{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,28]],"date-time":"2026-02-28T13:01:02Z","timestamp":1772283662660,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":11,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540593393","type":"print"},{"value":"9783540492368","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1995]]},"DOI":"10.1007\/bfb0000447","type":"book-chapter","created":{"date-parts":[[2005,10,7]],"date-time":"2005-10-07T15:27:29Z","timestamp":1128698849000},"page":"355-364","source":"Crossref","is-referenced-by-count":31,"title":["A public-key cryptosystem and a digital signature system based on the Lucas function analogue to discrete logarithms"],"prefix":"10.1007","author":[{"given":"Peter","family":"Smith","sequence":"first","affiliation":[]},{"given":"Christopher","family":"Skinner","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2005,9,8]]},"reference":[{"key":"28_CR1","first-page":"105","volume-title":"Intractable Problems in Number Theory","author":"E. Bach","year":"1989","unstructured":"E. Bach, \u201cIntractable Problems in Number Theory\u201d, Advances in Cryptology: Proceedings of CRYPTO '88, Springer-Verlag, Berlin, 1989, pp 105\u2013122."},{"key":"28_CR2","first-page":"159","volume-title":"An Implementation of the general number field sieve","author":"J. Buchmann","year":"1994","unstructured":"J. Buchmann & Loho & Zayer, \u201cAn Implementation of the general number field sieve\u201d, Advances in Cryptology: Proceedings of CRYPTO '93, Springer-Verlag, Berlin, 1994, pp 159\u2013165."},{"key":"28_CR3","first-page":"166","volume-title":"On the factorization of RSA-120","author":"T. Denny","year":"1994","unstructured":"T. Denny and B. Dodson and A.K. Lenstra A. K. Manasse and M.S. Manasse, \u201cOn the factorization of RSA-120\u201d, Advances in Cryptology: Proceedings of CRYPTO '93, Springer-Verlag, Berlin, 1994, pp 166\u2013174."},{"key":"28_CR4","doi-asserted-by":"crossref","first-page":"469","DOI":"10.1109\/TIT.1985.1057074","volume":"31","author":"T. E. Gamal","year":"1985","unstructured":"T. El Gamal, \u201cA public-key cryptosystem and a signature scheme based on discrete logarithms\u201d, IEEE Transactions on Information Theory 31 (1985), pp 469\u2013472.","journal-title":"IEEE Transactions on Information Theory"},{"issue":"No.5","key":"28_CR5","first-page":"10","volume":"18","author":"T. E. Gamal","year":"1993","unstructured":"T. El. Gamal and B. Kaliski, Dr. Dobb's Journal, letter to the editor, 18, No.5, May 1993, p10.","journal-title":"Dr. Dobb's Journal"},{"issue":"No.1","key":"28_CR6","doi-asserted-by":"crossref","first-page":"124","DOI":"10.1137\/0406010","volume":"6","author":"D.M. Gordon","year":"1993","unstructured":"D.M. Gordon, \u201cDiscrete Logarithms in GF(p) using the Number Field Sieve\u201d, Siam J Disc Math 6 No. 1, Feb 1993, pp 124\u2013138.","journal-title":"Siam J Disc Math"},{"key":"28_CR7","doi-asserted-by":"crossref","first-page":"419","DOI":"10.2307\/1968235","volume":"31","author":"D. H. Lehmer","year":"1930","unstructured":"D. H. Lehmer, \u201cAn extended theory of Lucas' functions\u201d, Annals of Math., 31 (1930) pp 419\u2013448.","journal-title":"Annals of Math."},{"key":"28_CR8","doi-asserted-by":"crossref","first-page":"184","DOI":"10.2307\/2369308","volume":"1","author":"F. E. A. Lucas","year":"1878","unstructured":"F. E. A. Lucas, \u201cTh\u00e9orie des fonctions num\u00e9riques simplement p\u00e9riodiques\u201d, American Jnl Math, 1 (1878) pp 184\u2013240, 289\u2013321.","journal-title":"American Jnl Math"},{"key":"28_CR9","doi-asserted-by":"crossref","first-page":"1639","DOI":"10.1109\/18.259647","volume":"39","author":"A. J. Menezes","year":"1993","unstructured":"A. J. Menezes, T. Okamoto, S. A. Vanstone, \u201cReducing Elliptic Curve Logarithms to Logarithms in a Finite Field\u201d, IEEE Transactions on Information Theory 39 (1993), pp 1639\u20131646.","journal-title":"IEEE Transactions on Information Theory"},{"key":"28_CR10","doi-asserted-by":"crossref","unstructured":"C. Pomerance, \u201cFast Factorization & Discrete Logarithm Algorithms\u201d, Discrete Algorithms & Complexity, W. Rheinboldt et al, Proceedings 1986 Kyoto Conference on Algorithms and Complexity.","DOI":"10.1016\/B978-0-12-386870-1.50014-9"},{"key":"28_CR11","unstructured":"P. Smith and M. Lennon, \u201cLUC: A new public-key system\u201d, Proceedings of IFIP\/Sec '93, Elsevier Science Publications, 1994."}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2014 ASIACRYPT'94"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/BFb0000447","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,4,10]],"date-time":"2020-04-10T06:17:25Z","timestamp":1586499445000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/BFb0000447"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1995]]},"ISBN":["9783540593393","9783540492368"],"references-count":11,"URL":"https:\/\/doi.org\/10.1007\/bfb0000447","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[1995]]}}}