{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,8,8]],"date-time":"2023-08-08T11:10:32Z","timestamp":1691493032029},"reference-count":8,"publisher":"Springer Science and Business Media LLC","issue":"9","license":[{"start":{"date-parts":[[2019,7,30]],"date-time":"2019-07-30T00:00:00Z","timestamp":1564444800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2019,7,30]],"date-time":"2019-07-30T00:00:00Z","timestamp":1564444800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Sci. China Inf. Sci."],"published-print":{"date-parts":[[2019,9]]},"DOI":"10.1007\/s11432-017-9700-7","type":"journal-article","created":{"date-parts":[[2019,8,1]],"date-time":"2019-08-01T07:02:39Z","timestamp":1564642959000},"update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["A faster method to compute primitive elements and discrete logarithms of factor base in Artin-Schreier extensions"],"prefix":"10.1007","volume":"62","author":[{"given":"Dianyan","family":"Xiao","sequence":"first","affiliation":[]},{"given":"Qi","family":"Cheng","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,7,30]]},"reference":[{"key":"9700_CR1","doi-asserted-by":"publisher","first-page":"644","DOI":"10.1109\/TIT.1976.1055638","volume":"22","author":"W Diffie","year":"1976","unstructured":"Diffie W, Hellman M. New directions in cryptography. IEEE Trans Inform Theory, 1976, 22: 644\u2013654","journal-title":"IEEE Trans Inform Theory"},{"key":"9700_CR2","unstructured":"ElGamal T. A public key cryptosystem and a signature scheme based on discrete logarithms. In: Proceedings of Workshop on the Theory and Application of Cryptographic Techniques, 1984"},{"key":"9700_CR3","doi-asserted-by":"publisher","first-page":"203","DOI":"10.1090\/S0025-5718-1987-0866109-5","volume":"48","author":"N Koblitz","year":"1987","unstructured":"Koblitz N. Elliptic curve cryptosystems. Math Comput, 1987, 48: 203\u2013209","journal-title":"Math Comput"},{"key":"9700_CR4","doi-asserted-by":"publisher","first-page":"119102","DOI":"10.1007\/s11432-015-0367-6","volume":"60","author":"L L Wang","year":"2017","unstructured":"Wang L L, Chen K F, Long Y, et al. An efficient pairing-free certificateless signature scheme for resource-limited systems. Sci China Inf Sci, 2017, 60: 119102","journal-title":"Sci China Inf Sci"},{"key":"9700_CR5","unstructured":"Joux A. A new index calculus algorithm with complexity L(1\/4+o(1)) in small characteristic. In: Proceedings of International Conference on Selected Areas in Cryptography, 2013"},{"key":"9700_CR6","doi-asserted-by":"crossref","unstructured":"Joux A, Pierrot C. Improving the polynomial time pre-computation of Frobenius representation discrete logarithm algorithms \u2014 simplified setting for small characteristic finite fields. In: Proceedings of International Conference on the Theory and Application of Cryptology and Information Security, 2014","DOI":"10.1007\/978-3-662-45611-8_20"},{"key":"9700_CR7","doi-asserted-by":"publisher","first-page":"106","DOI":"10.1109\/TIT.1978.1055817","volume":"24","author":"S Pohlig","year":"1978","unstructured":"Pohlig S, Hellman M. An improved algorithm for computing logarithms over GF(p) and its cryptographic significance. IEEE Trans Inform Theory, 1978, 24: 106\u2013110","journal-title":"IEEE Trans Inform Theory"},{"key":"9700_CR8","doi-asserted-by":"publisher","first-page":"205","DOI":"10.1016\/j.ffa.2018.06.008","volume":"53","author":"D Y Xiao","year":"2018","unstructured":"Xiao D Y, Zhuang J C, Cheng Q. Factor base discrete logarithms in Kummer extensions. Finite Fields Theiry Appl, 2018, 53: 205\u2013225","journal-title":"Finite Fields Theiry Appl"}],"container-title":["Science China Information Sciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11432-017-9700-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11432-017-9700-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11432-017-9700-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,8,8]],"date-time":"2023-08-08T10:37:42Z","timestamp":1691491062000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11432-017-9700-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,7,30]]},"references-count":8,"journal-issue":{"issue":"9","published-print":{"date-parts":[[2019,9]]}},"alternative-id":["9700"],"URL":"https:\/\/doi.org\/10.1007\/s11432-017-9700-7","relation":{},"ISSN":["1674-733X","1869-1919"],"issn-type":[{"value":"1674-733X","type":"print"},{"value":"1869-1919","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,7,30]]},"assertion":[{"value":"30 August 2018","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"12 October 2018","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"21 November 2018","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"30 July 2019","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}],"article-number":"199501"}}