{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,28]],"date-time":"2026-02-28T13:01:22Z","timestamp":1772283682534,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":18,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540645184","type":"print"},{"value":"9783540697954","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1998]]},"DOI":"10.1007\/bfb0054130","type":"book-chapter","created":{"date-parts":[[2006,7,27]],"date-time":"2006-07-27T09:13:04Z","timestamp":1153991584000},"page":"236-250","source":"Crossref","is-referenced-by-count":256,"title":["Fast batch verification for modular exponentiation and digital signatures"],"prefix":"10.1007","author":[{"given":"Mihir","family":"Bellare","sequence":"first","affiliation":[]},{"given":"Juan A.","family":"Garay","sequence":"additional","affiliation":[]},{"given":"Tal","family":"Rabin","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2006,5,25]]},"reference":[{"key":"18_CR1","doi-asserted-by":"crossref","unstructured":"M. Bellare, J. Garay and T. Rabin. Distributed pseudo-random bit generators\u2014 a new way to speed-up shared coin tossing. Proceedings Fifteenth Annual Symposium on Principles of Distributed Computing, ACM, 1996.","DOI":"10.1145\/248052.248090"},{"key":"18_CR2","doi-asserted-by":"crossref","unstructured":"M. Bellare, J. Garay and T. Rabin. Fast batch verification for modular expo-nentiation and digital signatures. Full version of this paper, available via http:\/\/ www-cse.ucsd.edu\/users\/mihir, 1998.","DOI":"10.1007\/BFb0054130"},{"key":"18_CR3","unstructured":"M. Bellare, J. Garay and T. Rabin. Batch verification with applications to cryptography and checking (Invited Paper), Latin American Theoretical INfor-matics 98 (LATIN '98) Proceedings, LNCS Vol. 1830, C. Lucchesi and A. Moura eds., Springer-Verlag, 1998."},{"key":"18_CR4","doi-asserted-by":"crossref","unstructured":"M. Bellare and P. Rogaway. Random oracles are practical: A paradigm for designing efficient protocols. First ACM Conference on Computer and Communi-cations Security, ACM, 1994.","DOI":"10.1145\/168588.168596"},{"key":"18_CR5","doi-asserted-by":"crossref","unstructured":"M. Bellare and P. Rogaway. The exact security of digital signatures: How to sign with RSA and Rabin. Advances in Cryptology \u2014 Eurocrypt 96 Proceedings, LNCS Vol. 1070, U. Maurer ed., Springer-Verlag, 1996.","DOI":"10.1007\/3-540-68339-9_34"},{"key":"18_CR6","unstructured":"M. Beller and Y. Yacobi. Batch Diffie-Hellman key agreement systems and their application to portable communications. Advances in Cryptology \u2014 Euro-crypt 92 Proceedings, LNCS Vol. 658, R. Rueppel ed., Springer-Verlag, 1992."},{"key":"18_CR7","doi-asserted-by":"crossref","unstructured":"M. Blum and S. Kannan. Designing programs that check their work. Proceed-ings of the 21st Annual Symposium on the Theory of Computing, ACM, 1989.","DOI":"10.1145\/73007.73015"},{"key":"18_CR8","unstructured":"J. Bos and M. Coster. Addition chain heuristics. Advances in Cryptology \u2014 Crypto 89 Proceedings, LNCS Vol. 435, G. Brassard ed., Springer-Verlag, 1989."},{"key":"18_CR9","unstructured":"B. Brickell, D. Gordon, K. McCurley and D. Wilson. Fast exponentiation with precomputation. Advances in Cryptology \u2014 Eurocrypt 92 Proceedings, LNCS Vol. 658, R. Rueppel ed., Springer-Verlag, 1992."},{"key":"18_CR10","doi-asserted-by":"crossref","unstructured":"E. Brickell, P. Lee and Y. Yacobi. Secure audio teleconference. Advances in Cryptology \u2014 Crypto 87 Proceedings, LNCS Vol. 293, C. Pomerance ed., Springer-Verlag, 1987.","DOI":"10.1007\/3-540-48184-2_36"},{"issue":"2","key":"18_CR11","doi-asserted-by":"publisher","first-page":"75","DOI":"10.1007\/s001459900021","volume":"10","author":"A. Fiat","year":"1997","unstructured":"A. Fiat. Batch RSA. Journal of Cryptology, Vol. 10, No. 2, 1997, pp. 75\u201388.","journal-title":"Journal of Cryptology"},{"key":"18_CR12","unstructured":"National Institute for Standards and Technology. Digital Signature Standard (DSS). Federal Register, Vol. 56, No. 169, August 30, 1991."},{"key":"18_CR13","doi-asserted-by":"crossref","unstructured":"C. Lim and P. Lee. More flexible exponentiation with precomputation. Advances in Cryptology \u2014 Crypto 94 Proceedings, LNCS Vol. 839, Y. Desmedt ed., Springer-Verlag, 1994.","DOI":"10.1007\/3-540-48658-5_11"},{"key":"18_CR14","doi-asserted-by":"crossref","unstructured":"D. M'Ra\u00cfhi and D. Naccache. Batch exponentiation \u2014 A fast DLP based signa-ture generation strategy. 3rd ACM Conference on Computer and Communications Security, ACM, 1996.","DOI":"10.1145\/238168.238187"},{"key":"18_CR15","doi-asserted-by":"crossref","unstructured":"D. Naccache, D. M'Ra\u00cfhi, S. Vaudenay and D. Raphaeli. Can D.S.A be improved? Complexity trade-offs with the digital signature standard. Advances in Cryptology \u2014 Eurocrypt 94 Proceedings, LNCS Vol. 950, A. De Santis ed., Springer-Verlag, 1994.","DOI":"10.1007\/BFb0053426"},{"key":"18_CR16","doi-asserted-by":"crossref","unstructured":"P. de Rooij. Efficient exponentiation using precomputation and vector addi-tion chains. Advances in Cryptology \u2014 Eurocrypt 94 Proceedings, LNCS Vol. 950, A. De Santis ed., Springer-Verlag, 1994.","DOI":"10.1007\/BFb0053453"},{"key":"18_CR17","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1016\/0020-0190(92)90093-B","volume":"42","author":"R. Rubinfeld","year":"1992","unstructured":"R. Rubinfeld. Batch Checking with applications to linear functions. Information Processing Letters, Vol 42, 1992, pp. 77\u201380.","journal-title":"Information Processing Letters"},{"key":"18_CR18","unstructured":"J. Sauerbrey and A. Dietel. Resource requirements for the application of ad-dition chains modulo exponentiation. Advances in Cryptology \u2014 Eurocrypt 92 Proceedings, LNCS Vol. 658, R. Rueppel ed., Springer-Verlag, 1992."}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2014 EUROCRYPT'98"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/BFb0054130","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,4,20]],"date-time":"2019-04-20T08:36:44Z","timestamp":1555749404000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/BFb0054130"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1998]]},"ISBN":["9783540645184","9783540697954"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/bfb0054130","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[1998]]}}}