{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,6]],"date-time":"2025-12-06T04:59:22Z","timestamp":1764997162545,"version":"3.28.0"},"reference-count":22,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,10]]},"DOI":"10.1109\/cns.2017.8228702","type":"proceedings-article","created":{"date-parts":[[2017,12,22]],"date-time":"2017-12-22T00:55:49Z","timestamp":1513904149000},"page":"531-539","source":"Crossref","is-referenced-by-count":9,"title":["Computing multiple exponentiations in discrete log and RSA groups: From batch verification to batch delegation"],"prefix":"10.1109","author":[{"given":"Giovanni","family":"Di Crescenzo","sequence":"first","affiliation":[]},{"given":"Matluba","family":"Khodjaeva","sequence":"additional","affiliation":[]},{"given":"Delaram","family":"Kahrobaei","sequence":"additional","affiliation":[]},{"given":"Vladimir","family":"Shpilrain","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","first-page":"163","article-title":"Improving and extending the Lim\/Lee exponentiation algorithm","volume":"99","author":"cubaleska","year":"1999","journal-title":"Proc Selected Areas of Cryptography 00"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-14623-7_25"},{"key":"ref12","first-page":"264","article-title":"How to securely outsource cryptographic computations","author":"hohenberger","year":"2015","journal-title":"Proc of TCC"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/s001459900021"},{"key":"ref14","doi-asserted-by":"crossref","first-page":"1592","DOI":"10.1049\/el:19941112","article-title":"security of interactive dsa batch verification","volume":"30","author":"lim","year":"1994","journal-title":"Electronics Letters"},{"key":"ref15","first-page":"298","article-title":"Improved techniques for fast exponentiation","author":"m\u00f6ller","year":"2002","journal-title":"Proceedings of ICIS '02"},{"key":"ref16","first-page":"77","article-title":"Can DSA be improved? Complexity trade-offs with the digital signature standard","author":"naccache","year":"1994","journal-title":"Proc of EUROCRYPT"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-0348-8295-8_24"},{"journal-title":"An Introduction to the Theory of Numbers","year":"2008","author":"niven","key":"ref18"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1137\/0209022"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/BFb0054129"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-44448-3_5"},{"key":"ref6","first-page":"200","article-title":"Fast exponentiation with precomputation: algorithms and lower bounds","author":"brickell","year":"1992","journal-title":"Proc EUROCRYPT 92"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1090\/S0002-9904-1939-07068-7"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-24837-0_10"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-72540-4_14"},{"journal-title":"Pippenger's exponentiation algorithm","year":"2002","author":"bernstein","key":"ref2"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/BFb0054130"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-45744-4_13"},{"key":"ref20","first-page":"128","article-title":"A simple and secure way to show the validity of your public key","author":"van de graaf","year":"1987","journal-title":"Proc CRYPTO 87"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/12.392857"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1137\/0205008"}],"event":{"name":"2017 IEEE Conference on Communications and Network Security (CNS)","start":{"date-parts":[[2017,10,9]]},"location":"Las Vegas, NV","end":{"date-parts":[[2017,10,11]]}},"container-title":["2017 IEEE Conference on Communications and Network Security (CNS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8170165\/8228604\/08228702.pdf?arnumber=8228702","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,8]],"date-time":"2019-10-08T12:41:01Z","timestamp":1570538461000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/8228702\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,10]]},"references-count":22,"URL":"https:\/\/doi.org\/10.1109\/cns.2017.8228702","relation":{},"subject":[],"published":{"date-parts":[[2017,10]]}}}