{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,7]],"date-time":"2025-12-07T13:04:44Z","timestamp":1765112684894},"publisher-location":"Berlin, Heidelberg","reference-count":10,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540601760"},{"type":"electronic","value":"9783540447177"}],"license":[{"start":{"date-parts":[[1995,1,1]],"date-time":"1995-01-01T00:00:00Z","timestamp":788918400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1995]]},"DOI":"10.1007\/bfb0053426","type":"book-chapter","created":{"date-parts":[[2006,6,7]],"date-time":"2006-06-07T04:05:50Z","timestamp":1149653150000},"page":"77-85","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":84,"title":["Can D.S.A. be improved? \u2014 Complexity trade-offs with the digital signature standard \u2014"],"prefix":"10.1007","author":[{"given":"David","family":"Naccache","sequence":"first","affiliation":[]},{"given":"David","family":"M'Ra\u00cfhi","sequence":"additional","affiliation":[]},{"given":"Serge","family":"Vaudenay","sequence":"additional","affiliation":[]},{"given":"Dan","family":"Raphaeli","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2006,5,23]]},"reference":[{"key":"8_CR1","unstructured":"FIPS PUB XX, February 1, 1993, Digital Signature Standard."},{"key":"8_CR2","volume-title":"Technical report no. SAND91-1836C","author":"E. Brickell","year":"1991","unstructured":"E. Brickell, D. Gordon and K. McCurley, Fast exponentiation with precomputation, Technical report no. SAND91-1836C, Sandia National Laboratories, Albuquerque, New-Mexico, October 1991."},{"key":"8_CR3","doi-asserted-by":"crossref","unstructured":"E. Brickell and K. McCurley, An interactive identification scheme based on discrete logarithms and factoring, Journal of Cryptology, vol 5, no. 1, 1992.","DOI":"10.1007\/BF00191319"},{"key":"8_CR4","unstructured":"D. Chaum and J. Bos, Smart Cash: A practical electronic payment system, CWI-Report CS-R9035, August 1990."},{"issue":"4","key":"8_CR5","first-page":"469","volume":"IT-31","author":"T. El-Gamal","year":"1985","unstructured":"T. El-Gamal, A public-key cryptosystem and a signature scheme based on discrete logarithms, IEEE TIT, vol. IT-31:4, pp 469\u2013472, 1985.","journal-title":"IEEE TIT"},{"key":"8_CR6","first-page":"123","volume-title":"LNCS","author":"L. Guillou","year":"1988","unstructured":"L. Guillou and J.J. Quisquater, A practical zero-knowledge protocol fitted to security microprocessor minimising both transmission and memory, Advances in cryptology: Proceedings of Eurocrypt'88, LNCS, Springer-Verlag, Berlin, 330, pp 123\u2013128, 1988."},{"key":"8_CR7","doi-asserted-by":"crossref","first-page":"410","DOI":"10.1214\/aoms\/1177698956","volume":"38","author":"L.H. Harper","year":"1967","unstructured":"L.H. Harper, Stirling behavior is asymptotically normal, Annals of Mathematical Statistics, vol. 38, pp. 410\u2013414, 1967.","journal-title":"Annals of Mathematical Statistics"},{"issue":"170","key":"8_CR8","doi-asserted-by":"publisher","first-page":"519","DOI":"10.2307\/2007970","volume":"44","author":"P. Montgomery","year":"1985","unstructured":"P. Montgomery, Modular multiplication without trial division, Mathematics of Computation., vol. 44(170), pp. 519\u2013521, 1985.","journal-title":"Mathematics of Computation."},{"key":"8_CR9","unstructured":"J.H. Morris, Lambda-calculus models of programming languages, Ph.D. thesis, MIT, 1968."},{"key":"8_CR10","first-page":"239","volume-title":"LNCS","author":"C. Schnorr","year":"1990","unstructured":"C. Schnorr, Efficient identification and signatures for smart-cards, Advances in cryptology: Proceedings of Eurocrypt'89 (G. Brassard ed.), LNCS, Springer-Verlag, Berlin, 435 (1990), pp. 239\u2013252."}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2014 EUROCRYPT'94"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/BFb0053426","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,19]],"date-time":"2019-05-19T13:11:57Z","timestamp":1558271517000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/BFb0053426"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1995]]},"ISBN":["9783540601760","9783540447177"],"references-count":10,"URL":"https:\/\/doi.org\/10.1007\/bfb0053426","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[1995]]},"assertion":[{"value":"23 May 2006","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}