{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T03:07:25Z","timestamp":1761620845412,"version":"3.41.2"},"reference-count":19,"publisher":"Springer Science and Business Media LLC","issue":"1-2","license":[{"start":{"date-parts":[[1996,1,1]],"date-time":"1996-01-01T00:00:00Z","timestamp":820454400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[1996,1,1]],"date-time":"1996-01-01T00:00:00Z","timestamp":820454400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Designs, Codes and Cryptography"],"published-print":{"date-parts":[[1996,1]]},"DOI":"10.1023\/a:1018096612468","type":"journal-article","created":{"date-parts":[[2003,11,3]],"date-time":"2003-11-03T19:30:08Z","timestamp":1067887808000},"page":"61-81","source":"Crossref","is-referenced-by-count":9,"title":["Message Recovery for Signature Schemes Based on the Discrete Logarithm Problem"],"prefix":"10.1007","volume":"7","author":[{"given":"Kaisa","family":"Nyberg","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Rainer A.","family":"Rueppel","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"issue":"14","key":"102701_CR1","doi-asserted-by":"crossref","first-page":"1024","DOI":"10.1049\/el:19900663","volume":"26","author":"G. B. Agnew","year":"1990","unstructured":"G. B. Agnew, B. C. Mullin and S. A. Vanstone, Improved digital signature scheme based on discrete exponentation, Electronics Letters, Vol. 26, No. 14 (1990) pp. 1024\u20131025.","journal-title":"Electronics Letters"},{"issue":"11","key":"102701_CR2","doi-asserted-by":"crossref","first-page":"966","DOI":"10.1049\/el:19930643","volume":"29.","author":"B. Arazi","year":"1993","unstructured":"B. Arazi, Integrating a key distribution procedure into the digital signature standard, Electronics Letters, Vol. 29. NO. 1 1 (1993) pp. 966\u2013967.","journal-title":"Electronics Letters"},{"issue":"6","key":"102701_CR3","doi-asserted-by":"crossref","first-page":"480","DOI":"10.1049\/el:19940335","volume":"30","author":"C. Boyd","year":"1994","unstructured":"C. Boyd, Comment: New digital signature scheme based on discrete logarithm, Electronics Letters, Vol. 30, No. 6 (1994) p. 480.","journal-title":"Electronics Letters"},{"issue":"6","key":"102701_CR4","doi-asserted-by":"crossref","first-page":"644","DOI":"10.1109\/TIT.1976.1055638","volume":"IT-22","author":"W. Diffie","year":"1976","unstructured":"W. Diffie and M. Hellman, New directions in cryptography, IEEE Trans. Inform. Theory, Vol. IT-22, No. 6 (1976) pp. 644\u2013654.","journal-title":"IEEE Trans. Inform. Theory"},{"issue":"4","key":"102701_CR5","first-page":"469472","volume":"IT-31","author":"T. ElGarnal","year":"1985","unstructured":"T. ElGarnal, A public key cryptosystem and a signature scheme based on discrete logarithms, IEEE Trans. Inform. Theory, Vol. IT-31, No. 4 (1985) pp. 469472.","journal-title":"IEEE Trans. Inform. Theory"},{"unstructured":"FIPS PUB XX, Digital Signature Standard (1993).","key":"102701_CR6"},{"unstructured":"C. G. Giinther, Diffie-Hellman and ElGamal Protocols with One Single Authentication Key, Advances in Cryptology-Eurocrypt '89, Lecture Notes in Computer Science, Springer-Verlag, 434 (1990).","key":"102701_CR7"},{"key":"102701_CR8","volume-title":"Proceedings der Fachtagung SIS '94","author":"P. Horster","year":"1994","unstructured":"P. Horster and H. Petersen, Verallgemeinerte ElGamal-Signatuen, Proceedings der Fachtagung SIS '94 Verlag der Fachvereine, Ziirich (1994)."},{"doi-asserted-by":"crossref","unstructured":"P. Horster, M. Michels and H. Petersen, Authenticated encryption schemes with low communication costs, Electronics Letters, Vol. 30, No. 15 (1994).","key":"102701_CR9","DOI":"10.1049\/el:19940856"},{"unstructured":"ISO\/IEC 9796. Information technology-Security techniques-Digital signature scheme giving message recovery.","key":"102701_CR10"},{"doi-asserted-by":"crossref","unstructured":"N. Koblitz, A course in number theory and cryptography, Graduate Texts in Mathematics, Springer-Verlag (1988).","key":"102701_CR11","DOI":"10.1007\/978-1-4684-0310-7"},{"key":"102701_CR12","first-page":"417426","volume":"218","author":"V. Miller","year":"1986","unstructured":"V. Miller, Use of elliptic curves in cryptography, Advances in Cryptography-Proceedings of Crypto '85, Lecture Notes in Computer Science, Springer-Verlag, 218 (1986) pp. 417426.","journal-title":"Lecture Notes in Computer Science"},{"unstructured":"K. Nyberg and R. A. Rueppel, A new signature scheme based on the DSA giving message recovery, 1st ACM Conference on Computer and Communications Security, Fairfax, Virginia (Nov. 3\u201351993).","key":"102701_CR13"},{"issue":"1","key":"102701_CR14","first-page":"26","volume":"30","author":"K. Nyberg","year":"1994","unstructured":"K. Nyberg and R. A. Rueppel, Weaknesses in some recent key agreement protocols, Electronics Lerfers, Vol. 30, No. 1 (1994) pp. 26\u201327.","journal-title":"Electronics Lerfers"},{"issue":"6","key":"102701_CR15","first-page":"481","volume":"30","author":"K. Nyberg","year":"1994","unstructured":"K. Nyberg, Comment: New digital signature scheme based on discrete logarithm, Electronics Lerfers, Vol. 30, No. 6 (1994) p. 481.","journal-title":"Electronics Lerfers"},{"issue":"25","key":"102701_CR16","doi-asserted-by":"crossref","first-page":"2185","DOI":"10.1049\/el:19931467","volume":"29","author":"J.-M. Piveteau","year":"1993","unstructured":"J.-M. Piveteau, New signature scheme with message recovery, Electronics Letters, Vol. 29, No. 25 (1993) p. 2185.","journal-title":"Electronics Letters"},{"unstructured":"C. P. Schnon; Letter: Reply to the request of NIST for comments on the DSA (Oct. 30, 1991).","key":"102701_CR17"},{"key":"102701_CR18","doi-asserted-by":"crossref","first-page":"161","DOI":"10.1007\/BF00196725","volume":"4","author":"C. P. Schnon","year":"1991","unstructured":"C. P. Schnon; Efficient Signature Generation by Smart Cards, J. Cryptology, Vol. 4 (1991) pp. 161\u2013174.","journal-title":"J. Cryptology"},{"issue":"12","key":"102701_CR19","doi-asserted-by":"crossref","first-page":"1120","DOI":"10.1049\/el:19930747","volume":"29","author":"S.-M. Yen","year":"1993","unstructured":"S.-M. Yen and C.-S. Laih, New digital signature scheme based on discrete logarithm, Efectronics Letters, Vol. 29, No. 12 (1993) pp. 1120\u20131121.","journal-title":"Efectronics Letters"}],"container-title":["Designs, Codes and Cryptography"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1023\/A:1018096612468.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1023\/A:1018096612468\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1023\/A:1018096612468.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,29]],"date-time":"2025-07-29T03:53:27Z","timestamp":1753761207000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1023\/A:1018096612468"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1996,1]]},"references-count":19,"journal-issue":{"issue":"1-2","published-print":{"date-parts":[[1996,1]]}},"alternative-id":["102701"],"URL":"https:\/\/doi.org\/10.1023\/a:1018096612468","relation":{},"ISSN":["0925-1022","1573-7586"],"issn-type":[{"type":"print","value":"0925-1022"},{"type":"electronic","value":"1573-7586"}],"subject":[],"published":{"date-parts":[[1996,1]]}}}