{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T21:48:38Z","timestamp":1725572918828},"reference-count":10,"publisher":"IEEE Comput. Soc","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1109\/gmag.2003.1219673","type":"proceedings-article","created":{"date-parts":[[2003,10,31]],"date-time":"2003-10-31T09:39:17Z","timestamp":1067593157000},"page":"106-110","source":"Crossref","is-referenced-by-count":0,"title":["Message recovery signature scheme using complementary elliptic curves"],"prefix":"10.1109","author":[{"family":"Teo Chun Yew","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"H.K.","family":"Haili","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"P.","family":"Sumari","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"263","reference":[{"key":"ref4","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4757-1920-8","author":"silverman","year":"1986","journal-title":"The Arithmetic of Elliptic Curves"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-39799-X_31"},{"key":"ref10","article-title":"Complementary elliptic curves for cryptographic used","author":"yew","year":"2003","journal-title":"Proc Conf Of The International Conference on Information and Communication Technologies"},{"article-title":"Public Key Cryptosystems using Elliptic Curves","year":"1997","author":"borst","key":"ref6"},{"key":"ref5","first-page":"40","article-title":"A New Elliptic Curve Based Analogue of RSA","author":"demytko","year":"1993","journal-title":"Advances in Cryptology - EUROCRYPT '93"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1985.1057074"},{"journal-title":"A Course in Number Theory and Cryptography","year":"1988","author":"koblitz","key":"ref7"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1090\/S0025-5718-1987-0866109-5"},{"key":"ref9","first-page":"182","article-title":"Message Recovery for Signature Schemes Based on the Discrete Logarithm Problem","author":"nyberg","year":"1994","journal-title":"Advances in Cryptology-CRYPTO'92"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1976.1055638"}],"event":{"name":"International Conference on Geometric Modeling and Graphics","acronym":"GMAG-03","location":"London, UK"},"container-title":["2003 International Conference on Geometric Modeling and Graphics, 2003. Proceedings"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/8649\/27410\/01219673.pdf?arnumber=1219673","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,15]],"date-time":"2017-06-15T21:49:21Z","timestamp":1497563361000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1219673\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"references-count":10,"URL":"https:\/\/doi.org\/10.1109\/gmag.2003.1219673","relation":{},"subject":[]}}