{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T13:22:03Z","timestamp":1725456123952},"publisher-location":"Berlin, Heidelberg","reference-count":13,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540636960"},{"type":"electronic","value":"9783540696285"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1997]]},"DOI":"10.1007\/bfb0028490","type":"book-chapter","created":{"date-parts":[[2005,11,22]],"date-time":"2005-11-22T08:09:54Z","timestamp":1132646994000},"page":"346-355","source":"Crossref","is-referenced-by-count":3,"title":["Digital signature and public key cryptosystem in a prime order subgroup of Zn*"],"prefix":"10.1007","author":[{"given":"Colin","family":"Boyd","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2005,6,17]]},"reference":[{"key":"34_CR1","doi-asserted-by":"crossref","unstructured":"L. M. Adleman and K. S. McCurley, \u201cOpen Problems in Number Theoretic Complexity, II\u201d, Algorithmic Number Theory, Lecture Notes in Computer Science Vol.877, Springer-Verlag, 1994.","DOI":"10.1007\/3-540-58691-1_70"},{"key":"34_CR2","doi-asserted-by":"crossref","unstructured":"R. Anderson and S. Vaudenay, \u201cMinding Your p's and q's\u201d, Advances in Cryptology-Asiacrypt 96, Springer-Verlag, 1996.","DOI":"10.1007\/BFb0034832"},{"issue":"1","key":"34_CR3","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1007\/BF00191319","volume":"5","author":"E. F. Brickell","year":"1992","unstructured":"E. F. Brickell and K. S. McCurley, \u201cAn Interactive Identification Scheme Based on Discrete Logarithms and Factoring\u201d, Journal of Cryptology, 5, 1, pp.29\u201339, 1992.","journal-title":"Journal of Cryptology"},{"issue":"4","key":"34_CR4","doi-asserted-by":"publisher","first-page":"469","DOI":"10.1109\/TIT.1985.1057074","volume":"IT-31","author":"T. ElGamal","year":"1985","unstructured":"T. ElGamal, \u201cA Public Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms\u201d, IEEE Transactions on Information Theory, IT-31, 4, pp.469\u2013472, 1985.","journal-title":"IEEE Transactions on Information Theory"},{"key":"34_CR5","unstructured":"FIPS 180-1, \u201cSecure Hash Standard\u201d, US Department of Commerce\/NIST, April 1995."},{"key":"34_CR6","unstructured":"FIPS 186, \u201cDigital Signature Standard\u201d, US Department of Commerce\/NIST, 1994."},{"key":"34_CR7","doi-asserted-by":"crossref","first-page":"514","DOI":"10.1049\/el:19840357","volume":"20","author":"J. Gordon","year":"1984","unstructured":"J. Gordon, \u201cStrong RSA Keys\u201d, Electronics Letters, 20, June 7, 1984, pp.514\u2013516.","journal-title":"Electronics Letters"},{"key":"34_CR8","doi-asserted-by":"crossref","unstructured":"U. Maurer and Y. Yacobi, \u201cNon-interactive Public Key Cryptography\u201d, Advances in Cryptology \u2014 Eurocrypt 91, Springer-Verlag, 1991, pp.498\u2013507.","DOI":"10.1007\/3-540-46416-6_43"},{"key":"34_CR9","unstructured":"A. Menezes, P. van Oorschot, S. Vanstone, Handbook of Applied Cryptography, ARC Press, 1997."},{"key":"34_CR10","doi-asserted-by":"crossref","unstructured":"P. van Oorschot and M. Wiener, \u201cOn Diffie-Hellman Key Agreement with Short Exponents\u201d, Advances in Cryptology \u2014 Eurocrypt '96, Springer-Verlag, 1996, pp.332\u2013343.","DOI":"10.1007\/3-540-68339-9_29"},{"key":"34_CR11","doi-asserted-by":"publisher","first-page":"120","DOI":"10.1145\/359340.359342","volume":"21","author":"R. Rivest","year":"1978","unstructured":"R. Rivest, A. Shamir, L.Adleman, \u201cA Method for Obtaining Digital Signatures and Public Key Cryptosystems\u201d Communications of the ACM, 21, pp.120\u2013126, 1978.","journal-title":"Communications of the ACM"},{"key":"34_CR12","unstructured":"RSA Laboratories, \u201cPKCS #1: RSA Encryption Standard\u201d, Version 1.5, November 1993."},{"key":"34_CR13","doi-asserted-by":"crossref","unstructured":"C. P. Schnorr, \u201cEfficient Identification and Signatures for Smart Cards\u201d, Advances in Cryptology \u2014 Crypto 89, Springer-Verlag, 1990, pp.239\u2013252.","DOI":"10.1007\/0-387-34805-0_22"}],"container-title":["Lecture Notes in Computer Science","Information and Communications Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/BFb0028490","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,4,11]],"date-time":"2020-04-11T02:58:20Z","timestamp":1586573900000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/BFb0028490"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1997]]},"ISBN":["9783540636960","9783540696285"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/bfb0028490","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[1997]]}}}