{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,27]],"date-time":"2025-06-27T02:10:08Z","timestamp":1750990208823,"version":"3.41.0"},"reference-count":28,"publisher":"American Institute of Mathematical Sciences (AIMS)","issue":"6","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["AMC"],"published-print":{"date-parts":[[2025]]},"DOI":"10.3934\/amc.2025014","type":"journal-article","created":{"date-parts":[[2025,4,21]],"date-time":"2025-04-21T09:11:21Z","timestamp":1745226681000},"page":"1657-1671","source":"Crossref","is-referenced-by-count":0,"title":["New signature schemes from the Hadamard-type &lt;inline-formula&gt;&lt;tex-math id=\"M1\"&gt;$ (k,t)- $&lt;\/tex-math&gt;&lt;\/inline-formula&gt;generalized Jacobsthal-Lehmer sequences on the &lt;inline-formula&gt;&lt;tex-math id=\"M2\"&gt;$ 2- $&lt;\/tex-math&gt;&lt;\/inline-formula&gt;generator &lt;inline-formula&gt;&lt;tex-math id=\"M3\"&gt;$ p- $&lt;\/tex-math&gt;&lt;\/inline-formula&gt;group of nilpotency class &lt;inline-formula&gt;&lt;tex-math id=\"M4\"&gt;$ 2 $&lt;\/tex-math&gt;&lt;\/inline-formula&gt;"],"prefix":"10.3934","volume":"19","author":[{"given":"Elahe","family":"Mehraban","sequence":"first","affiliation":[]},{"given":"T. Aaron","family":"Gulliver","sequence":"additional","affiliation":[{"name":"Department of Electrical and Computer Engineering, University of Victoria, Victoria, BC, V8W 2Y2, Canada"}]},{"given":"Evren","family":"Hin\u00e7al","sequence":"additional","affiliation":[{"name":"Mathematics Research Center, Near East University TRNC, Mersin 10, 99138 Nicosia, Turkey"}]}],"member":"2321","reference":[{"key":"key-10.3934\/amc.2025014-1","doi-asserted-by":"publisher","DOI":"10.1080\/00927872.2020.1723609"},{"key":"key-10.3934\/amc.2025014-2"},{"key":"key-10.3934\/amc.2025014-3","doi-asserted-by":"publisher","DOI":"10.1007\/BF01196588"},{"key":"key-10.3934\/amc.2025014-4"},{"key":"key-10.3934\/amc.2025014-5","unstructured":"<p>M. Bellare and P. Rogaway, <i>Introduction to Modern Cryptography<\/i>, Department of Computer Science, University of California at Davis, Davis, CA, USA, 2005.<\/p>"},{"key":"key-10.3934\/amc.2025014-6","doi-asserted-by":"publisher","DOI":"10.1007\/s40993-019-0153-2"},{"key":"key-10.3934\/amc.2025014-7","doi-asserted-by":"publisher","DOI":"10.2478\/amsil-2022-0011"},{"key":"key-10.3934\/amc.2025014-8","doi-asserted-by":"crossref","unstructured":"<p>D. Chaum, Blind signatures for untraceable payments, in <i>Advances in Cryptology, Proc. CRYPTO'82, Springer, Boston, MA, USA<\/i>, (1982), 199-203.<\/p>","DOI":"10.1007\/978-1-4757-0602-4_18"},{"key":"key-10.3934\/amc.2025014-9","doi-asserted-by":"publisher","DOI":"10.1080\/00927872.2018.1541464"},{"key":"key-10.3934\/amc.2025014-10","doi-asserted-by":"publisher","DOI":"10.1007\/s11253-016-1218-1"},{"key":"key-10.3934\/amc.2025014-11"},{"key":"key-10.3934\/amc.2025014-12","doi-asserted-by":"publisher","DOI":"10.1007\/s12095-015-0178-x"},{"key":"key-10.3934\/amc.2025014-13"},{"key":"key-10.3934\/amc.2025014-14","doi-asserted-by":"publisher","DOI":"10.1142\/S0219498825300016"},{"key":"key-10.3934\/amc.2025014-15","doi-asserted-by":"publisher","DOI":"10.1155\/2021\/7660902"},{"key":"key-10.3934\/amc.2025014-16","doi-asserted-by":"crossref","unstructured":"<p>X. Hu, J. Wang and Y. Yang, Secure ID-based blind signature scheme without random oracle, <i>in Proc. Int. Conf. on Network Computing and Inform. Security, Guilin, China<\/i>, (2011), 245-249.<\/p>","DOI":"10.1109\/NCIS.2011.56"},{"key":"key-10.3934\/amc.2025014-17","doi-asserted-by":"publisher","DOI":"10.1007\/s11128-018-2018-3"},{"key":"key-10.3934\/amc.2025014-18","doi-asserted-by":"publisher","DOI":"10.2307\/1968235"},{"key":"key-10.3934\/amc.2025014-19","doi-asserted-by":"publisher","DOI":"10.1007\/s00574-008-0012-6"},{"key":"key-10.3934\/amc.2025014-20","doi-asserted-by":"publisher","DOI":"10.3934\/math.2024660"},{"key":"key-10.3934\/amc.2025014-21","doi-asserted-by":"publisher","DOI":"10.3934\/amc.2024039"},{"key":"key-10.3934\/amc.2025014-22"},{"key":"key-10.3934\/amc.2025014-23","doi-asserted-by":"publisher","DOI":"10.7546\/nntdm.2023.29.3.503-524"},{"key":"key-10.3934\/amc.2025014-24","doi-asserted-by":"publisher","DOI":"10.1080\/23799927.2021.2006314"},{"key":"key-10.3934\/amc.2025014-25","doi-asserted-by":"publisher","DOI":"10.5120\/ijca2018916766"},{"key":"key-10.3934\/amc.2025014-26"},{"key":"key-10.3934\/amc.2025014-27","doi-asserted-by":"publisher","DOI":"10.1007\/s10517-016-3374-6"},{"key":"key-10.3934\/amc.2025014-28","doi-asserted-by":"publisher","DOI":"10.1017\/S0004972717000843"}],"container-title":["Advances in Mathematics of Communications"],"original-title":[],"deposited":{"date-parts":[[2025,6,27]],"date-time":"2025-06-27T01:35:26Z","timestamp":1750988126000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.aimsciences.org\/\/article\/doi\/10.3934\/amc.2025014"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"references-count":28,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2025]]}},"URL":"https:\/\/doi.org\/10.3934\/amc.2025014","relation":{},"ISSN":["1930-5346","1930-5338"],"issn-type":[{"type":"print","value":"1930-5346"},{"type":"electronic","value":"1930-5338"}],"subject":[],"published":{"date-parts":[[2025]]}}}