{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T13:26:55Z","timestamp":1762003615443},"reference-count":14,"publisher":"Elsevier BV","issue":"2","license":[{"start":{"date-parts":[[2003,5,1]],"date-time":"2003-05-01T00:00:00Z","timestamp":1051747200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Computer Standards &amp; Interfaces"],"published-print":{"date-parts":[[2003,5]]},"DOI":"10.1016\/s0920-5489(03)00002-3","type":"journal-article","created":{"date-parts":[[2003,4,7]],"date-time":"2003-04-07T17:19:33Z","timestamp":1049735973000},"page":"141-145","source":"Crossref","is-referenced-by-count":18,"title":["A new anonymous conference key distribution system based on the elliptic curve discrete logarithm problem"],"prefix":"10.1016","volume":"25","author":[{"given":"Chou-Chen","family":"Yang","sequence":"first","affiliation":[]},{"given":"Ting-Yi","family":"Chang","sequence":"additional","affiliation":[]},{"given":"Min-Shiang","family":"Hwang","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/S0920-5489(03)00002-3_BIB1","doi-asserted-by":"crossref","first-page":"644","DOI":"10.1109\/TIT.1976.1055638","article-title":"New directions in cryptography","volume":"IT-22","author":"Diffie","year":"1976","journal-title":"IEEE Transactions on Information Theory"},{"issue":"4","key":"10.1016\/S0920-5489(03)00002-3_BIB2","doi-asserted-by":"crossref","first-page":"189","DOI":"10.1016\/S0020-0190(97)00065-3","article-title":"A conference distribution system for the start configuration based on the discrete logarithm problem","volume":"62","author":"Hirose","year":"1997","journal-title":"Information Processing Letters"},{"key":"10.1016\/S0920-5489(03)00002-3_BIB3","doi-asserted-by":"crossref","first-page":"416","DOI":"10.1109\/49.345886","article-title":"Conference key distribution protocols for digital mobile communication systems","volume":"13","author":"Hwang","year":"1995","journal-title":"IEEE Journal on Selected Areas in Communications"},{"issue":"1","key":"10.1016\/S0920-5489(03)00002-3_BIB4","doi-asserted-by":"crossref","first-page":"57","DOI":"10.1049\/ip-cdt:19949890","article-title":"Identity-based conference key broadcast system","volume":"141","author":"Hwang","year":"1994","journal-title":"IEE Proceedings\u2014Computer Digital Technology"},{"key":"10.1016\/S0920-5489(03)00002-3_BIB5","doi-asserted-by":"crossref","first-page":"714","DOI":"10.1109\/TIT.1982.1056542","article-title":"A conference key distribution system","volume":"IT-28","author":"Ingemarsson","year":"1982","journal-title":"IEEE Transactions on Information Theory"},{"issue":"2\/3","key":"10.1016\/S0920-5489(03)00002-3_BIB6","doi-asserted-by":"crossref","first-page":"173","DOI":"10.1023\/A:1008354106356","article-title":"The state of elliptic curve cryptography","volume":"9","author":"Koblitz","year":"2000","journal-title":"Designs, Codes and Cryptography"},{"key":"10.1016\/S0920-5489(03)00002-3_BIB7","series-title":"Advances in Cryptology, CRYPTO'87","first-page":"194","article-title":"Identity-based conference key distribution system","volume":"vol. 293","author":"Koyama","year":"1987"},{"issue":"4","key":"10.1016\/S0920-5489(03)00002-3_BIB8","doi-asserted-by":"crossref","first-page":"323","DOI":"10.1016\/0306-4379(92)90021-E","article-title":"A conference key broadcasting system using sealed lock","volume":"17","author":"Lin","year":"1992","journal-title":"Information Systems"},{"key":"10.1016\/S0920-5489(03)00002-3_BIB9","series-title":"Elliptic Curve Public Key Cryptosystem","author":"Menezes","year":"1993"},{"key":"10.1016\/S0920-5489(03)00002-3_BIB10","series-title":"Advances in Cryptology, CRYPTO'95, Lecture Notes in Computer Science, Santa Barbara","first-page":"43","article-title":"Fast key exchange with elliptic curve systems","author":"Schroeppel","year":"1995"},{"issue":"8","key":"10.1016\/S0920-5489(03)00002-3_BIB11","doi-asserted-by":"crossref","first-page":"749","DOI":"10.1016\/S0140-3664(99)00034-1","article-title":"Anonymous conference key distribution systems based on the discrete logarithm problem","volume":"22","author":"Tseng","year":"1999","journal-title":"Computer Communications"},{"key":"10.1016\/S0920-5489(03)00002-3_BIB12","doi-asserted-by":"crossref","first-page":"65","DOI":"10.1007\/BFb0034836","article-title":"A fast software implementation for arithmetic operations in GF(2n)","volume":"1163","author":"De Win","year":"1996","journal-title":"Asiacrypt'96"},{"issue":"2","key":"10.1016\/S0920-5489(03)00002-3_BIB13","doi-asserted-by":"crossref","first-page":"145","DOI":"10.1049\/ip-cdt:19971120","article-title":"Conference key distribution system with user anonymity based on algebraic approach","volume":"144","author":"Wu","year":"1997","journal-title":"IEE Proceedings\u2014Computer Digital Technology"},{"key":"10.1016\/S0920-5489(03)00002-3_BIB14","unstructured":"C.-C. Yang, T.-Y. Chang, M.-S. Hwang, \u201cComment on Tseng\u2013Jan anonymous conference key distribution system without using a one-way hash function\u201d, Technical Report CYUT-IM-TR-2002-016, CYUT, Sep. 2002."}],"container-title":["Computer Standards &amp; Interfaces"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0920548903000023?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0920548903000023?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2019,3,30]],"date-time":"2019-03-30T07:58:16Z","timestamp":1553932696000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0920548903000023"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2003,5]]},"references-count":14,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2003,5]]}},"alternative-id":["S0920548903000023"],"URL":"https:\/\/doi.org\/10.1016\/s0920-5489(03)00002-3","relation":{},"ISSN":["0920-5489"],"issn-type":[{"value":"0920-5489","type":"print"}],"subject":[],"published":{"date-parts":[[2003,5]]}}}