{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T22:13:39Z","timestamp":1729635219258,"version":"3.28.0"},"reference-count":13,"publisher":"IEEE Comput. Soc","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1109\/aina.2003.1192943","type":"proceedings-article","created":{"date-parts":[[2003,12,22]],"date-time":"2003-12-22T12:34:10Z","timestamp":1072096450000},"page":"557-560","source":"Crossref","is-referenced-by-count":0,"title":["Signature schemes based on two hard problems simultaneously"],"prefix":"10.1109","author":[{"family":"Ching-Te Wang","sequence":"first","affiliation":[]},{"family":"Chu-Hsing Lin","sequence":"additional","affiliation":[]},{"family":"Chin-Chen Chang","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"doi-asserted-by":"publisher","key":"ref10","DOI":"10.1080\/0161-119791885797"},{"year":"1986","author":"rosen","journal-title":"Elementary Number Theory in Science and Communication","key":"ref11"},{"doi-asserted-by":"publisher","key":"ref12","DOI":"10.1109\/TIT.1986.1057236"},{"doi-asserted-by":"publisher","key":"ref13","DOI":"10.1049\/el:19950161"},{"key":"ref4","article-title":"Digitalized signatures and public key functions as intracable as factorization","author":"rabin","year":"1979","journal-title":"Mit\/lcs\/tr-212"},{"doi-asserted-by":"publisher","key":"ref3","DOI":"10.1109\/TIT.1985.1057074"},{"doi-asserted-by":"publisher","key":"ref6","DOI":"10.1049\/ip-cdt:19941040"},{"key":"ref5","doi-asserted-by":"crossref","first-page":"481","DOI":"10.1049\/el:19940336","article-title":"new digital signature scheme based on discrete logarithm","volume":"30","author":"nyberg","year":"1994","journal-title":"Electronics Letters"},{"key":"ref8","doi-asserted-by":"crossref","first-page":"196","DOI":"10.1049\/ip-cdt:19960335","article-title":"Modified Harn signature scheme based on factoring and discrete logarithms","volume":"143","author":"lee","year":"1996","journal-title":"IEE Proc Comput Digit Tech"},{"key":"ref7","doi-asserted-by":"crossref","first-page":"376","DOI":"10.1049\/ip-cdt:19952125","article-title":"Comment on enhancing the security of of ElGamal's signature scheme","volume":"142","author":"harn","year":"1995","journal-title":"IEE Proc Comput Digit Tech"},{"doi-asserted-by":"publisher","key":"ref2","DOI":"10.1145\/359340.359342"},{"doi-asserted-by":"publisher","key":"ref1","DOI":"10.1109\/TIT.1976.1055638"},{"doi-asserted-by":"publisher","key":"ref9","DOI":"10.1049\/ip-cdt:19981773"}],"event":{"acronym":"AINA-03","name":"17th International Conference on Advanced Information Networking and Applications. AINA 2003","location":"Xi'an, China"},"container-title":["17th International Conference on Advanced Information Networking and Applications, 2003. AINA 2003."],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/8485\/26745\/01192943.pdf?arnumber=1192943","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,15]],"date-time":"2017-06-15T22:57:59Z","timestamp":1497567479000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1192943\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"references-count":13,"URL":"https:\/\/doi.org\/10.1109\/aina.2003.1192943","relation":{},"subject":[]}}