{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,31]],"date-time":"2025-12-31T00:25:45Z","timestamp":1767140745791,"version":"build-2238731810"},"reference-count":12,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2008,11,19]],"date-time":"2008-11-19T00:00:00Z","timestamp":1227052800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Des. Codes Cryptogr."],"published-print":{"date-parts":[[2009,4]]},"DOI":"10.1007\/s10623-008-9246-y","type":"journal-article","created":{"date-parts":[[2008,11,18]],"date-time":"2008-11-18T15:55:12Z","timestamp":1227023712000},"page":"99-104","source":"Crossref","is-referenced-by-count":6,"title":["A variant of Digital Signature Algorithm"],"prefix":"10.1007","volume":"51","author":[{"given":"Dimitrios","family":"Poulakis","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2008,11,19]]},"reference":[{"key":"9246_CR1","doi-asserted-by":"crossref","unstructured":"Bellare M., Goldwasser S., Micciancio D.: \u201cPseudo-random\u201d number generation within cryptographic algorithms: the DSS case. In: Proceedings of Crypto \u201997 LNCS 1294. IACR, Palo Alto, CA. Springer-Verlag, Berlin (1997).","DOI":"10.1007\/BFb0052242"},{"issue":"1\u20133","key":"9246_CR2","doi-asserted-by":"crossref","first-page":"87","DOI":"10.1023\/A:1016549024113","volume":"26","author":"I.F. Blake","year":"2002","unstructured":"Blake I.F., Garefalakis T.: On the security of the digital signature algorithm. In honour of Ronald C. Mullin. Des. Codes Cryptogr 26(1\u20133), 87\u201396 (2002)","journal-title":"In honour of Ronald C. Mullin. Des. Codes Cryptogr"},{"key":"9246_CR3","doi-asserted-by":"crossref","first-page":"469","DOI":"10.1109\/TIT.1985.1057074","volume":"31","author":"T. ElGamal","year":"1985","unstructured":"ElGamal T.: A public key cryptosystem and a signature scheme based on discrete logarithm. IEEE Trans. Inform. Theory 31, 469\u2013472 (1985)","journal-title":"IEEE Trans. Inform. Theory"},{"key":"9246_CR4","doi-asserted-by":"crossref","unstructured":"Horster P., Michels M., Petersen H.: Meta-ElGamal signature schemes using a composite module. Technical Report TR-94-16-E, University of Technology Chemnitz-Zwickau. November 1994.","DOI":"10.1145\/191177.191197"},{"key":"9246_CR5","doi-asserted-by":"crossref","first-page":"283","DOI":"10.1023\/A:1011214926272","volume":"23","author":"N.A. Howgrave-Graham","year":"2001","unstructured":"Howgrave-Graham N.A., Smart N.P.: Lattice attacks on digital signature schemes. Des. Codes Cryptogr. 23, 283\u2013290 (2001)","journal-title":"Des. Codes Cryptogr."},{"key":"9246_CR6","unstructured":"LeVeque W.J.: Fundamentals of Number Theory. Addison-Wesley (1977)."},{"key":"9246_CR7","doi-asserted-by":"crossref","first-page":"95","DOI":"10.1007\/BF02351718","volume":"1","author":"K.S. McCurley","year":"1988","unstructured":"McCurley K.S.: A key distibution system equivalent to factoring. J. Cryptol. 1, 95\u2013105(1988)","journal-title":"J. Cryptol."},{"key":"9246_CR8","volume-title":"Handbook of Applied Cryptography","author":"A.J. Menezes","year":"1997","unstructured":"Menezes A.J., van Oorschot P.C., Vanstone S.A.: Handbook of Applied Cryptography. CRC Press, Boca Raton, Florida (1997)"},{"key":"9246_CR9","unstructured":"National Institute of Standards and Technology (NIST). FIPS Publication 186: Digital Signature Standard. May 1994."},{"key":"9246_CR10","doi-asserted-by":"crossref","first-page":"151","DOI":"10.1007\/s00145-002-0021-3","volume":"15","author":"P. Nguyen","year":"2002","unstructured":"Nguyen P., Shparlinski I.E.: The insecurity of the digital signature algorithm with partially known nonces. J. Cryptol. 15, 151\u2013176 (2002)","journal-title":"J. Cryptol."},{"key":"9246_CR11","unstructured":"Saryazdi S.: An extension to ElGamal public key cryptosystem with a new signature scheme. Communication, control, and signal processing, In: Arikan E. (ed.) Proceedings of the 1990 Bilkent International Conference, held at Bilkent University, Ankara, Turkey, 2\u20135 July 1990. Elsevier (1990)."},{"key":"9246_CR12","doi-asserted-by":"crossref","unstructured":"Tan C.H., Yi X., Siew C.K.: Signature Scheme Based on Composite Discrete Logarithm. In: Proceedings of the 2003 Join Conference of the Fourth International Conference on Information, Communications and Signal Processing and the Fourth Pacific Rim Conference on Multimedia, vol. 3, Issue 15\u201318 Dec. 2003, pp. 1702\u20131706.","DOI":"10.1109\/ICICS.2003.1292757"}],"updated-by":[{"DOI":"10.1007\/s10623-010-9426-4","type":"erratum","label":"Erratum","source":"publisher","updated":{"date-parts":[[2010,8,28]],"date-time":"2010-08-28T00:00:00Z","timestamp":1282953600000}}],"container-title":["Designs, Codes and Cryptography"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-008-9246-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10623-008-9246-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-008-9246-y","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,2]],"date-time":"2025-02-02T16:03:15Z","timestamp":1738512195000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10623-008-9246-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,11,19]]},"references-count":12,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2009,4]]}},"alternative-id":["9246"],"URL":"https:\/\/doi.org\/10.1007\/s10623-008-9246-y","relation":{},"ISSN":["0925-1022","1573-7586"],"issn-type":[{"value":"0925-1022","type":"print"},{"value":"1573-7586","type":"electronic"}],"subject":[],"published":{"date-parts":[[2008,11,19]]}}}