{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,12]],"date-time":"2025-05-12T15:45:18Z","timestamp":1747064718447},"reference-count":11,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[1997,12,1]],"date-time":"1997-12-01T00:00:00Z","timestamp":880934400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J. Cryptology"],"published-print":{"date-parts":[[1997,12]]},"DOI":"10.1007\/s001459900016","type":"journal-article","created":{"date-parts":[[2002,7,25]],"date-time":"2002-07-25T06:15:55Z","timestamp":1027577755000},"page":"1-16","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":24,"title":["On Schnorr\u2019s preprocessing for digital signature schemes"],"prefix":"10.1007","volume":"10","author":[{"given":"Peter","family":"de Rooij","sequence":"first","affiliation":[]}],"member":"297","reference":[{"issue":"1","key":"10101_CR1","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1007\/BF00191319","volume":"5","author":"E. F. Brickell","year":"1992","unstructured":"E. F. Brickell and K. S. McCurley, An interactive identification scheme based on discrete logarithms and factoring,Journal of Cryptology\n                  5(1) (1992), 29\u201339.","journal-title":"Journal of Cryptology"},{"key":"10101_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"127","DOI":"10.1007\/3-540-39118-5_13","volume-title":"Advances in Cryptology\u2014Proceedings of Eurocrypt '87","author":"D. Chaum","year":"1988","unstructured":"D. Chaum, J.-H. Evertse, and J. van de Graaf, An improved protocol for demonstration possession of discrete logarithms and some generalizations,Advances in Cryptology\u2014Proceedings of Eurocrypt '87 (D. Chaum and W. L. Price, eds.), Lecture Notes in Computer Science, vol. 304, Springer-Verlag, Berlin, 1988, pp. 127\u2013141."},{"issue":"6","key":"10101_CR3","doi-asserted-by":"publisher","first-page":"644","DOI":"10.1109\/TIT.1976.1055638","volume":"22","author":"W. Diffie","year":"1976","unstructured":"W. Diffie and M. E. Hellman, New directions in cryptography,IEEE Transactions on Information Theory\n                  22(6) (1976), 644\u2013654.","journal-title":"IEEE Transactions on Information Theory"},{"issue":"4","key":"10101_CR4","doi-asserted-by":"publisher","first-page":"469","DOI":"10.1109\/TIT.1985.1057074","volume":"31","author":"T. ElGamal","year":"1985","unstructured":"T. ElGamal, A public key cryptosystem and a signature scheme based on discrete logarithms,IEEE Transactions on Information Theory\n                  31(4) (1985), 469\u2013472.","journal-title":"IEEE Transactions on Information Theory"},{"issue":"1","key":"10101_CR5","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1007\/BF02351717","volume":"1","author":"U. Feige","year":"1988","unstructured":"U. Feige, A. Fiat, and A. Shamir, Zero knowledge proofs of identity,Journal of Cryptology\n                  1(1) (1988), 77\u201395.","journal-title":"Journal of Cryptology"},{"key":"10101_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"29","DOI":"10.1007\/3-540-46885-4_5","volume-title":"Advances in Cryptology\u2014Proceedings of Eurocrypt '89","author":"C. G. G\u00fcnther","year":"1990","unstructured":"C. G. G\u00fcnther, An identity-based key-exchange protocol,Advances in Cryptology\u2014Proceedings of Eurocrypt '89 (J.-J. Quisquater and J. Vandewalle, eds.), Lecture Notes in Computer Science, vol. 434, Springer-Verlag, Berlin, 1990, pp. 29\u201337."},{"key":"10101_CR7","unstructured":"National Institute of Technology and Standards,Specifications for the Digital Signature Standard (DSS), Federal Information Processing Standards Publication XX, U.S. Department of Commerce, February 1, 1993."},{"key":"10101_CR8","series-title":"Lecture Notes in Computer Science","first-page":"123","volume-title":"Advances in Cryptology\u2014Proceedings of Eurocrypt '88","author":"J. J. Quisquater","year":"1988","unstructured":"J. J. Quisquater and L. S. Guillou, A practical zero-knowledge protocol fitted to security microprocessor minimizing both transmission and memory,Advances in Cryptology\u2014Proceedings of Eurocrypt '88 (C. G. G\u00fcnther, ed.), Lecture Notes in Computer Science, vol. 330, Springer-Verlag, Berlin, 1988, pp. 123\u2013128."},{"key":"10101_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"71","DOI":"10.1007\/3-540-46416-6_6","volume-title":"Advances in Cryptology\u2014Proceedings of Eurocrypt '91","author":"P. Rooij de","year":"1991","unstructured":"P. de Rooij, On the security of the Schnorr scheme using preprocessing,Advances in Cryptology\u2014Proceedings of Eurocrypt '91 (D. W. Davies, ed.), Lecture Notes in Computer Science, vol. 547, Springer-Verlag, Berlin, 1991, pp. 71\u201380."},{"key":"10101_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"239","DOI":"10.1007\/0-387-34805-0_22","volume-title":"Advances in Cryptology\u2014Proceedings of Crypto '89","author":"C. P. Schnorr","year":"1990","unstructured":"C. P. Schnorr, Efficient identification and signatures for smart cards,Advances in Cryptology\u2014Proceedings of Crypto '89 (G. Brassard, ed.), Lecture Notes in Computer Science, vol. 435, Springer-Verlag, Berlin, 1990, pp. 239\u2013251."},{"issue":"3","key":"10101_CR11","doi-asserted-by":"publisher","first-page":"161","DOI":"10.1007\/BF00196725","volume":"4","author":"C. P. Schnorr","year":"1991","unstructured":"C. P. Schnorr, Efficient signature generation by smart cards.Journal of Cryptology\n                  4(3) (1991), 161\u2013174.","journal-title":"Journal of Cryptology"}],"container-title":["Journal of Cryptology"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s001459900016.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s001459900016\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s001459900016","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s001459900016.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,4,8]],"date-time":"2020-04-08T08:18:40Z","timestamp":1586333920000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s001459900016"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1997,12]]},"references-count":11,"journal-issue":{"issue":"1","published-print":{"date-parts":[[1997,12]]}},"alternative-id":["10101"],"URL":"https:\/\/doi.org\/10.1007\/s001459900016","relation":{},"ISSN":["0933-2790","1432-1378"],"issn-type":[{"value":"0933-2790","type":"print"},{"value":"1432-1378","type":"electronic"}],"subject":[],"published":{"date-parts":[[1997,12]]},"assertion":[{"value":"29 April 1993","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"15 September 1995","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}