{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,28]],"date-time":"2026-02-28T12:58:41Z","timestamp":1772283521987,"version":"3.50.1"},"reference-count":15,"publisher":"Elsevier BV","issue":"3","license":[{"start":{"date-parts":[[2003,10,1]],"date-time":"2003-10-01T00:00:00Z","timestamp":1064966400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Computer Networks"],"published-print":{"date-parts":[[2003,10]]},"DOI":"10.1016\/s1389-1286(03)00285-8","type":"journal-article","created":{"date-parts":[[2003,5,19]],"date-time":"2003-05-19T16:52:26Z","timestamp":1053363146000},"page":"339-349","source":"Crossref","is-referenced-by-count":17,"title":["How to construct optimal one-time signatures"],"prefix":"10.1016","volume":"43","author":[{"given":"Kemal","family":"Bicakci","sequence":"first","affiliation":[]},{"given":"Gene","family":"Tsudik","sequence":"additional","affiliation":[]},{"given":"Brian","family":"Tung","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"issue":"2","key":"10.1016\/S1389-1286(03)00285-8_BIB1","doi-asserted-by":"crossref","first-page":"120","DOI":"10.1145\/359340.359342","article-title":"A method for obtaining digital signatures and public-key cryptosystems","volume":"21","author":"Rivest","year":"1978","journal-title":"Communications of the ACM"},{"key":"10.1016\/S1389-1286(03)00285-8_BIB2","unstructured":"National Institute for Standards and Technology, Digital Signature Standard (DSS), Federal Register 56 (169), August 30, 1991"},{"key":"10.1016\/S1389-1286(03)00285-8_BIB3","unstructured":"National Institute of Standards and Technology (NIST), FIPS Publication 46-2: Data Encryption Standard, December 30, 1993"},{"key":"10.1016\/S1389-1286(03)00285-8_BIB4","doi-asserted-by":"crossref","unstructured":"R.L. Rivest, The MD5 message-digest algorithm, Internet Request for Comments, April 1992, RFC 1321","DOI":"10.17487\/rfc1321"},{"key":"10.1016\/S1389-1286(03)00285-8_BIB5","unstructured":"National Institute of Standards and Technology (NIST), FIPS Publication 180: Secure Hash Standard (SHS), May 11, 1993"},{"key":"10.1016\/S1389-1286(03)00285-8_BIB6","unstructured":"L. Lamport, Constructing digital signatures from a one-way function, Technical Report CSL-98, SRI International, October 1979"},{"key":"10.1016\/S1389-1286(03)00285-8_BIB7","unstructured":"R.C. Merkle, Secrecy, authentication, and public key systems, Technical report, Stanford University, June 1979"},{"key":"10.1016\/S1389-1286(03)00285-8_BIB8","series-title":"Proceedings of the CRYPTO 89","first-page":"218","article-title":"A certified digital signature","volume":"vol. 435","author":"Merkle","year":"1990"},{"key":"10.1016\/S1389-1286(03)00285-8_BIB9","series-title":"Proceedings of the CRYPTO 94","first-page":"75","article-title":"Directed acyclic graphs, one-way functions and digital signatures","volume":"vol. 839","author":"Bleichenbacher","year":"1994"},{"key":"10.1016\/S1389-1286(03)00285-8_BIB10","series-title":"Proceedings of the STACS 96","first-page":"363","article-title":"Optimal tree-based one-time digital signature schemes","volume":"vol. 1046","author":"Bleichenbacher","year":"1996"},{"key":"10.1016\/S1389-1286(03)00285-8_BIB11","series-title":"Proceedings of the ASIACRYPT 96","first-page":"145","article-title":"On the efficiency of one-time digital signatures","volume":"vol. 1163","author":"Bleichenbacher","year":"1996"},{"key":"10.1016\/S1389-1286(03)00285-8_BIB12","series-title":"Proceedings of the CRYPTO 87","first-page":"369","article-title":"A digital signature based on a conventional encryption function","volume":"vol. 293","author":"Merkle","year":"1988"},{"key":"10.1016\/S1389-1286(03)00285-8_BIB13","series-title":"Proceedings of the CRYPTO 92","first-page":"1","article-title":"Provable unforgeable signatures","volume":"vol. 740","author":"Bos","year":"1992"},{"key":"10.1016\/S1389-1286(03)00285-8_BIB14","series-title":"Proceedings of the CRYPTO 89","first-page":"263","article-title":"On-line\/off-line digital signatures","volume":"vol. 435","author":"Even","year":"1990"},{"key":"10.1016\/S1389-1286(03)00285-8_BIB15","doi-asserted-by":"crossref","first-page":"544","DOI":"10.1007\/BF01171114","article-title":"Ein satz uber untermenge einer endlichen menge","volume":"27","author":"Sperner","year":"1928","journal-title":"Math. Z."}],"container-title":["Computer Networks"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1389128603002858?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1389128603002858?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2019,3,21]],"date-time":"2019-03-21T11:53:03Z","timestamp":1553169183000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S1389128603002858"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2003,10]]},"references-count":15,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2003,10]]}},"alternative-id":["S1389128603002858"],"URL":"https:\/\/doi.org\/10.1016\/s1389-1286(03)00285-8","relation":{},"ISSN":["1389-1286"],"issn-type":[{"value":"1389-1286","type":"print"}],"subject":[],"published":{"date-parts":[[2003,10]]}}}