{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T13:25:54Z","timestamp":1725456354014},"publisher-location":"Berlin, Heidelberg","reference-count":11,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540640400"},{"type":"electronic","value":"9783540696889"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1998]]},"DOI":"10.1007\/bfb0028170","type":"book-chapter","created":{"date-parts":[[2005,11,22]],"date-time":"2005-11-22T06:50:22Z","timestamp":1132642222000},"page":"201-206","source":"Crossref","is-referenced-by-count":1,"title":["A weakness of the Menezes-Vanstone cryptosystem"],"prefix":"10.1007","author":[{"given":"Klaus","family":"Kiefer","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2005,6,15]]},"reference":[{"key":"16_CR1","doi-asserted-by":"crossref","unstructured":"D. Coppersmith. Fast Evaluation of Discrete Logarithms in Fields of Characteristic Two, IEEE Transactions of Information Theory IT-30 (1984), pp. 587\u2013594.","DOI":"10.1109\/TIT.1984.1056941"},{"key":"16_CR2","doi-asserted-by":"publisher","first-page":"469","DOI":"10.1109\/TIT.1985.1057074","volume":"31","author":"T. ElGamal","year":"1985","unstructured":"T. ElGamal. A Public Key Cryptosystem and a. Signature Scheme Based on Discrete Logarithms, IEEE Transactions on Information Theory, 31 (1985), pp. 469\u2013472.","journal-title":"IEEE Transactions on Information Theory"},{"key":"16_CR3","doi-asserted-by":"crossref","unstructured":"N. Koblitz. A Course in Number Theory and Cryptography, New York, 1987.","DOI":"10.1007\/978-1-4684-0310-7"},{"key":"16_CR4","doi-asserted-by":"crossref","unstructured":"U. Maurer, S. Wolf. Diffie-Hellman-Oracles, Advances in Cryptology-CRYPTO'96 Proceedings, pp. 268\u2013282.","DOI":"10.1007\/3-540-68697-5_21"},{"key":"16_CR5","doi-asserted-by":"crossref","first-page":"49","DOI":"10.1090\/psapm\/042\/1095551","volume":"42","author":"K. McCurley","year":"1990","unstructured":"K. McCurley. The Discrete Logarithm Problem, Cryptology and Computational Number Theory, AMS Proc. Symp. in Applied Mathematics, 42 (1990), pp. 49\u201374.","journal-title":"AMS Proc. Symp. in Applied Mathematics"},{"key":"16_CR6","doi-asserted-by":"publisher","first-page":"209","DOI":"10.1007\/BF00203817","volume":"6","author":"A. Menezes","year":"1993","unstructured":"A. Menezes, S. A. Vanstone. Elliptic Curve Cryptosystems and Their Implementation, Journal of Cryptology, 6 (1993), pp. 209\u2013224.","journal-title":"Journal of Cryptology"},{"key":"16_CR7","doi-asserted-by":"crossref","unstructured":"A. Odlyzko. Discrete Logarithms and their Cryptographic Significance, Advances in Cryptology-EUROCRYPT'84 Proceedings, pp. 224\u2013314.","DOI":"10.1007\/3-540-39757-4_20"},{"key":"16_CR8","doi-asserted-by":"publisher","first-page":"106","DOI":"10.1109\/TIT.1978.1055817","volume":"24","author":"S. Pohlig","year":"1978","unstructured":"S. Pohlig, M. Hellman. An Improved Algorithm for computing Logarithms over GF(p n) and its Cryptographic Significance, IEEE Transactions of Information Theory, 24 (1978), pp. 106\u2013110.","journal-title":"IEEE Transactions of Information Theory"},{"key":"16_CR9","doi-asserted-by":"crossref","first-page":"50","DOI":"10.1002\/j.1538-7305.1951.tb01366.x","volume":"30","author":"C. E. Shannon","year":"1951","unstructured":"C. E. Shannon. Prediction and Entropy in Printed English, Bell System Technical Journal, 30 (1951), pp. 50\u201364.","journal-title":"Bell System Technical Journal"},{"key":"16_CR10","unstructured":"D. R. Stinson. Cryptography: Theory and Practice, Boca Raton, 1995."},{"key":"16_CR11","unstructured":"D. Weber, T. Denny, J. Zayer. Discrete Log Record, posting to Number Theory Net (NMBRTHRY@listserv.nodak.edu), November 25, 1996."}],"container-title":["Lecture Notes in Computer Science","Security Protocols"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/BFb0028170","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,4,11]],"date-time":"2020-04-11T02:49:19Z","timestamp":1586573359000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/BFb0028170"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1998]]},"ISBN":["9783540640400","9783540696889"],"references-count":11,"URL":"https:\/\/doi.org\/10.1007\/bfb0028170","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[1998]]}}}