{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,3,13]],"date-time":"2024-03-13T16:33:43Z","timestamp":1710347623826},"reference-count":8,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2011,4,12]],"date-time":"2011-04-12T00:00:00Z","timestamp":1302566400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Des. Codes Cryptogr."],"published-print":{"date-parts":[[2012,2]]},"DOI":"10.1007\/s10623-011-9503-3","type":"journal-article","created":{"date-parts":[[2011,4,21]],"date-time":"2011-04-21T13:45:38Z","timestamp":1303393538000},"page":"179-187","source":"Crossref","is-referenced-by-count":3,"title":["The square root Diffie\u2013Hellman problem"],"prefix":"10.1007","volume":"62","author":[{"given":"Dongyoung","family":"Roh","sequence":"first","affiliation":[]},{"given":"Sang Geun","family":"Hahn","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2011,4,12]]},"reference":[{"key":"9503_CR1","unstructured":"Bao F., Deng R.H., Zhu H.: Variations of Diffie\u2013Hellman Problem. In: ICICS, LNCS, vol. 2836, pp. 301\u2013312 (2003)."},{"issue":"6","key":"9503_CR2","doi-asserted-by":"crossref","first-page":"644","DOI":"10.1109\/TIT.1976.1055638","volume":"22","author":"W. Diffie","year":"1976","unstructured":"Diffie W., Hellman M.E.: New directions in cryptography. IEEE Trans. Inform. Theory 22(6), 644\u2013654 (1976)","journal-title":"IEEE Trans. Inform. Theory"},{"key":"9503_CR3","doi-asserted-by":"crossref","first-page":"81","DOI":"10.1093\/ietfec\/E88-A.1.81","volume":"E88-A-1","author":"C. Konoma","year":"2005","unstructured":"Konoma C., Mambo M., Shizuya H.: The computational difficulty of solving cryptographic primitive problems related to the discrete logarithm problem. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. E88-A-1, 81\u201388 (2005)","journal-title":"IEICE Trans. Fundam. Electron. Commun. Comput. Sci."},{"key":"9503_CR4","first-page":"268","volume":"1109","author":"U. Maurer","year":"1996","unstructured":"Maurer U., Wolf S.: Diffie\u2013Hellman oracles. CRYPTO, LNCS 1109, 268\u2013282 (1996)","journal-title":"CRYPTO, LNCS"},{"key":"9503_CR5","doi-asserted-by":"crossref","DOI":"10.1201\/9781439821916","volume-title":"Handbook of Applied Cryptogrphay","author":"A. Menezes","year":"1996","unstructured":"Menezes A., van Oorschot P., Vanstone S.: Handbook of Applied Cryptogrphay. CRC Press, Boca Raton (1996)"},{"key":"9503_CR6","first-page":"481","volume":"E85-A-2","author":"S. Mitsunari","year":"2002","unstructured":"Mitsunari S., Sakai R., Kasahara M.: A new traitor tracing. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. E85-A-2, 481\u2013484 (2002)","journal-title":"IEICE Trans. Fundam. Electron. Commun. Comput. Sci."},{"key":"9503_CR7","unstructured":"NIST: Recommended elliptic curves for federal government use. http:\/\/csrc.nist.gov\/groups\/ST\/toolkit\/documents\/dss\/NISTReCur.pdf (1999)."},{"key":"9503_CR8","unstructured":"Shanks D.: Five number-theoretic algorithms. In: Proceedings of the Second Manitoba Conference on Numerical Mathematics, pp. 51\u201370 (1973)."}],"container-title":["Designs, Codes and Cryptography"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-011-9503-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10623-011-9503-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-011-9503-3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,30]],"date-time":"2019-05-30T19:58:30Z","timestamp":1559246310000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10623-011-9503-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,4,12]]},"references-count":8,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2012,2]]}},"alternative-id":["9503"],"URL":"https:\/\/doi.org\/10.1007\/s10623-011-9503-3","relation":{},"ISSN":["0925-1022","1573-7586"],"issn-type":[{"value":"0925-1022","type":"print"},{"value":"1573-7586","type":"electronic"}],"subject":[],"published":{"date-parts":[[2011,4,12]]}}}