{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,11]],"date-time":"2026-03-11T13:29:52Z","timestamp":1773235792071,"version":"3.50.1"},"reference-count":37,"publisher":"Springer Science and Business Media LLC","issue":"2-3","license":[{"start":{"date-parts":[[2000,3,1]],"date-time":"2000-03-01T00:00:00Z","timestamp":951868800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2000,3,1]],"date-time":"2000-03-01T00:00:00Z","timestamp":951868800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Designs, Codes and Cryptography"],"published-print":{"date-parts":[[2000,3]]},"DOI":"10.1023\/a:1008345904539","type":"journal-article","created":{"date-parts":[[2002,12,22]],"date-time":"2002-12-22T09:41:38Z","timestamp":1040550098000},"page":"77-99","source":"Crossref","is-referenced-by-count":6,"title":["Information Security, Mathematics, and Public-Key Cryptography"],"prefix":"10.1007","volume":"19","author":[{"given":"Simon","family":"Blake-Wilson","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"253935_CR1","doi-asserted-by":"crossref","unstructured":"M. Ajtai and C. Dwork, A public-key cryptosystem with worst-case\/average-case equivalence, In 29th ACM Symposium on Theory of Computing (1997) pp. 284\u2013293.","DOI":"10.1145\/258533.258604"},{"key":"253935_CR2","doi-asserted-by":"crossref","unstructured":"M. Bellare and P. Rogaway, Random oracles are practical: a paradigm for designing efficient protocols, 1st ACM Conference on Computer and Communications Security (1993) pp. 62\u201373.","DOI":"10.1145\/168588.168596"},{"key":"253935_CR3","doi-asserted-by":"crossref","unstructured":"M. Bellare and P. Rogaway, Optimal asymmetric encryption, Advances in Cryptology: EUROCRYPT '94 (A. De Santis, ed.), Lecture Notes in Computer Science, Springer-Verlag, 950 (1995) pp. 92\u2013111.","DOI":"10.1007\/BFb0053428"},{"key":"253935_CR4","doi-asserted-by":"crossref","unstructured":"M. Bellare and P. Rogaway, The exact security of digital signatures-how to sign with RSA and Rabin, Advances in Cryptology: EUROCRYPT '96 (U. M. Maurer, ed.), Lecture Notes in Computer Science, Springer-Verlag, 1070 (1996) pp. 399\u2013416.","DOI":"10.1007\/3-540-68339-9_34"},{"key":"253935_CR5","doi-asserted-by":"crossref","unstructured":"D. Boneh, R. A. DeMillo, and R. J. Lipton, On the importance of checking cryptographic protocols for faults, Advances in Cryptology-EUROCRYPT '97 (W. Fumy, ed.), Lecture Notes in Computer Science, Springer-Verlag, 1233 (1997) pp. 37\u201351.","DOI":"10.1007\/3-540-69053-0_4"},{"key":"253935_CR6","doi-asserted-by":"crossref","unstructured":"D. Boneh and R. Venkatesan, Breaking RSA may not be equivalent to factoring, Advances in Cryptology-EUROCRYPT '98 (K. Nyberg, ed.), Lecture Notes in Computer Science, Springer-Verlag, 1403 (1998) pp. 59\u201371.","DOI":"10.1007\/BFb0054117"},{"key":"253935_CR7","doi-asserted-by":"crossref","first-page":"107","DOI":"10.1007\/BF02351719","volume":"1","author":"J. Buchmann","year":"1988","unstructured":"J. Buchmann and H. Williams, A key-exchange system based on imaginary quadratic fields, Journal of Cryptology, Vol. 1 (1988) pp. 107\u2013118.","journal-title":"Journal of Cryptology"},{"key":"253935_CR8","doi-asserted-by":"crossref","unstructured":"D. Chaum, A. Fiat, and M. Naor, Untraceable electronic cash, Advances in Cryptology-CRYPTO '88 (S. Goldwasser, ed.), Lecture Notes in Computer Science, Springer-Verlag, 403 (1990) pp. 319\u2013327.","DOI":"10.1007\/0-387-34799-2_25"},{"key":"253935_CR9","volume-title":"Security for Computer Networks","author":"D. W. Price","year":"1989","unstructured":"D. W. Price and W. L. Price, Security for Computer Networks, 2nd edition, John Wiley & Sons, New York (1989).","edition":"2nd edition"},{"key":"253935_CR10","doi-asserted-by":"crossref","first-page":"449","DOI":"10.1002\/ett.4460050407","volume":"5","author":"Y. Desmedt","year":"1994","unstructured":"Y. Desmedt, Threshold cryptography, European Transactions on Telecommunications,Vol. 5 (1994) pp. 449\u2013457.","journal-title":"European Transactions on Telecommunications"},{"issue":"6","key":"253935_CR11","doi-asserted-by":"crossref","first-page":"644","DOI":"10.1109\/TIT.1976.1055638","volume":"IT-22","author":"W. Diffie","year":"1976","unstructured":"W. Diffie and M. E. Hellman, New directions in cryptography, IEEE Transactions on Information Theory, Vol. IT-22, No. 6 (November 1976) pp. 644\u2013654.","journal-title":"IEEE Transactions on Information Theory"},{"key":"253935_CR12","doi-asserted-by":"crossref","first-page":"77","DOI":"10.1007\/BF02351717","volume":"1","author":"U. Feige","year":"1988","unstructured":"U. Feige, A. Fiat, and A. Shamir, Zero-knowledge proofs of identity, Journal of Cryptology, Vol. 1 (1988) pp. 77\u201394.","journal-title":"Journal of Cryptology"},{"key":"253935_CR13","series-title":"Federal Information Processing Standards Publication","volume-title":"Digital Signature Standard","author":"FIPS 186","year":"1994","unstructured":"FIPS 186, Digital Signature Standard, Federal Information Processing Standards Publication 186, U. S. Department of Commerce\/N. I. S. T., National Technical Information Service, Springfield, Virginia (1994)."},{"key":"253935_CR14","volume-title":"Computers and Intractability: A Guide to the Theory of NP-completeness","author":"M. R. Garey","year":"1979","unstructured":"M. R. Garey and D. S. Johnson, Computers and Intractability: A Guide to the Theory of NP-completeness, W. H. Freeman, San Francisco (1979)."},{"key":"253935_CR15","unstructured":"O. Goldreich, Foundations of Cryptography (Fragments of a Book) (1995). Available at http:\/\/theory.lcs.mit.edu\/ oded\/"},{"key":"253935_CR16","doi-asserted-by":"crossref","first-page":"270","DOI":"10.1016\/0022-0000(84)90070-9","volume":"28","author":"S. Goldwasser","year":"1984","unstructured":"S. Goldwasser and S. Micali, Probabilistic encryption, Journal of Computer and System Sciences, Vol. 28 (1984) pp. 270\u2013299.","journal-title":"Journal of Computer and System Sciences"},{"key":"253935_CR17","doi-asserted-by":"crossref","first-page":"186","DOI":"10.1137\/0218012","volume":"18","author":"S. Goldwasser","year":"1989","unstructured":"S. Goldwasser, S. Micali, and C. Rackoff, The knowledge complexity of interactive proof systems, SIAM Journal of Computing, Vol. 18 (1989) pp. 186\u2013208.","journal-title":"SIAM Journal of Computing"},{"key":"253935_CR18","unstructured":"M. E. Hellman and R. C. Merkle, Public key cryptographic apparatus and method, U. S. Patent # 4,218,582, 19 Aug 1980."},{"key":"253935_CR19","doi-asserted-by":"crossref","first-page":"203","DOI":"10.1090\/S0025-5718-1987-0866109-5","volume":"48","author":"N. Koblitz","year":"1987","unstructured":"N. Koblitz, Elliptic curve cryptosystems, Mathematics of Computation, Vol. 48 (1987) pp. 203\u2013209.","journal-title":"Mathematics of Computation"},{"key":"253935_CR20","doi-asserted-by":"crossref","first-page":"139","DOI":"10.1007\/BF02252872","volume":"1","author":"N. Koblitz","year":"1989","unstructured":"N. Koblitz, Hyperelliptic cryptosystems, Journal of Cryptology, Vol. 1 (1989) pp. 139\u2013150.","journal-title":"Journal of Cryptology"},{"key":"253935_CR21","unstructured":"N. Koblitz, A. J. Menezes, and S. A. Vanstone, The state of elliptic curve cryptography, In the current volume."},{"key":"253935_CR22","doi-asserted-by":"crossref","unstructured":"P. Kocher, Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems, Advances in Cryptology-CRYPTO '96 ( N. Koblitz, ed.), Lecture Notes in Computer Science, Springer-Verlag, 1109 (1996) pp. 104\u2013113.","DOI":"10.1007\/3-540-68697-5_9"},{"key":"253935_CR23","unstructured":"A. K. Lenstra, Integer factoring, In the current volume."},{"key":"253935_CR24","doi-asserted-by":"crossref","unstructured":"C. H. Lim and P. J. Lee, A key recovery attack on discrete log-based schemes using a prime order subgroup, Advances in Cryptology-CRYPTO'97 (B.S. Kaliski Jr., ed.), Lecture Notes in Computer Science, Springer-Verlag, 1294 (1997) pp. 249\u2013263.","DOI":"10.1007\/BFb0052240"},{"key":"253935_CR25","unstructured":"U. M. Maurer and S. Wolf, The Diffie-Hellman protocol, In the current volume."},{"key":"253935_CR26","unstructured":"A. J. Menezes, M. Qu, and S. A. Vanstone, Key agreement and the need for authentication, Presentation at PKS '95, Toronto, Canada (November 1995)."},{"key":"253935_CR27","volume-title":"Handbook of Applied Cryptography","author":"A. J. Menezes","year":"1997","unstructured":"A. J. Menezes, P. C. van Oorschot, and S. A. Vanstonen Handbook of Applied Cryptography, CRC Press, Boca Raton, Florida (1997)."},{"key":"253935_CR28","doi-asserted-by":"crossref","unstructured":"S. Micali, Fair public-key cryptosystems, Advances in Cryptology-CRYPTO '92 (E. F. Brickell, ed.), Lecture Notes in Computer Science, Springer-Verlag, 740 (1993) pp. 113\u2013138.","DOI":"10.1007\/3-540-48071-4_9"},{"key":"253935_CR29","doi-asserted-by":"crossref","unstructured":"V. Miller, Uses of elliptic curves in cryptography, Advances in Cryptology-CRYPTO '85 (H. C.Williams, ed.), Lecture Notes in Computer Science, Springer-Verlag, 218 (1985) pp. 417\u2013426.","DOI":"10.1007\/3-540-39799-X_31"},{"key":"253935_CR30","unstructured":"A. M. Odlyzko, Discrete logarithms: the past and the future, In the current volume."},{"key":"253935_CR31","unstructured":"B. Preneel, Cryptographic Hash Functions, Kluwer Academic Publishers, Boston (to appear)."},{"key":"253935_CR32","doi-asserted-by":"crossref","first-page":"120","DOI":"10.1145\/359340.359342","volume":"21","author":"R. L. Rivest","year":"1978","unstructured":"R. L. Rivest, A. Shamir, L. M. Adleman, A method for obtaining digital signatures and public-key cryptosystems, Communications of the ACM, Vol. 21 (1978) pp. 120\u2013126.","journal-title":"Communications of the ACM"},{"key":"253935_CR33","doi-asserted-by":"crossref","unstructured":"J. Rompel, One-way functions are necessary and sufficient for secure signatures. In 22nd ACM Symposium on Theory of Computing (1990) pp. 387\u2013394.","DOI":"10.1145\/100216.100269"},{"key":"253935_CR34","volume-title":"Applied Cryptography: Protocols, Algorithms, and Source Code in C","author":"B. Schneier","year":"1996","unstructured":"B. Schneier, Applied Cryptography: Protocols, Algorithms, and Source Code in C, 2nd edition, John Wiley & Sons, New York (1996).","edition":"2nd edition"},{"key":"253935_CR35","doi-asserted-by":"crossref","unstructured":"V. Shoup, Lower bounds for discrete logarithms and related problems, Advances in Cryptology-EUROCRYPT '97 (W. Fumy, ed.), Lecture Notes in Computer Science, Springer-Verlag, 1233 (1997) pp. 256\u2013266.","DOI":"10.1007\/3-540-69053-0_18"},{"key":"253935_CR36","unstructured":"G. J. Simmons (editor), Contemporary Cryptology: The Science of Information Integrity, IEEE Press (1992)."},{"key":"253935_CR37","volume-title":"Cryptography: Theory and Practice","author":"D. R. Stinson","year":"1995","unstructured":"D. R. Stinson, Cryptography: Theory and Practice, CRC Press, Boca Raton, Florida (1995)."}],"container-title":["Designs, Codes and Cryptography"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1023\/A:1008345904539.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1023\/A:1008345904539\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1023\/A:1008345904539.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,29]],"date-time":"2025-07-29T03:43:39Z","timestamp":1753760619000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1023\/A:1008345904539"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2000,3]]},"references-count":37,"journal-issue":{"issue":"2-3","published-print":{"date-parts":[[2000,3]]}},"alternative-id":["253935"],"URL":"https:\/\/doi.org\/10.1023\/a:1008345904539","relation":{},"ISSN":["0925-1022","1573-7586"],"issn-type":[{"value":"0925-1022","type":"print"},{"value":"1573-7586","type":"electronic"}],"subject":[],"published":{"date-parts":[[2000,3]]}}}