{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,31]],"date-time":"2025-10-31T06:52:34Z","timestamp":1761893554938},"reference-count":23,"publisher":"Elsevier BV","issue":"8","license":[{"start":{"date-parts":[[1996,1,1]],"date-time":"1996-01-01T00:00:00Z","timestamp":820454400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Computers &amp; Security"],"published-print":{"date-parts":[[1996,1]]},"DOI":"10.1016\/s0167-4048(96)00016-8","type":"journal-article","created":{"date-parts":[[2002,7,25]],"date-time":"2002-07-25T23:00:05Z","timestamp":1027638005000},"page":"725-732","source":"Crossref","is-referenced-by-count":7,"title":["GOST 34.10\u2014A brief overview of Russia's DSA"],"prefix":"10.1016","volume":"15","author":[{"given":"Markus","family":"Michels","sequence":"first","affiliation":[]},{"given":"David","family":"Naccache","sequence":"additional","affiliation":[]},{"given":"Holger","family":"Petersen","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"issue":"6","key":"10.1016\/S0167-4048(96)00016-8_BIB1","doi-asserted-by":"crossref","first-page":"644","DOI":"10.1109\/TIT.1976.1055638","article-title":"New directions m cryptography","volume":"IT-22","author":"Diffie","year":"1976","journal-title":"IEEE Transactions on Information Theory"},{"issue":"2","key":"10.1016\/S0167-4048(96)00016-8_BIB2","doi-asserted-by":"crossref","first-page":"120","DOI":"10.1145\/359340.359342","article-title":"A method for obtaining digital signatures and public-key cryptosystems","volume":"21","author":"Rivest","year":"1978","journal-title":"Communications of the ACM"},{"issue":"4","key":"10.1016\/S0167-4048(96)00016-8_BIB3","doi-asserted-by":"crossref","first-page":"469","DOI":"10.1109\/TIT.1985.1057074","article-title":"A public key cryptosystem and a signature scheme based on discrete logarithms","volume":"IT-30","author":"ElGamal","year":"1985","journal-title":"IEEE Transactions on Information Theory"},{"key":"10.1016\/S0167-4048(96)00016-8_BIB4","first-page":"239","article-title":"Efficient identification and signatures for smart cards","author":"Schnorr","year":"1990"},{"key":"10.1016\/S0167-4048(96)00016-8_BIB5","first-page":"186","article-title":"How to prove yourself: practical solutions to identification and signature problems","author":"Fiat","year":"1987"},{"key":"10.1016\/S0167-4048(96)00016-8_BIB6","series-title":"ISO\/IEC 9796, Information Technology Security Techniques Digital Signature Scheme Giving Message Recovery","year":"1991"},{"key":"10.1016\/S0167-4048(96)00016-8_BIB7","doi-asserted-by":"crossref","unstructured":"L.C. Guillou, J. Quisquater, M. Walker, P. Landrock and C. Shaer, Precautions taken against various potential attacks, in Lecture Notes in Computer Science 473, Advances in Cryptology: Proc. Eurocrypt '90, Springer, Berlin, pp. 465\u2013473.","DOI":"10.1007\/3-540-46877-3_42"},{"key":"10.1016\/S0167-4048(96)00016-8_BIB8","article-title":"Digital signatures for financial data using public key cryptography","year":"1991","journal-title":"ANSI working draft of the American National Standard X9.30-199X"},{"key":"10.1016\/S0167-4048(96)00016-8_BIB9","article-title":"\u00c9changes T\u00e9l\u00e9matiques Entre Les Banques et Leurs Clients","year":"1989"},{"key":"10.1016\/S0167-4048(96)00016-8_BIB10","article-title":"Federal Information Process","author":"National Institute of Standards and Technology","year":"1994"},{"key":"10.1016\/S0167-4048(96)00016-8_BIB11","series-title":"IEEE P1363 Part 6: Elliptic Curve Systems","author":"Menezes","year":"1995"},{"key":"10.1016\/S0167-4048(96)00016-8_BIB12","article-title":"Information Technology Cryptographic Data Security Produce and Check Procedures of Electronic Digital Signature Based on Asymmetric Cryptographic Algorithm","year":"1994","journal-title":"GOST 34.10-94"},{"key":"10.1016\/S0167-4048(96)00016-8_BIB13","article-title":"Information Technology Cryptographic Data Security Hashing Function","year":"1994","journal-title":"GOST 34.11-94"},{"key":"10.1016\/S0167-4048(96)00016-8_BIB14","article-title":"Systems of the Information Treatment. Cryptographic Security. Algorithms of the Cryptographic Transformation","year":"1989","journal-title":"GOST 28147-89"},{"key":"10.1016\/S0167-4048(96)00016-8_BIB15","series-title":"Sicherheit in Informationssystemen, Proceedings der Fachtagung SIS'94","first-page":"89","article-title":"Verallgemeinerte ElGamal Signaturen","author":"Horster","year":"1994"},{"key":"10.1016\/S0167-4048(96)00016-8_BIB16","series-title":"Pre-proceedings of Eurocrypt '94","first-page":"175","article-title":"Message recovery for signature schemes based on the discrete logarithm","author":"Nyberg","year":"1994"},{"key":"10.1016\/S0167-4048(96)00016-8_BIB17","article-title":"Further comments on the Soviet encryption algorithm","author":"Charnes","year":"1994"},{"key":"10.1016\/S0167-4048(96)00016-8_BIB18","article-title":"Soviet encryption algorithm,","author":"Pieprzyk","year":"1994"},{"key":"10.1016\/S0167-4048(96)00016-8_BIB19","first-page":"10","article-title":"Generating ElGamal signatures without knowing the secret key","author":"Bleichenbacher","year":"1996"},{"key":"10.1016\/S0167-4048(96)00016-8_BIB20","first-page":"83","article-title":"Hidden collisions on DSS","author":"Vaudenay","year":"1996"},{"key":"10.1016\/S0167-4048(96)00016-8_BIB21","first-page":"447","article-title":"The first cascade exponentiation algorithm and its applications to cryptography","author":"Yen","year":"1993"},{"key":"10.1016\/S0167-4048(96)00016-8_BIB22","first-page":"224","article-title":"Meta message recovery and meta blind signature schemes based on the discrete logarithm problem and their applications","author":"Horster","year":"1995"},{"key":"10.1016\/S0167-4048(96)00016-8_BIB23","series-title":"Proceedings of the IFIP\/SEC'95","first-page":"128","article-title":"Meta-multisignature schemes based on the discrete logarithm problem","author":"Horster","year":"1995"}],"container-title":["Computers &amp; Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0167404896000168?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0167404896000168?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2020,2,5]],"date-time":"2020-02-05T01:29:13Z","timestamp":1580866153000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0167404896000168"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1996,1]]},"references-count":23,"journal-issue":{"issue":"8","published-print":{"date-parts":[[1996,1]]}},"alternative-id":["S0167404896000168"],"URL":"https:\/\/doi.org\/10.1016\/s0167-4048(96)00016-8","relation":{},"ISSN":["0167-4048"],"issn-type":[{"value":"0167-4048","type":"print"}],"subject":[],"published":{"date-parts":[[1996,1]]}}}