1990. Efficient identification and signatures for smart-cards. InAdvances in cryptology: Proceedings of Eurocrypt'89, Lecture Notes in Computer Science, edited by G. Brassard, 435:239?252. Springer-Verlag. Berlin."},{"key":"CR14","doi-asserted-by":"crossref","unstructured":"Shand, M., and Vuillemin, J. 1993. Fast implementations of RSA cryptography.11th IEEE Symposium on Computer Arithmetic, to appear.","DOI":"10.1109\/ARITH.1993.378085"}],"container-title":["Designs, Codes and Cryptography"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/BF01388505\/fulltext.html","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/BF01388505.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/BF01388505\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/BF01388505","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,2]],"date-time":"2019-05-02T12:14:19Z","timestamp":1556799259000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/BF01388505"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1995,1]]},"references-count":14,"journal-issue":{"issue":"1","published-print":{"date-parts":[[1995,1]]}},"alternative-id":["BF01388505"],"URL":"https:\/\/doi.org\/10.1007\/bf01388505","relation":{},"ISSN":["0925-1022","1573-7586"],"issn-type":[{"value":"0925-1022","type":"print"},{"value":"1573-7586","type":"electronic"}],"subject":[],"published":{"date-parts":[[1995,1]]}}}