{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,1,23]],"date-time":"2024-01-23T23:29:47Z","timestamp":1706052587775},"reference-count":24,"publisher":"International Academy Publishing (IAP)","issue":"1","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["JCP"],"DOI":"10.4304\/jcp.7.1.169-178","type":"journal-article","created":{"date-parts":[[2012,1,31]],"date-time":"2012-01-31T22:08:44Z","timestamp":1328047724000},"source":"Crossref","is-referenced-by-count":4,"title":["New Public-Key Cryptosystem Based on Two-Dimension DLP"],"prefix":"10.17706","volume":"7","author":[{"given":"Xiaoqiang","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Guiliang","family":"Zhu","sequence":"additional","affiliation":[]},{"given":"Weiping","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Mengmeng","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Shilong","family":"Ma","sequence":"additional","affiliation":[]}],"member":"7163","published-online":{"date-parts":[[2012,1,1]]},"reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.tcs.2009.09.030"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/S0167-739X(03)00147-X"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.csi.2003.11.008"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/s10623-004-5660-y"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.csi.2004.02.003"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/S0167-4048(03)00614-X"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1976.1055638"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/359340.359342"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2009.04.001"},{"key":"ref10","first-page":"417","article-title":"Uses of elliptic curves in cryptography","volume-title":"Advances in Cryptology-Crypto\u201985","author":"Miller","year":"1985"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1090\/S0025-5718-1987-0866109-5"},{"key":"ref12","first-page":"51","article-title":"Elliptic curve cryptosystem ElGamal encryption and transmission scheme","volume-title":"International Conference on Computer Application and System Modeling","volume":"6","author":"Minfeng","year":"2010"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.amc.2004.01.018"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/s00200-005-0187-7"},{"key":"ref15","first-page":"65","article-title":"Study on QinJiuShao algorithm and its application in RSA","volume":"44","author":"Fuguo","year":"2008","journal-title":"Computer Engineering and Applications"},{"key":"ref16","first-page":"70","article-title":"A new fast RSA algorithm","volume":"22","author":"Qiang","year":"2001","journal-title":"Mini-Micro Systems"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1016\/0196-6774(89)90036-9"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-87442-3_111"},{"key":"ref19","first-page":"701","article-title":"Fast algorithm for scalar multiplication in elliptic curve cryptography","volume":"25","author":"Ran","year":"2005","journal-title":"Transactions of Beijing Institute of Technology"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1016\/j.camwa.2010.03.017"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1016\/j.optcom.2009.02.044"},{"key":"ref22","first-page":"469","article-title":"A public key cryptosystem and a signature scheme based on discrete logarithms","volume":"IT-31","year":"1985","journal-title":"IEEE Trans. Inf. Theory","ISSN":"http:\/\/id.crossref.org\/issn\/0018-9448","issn-type":"print"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/s001459900052"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1016\/j.imavis.2006.02.021"}],"container-title":["Journal of Computers"],"original-title":[],"deposited":{"date-parts":[[2015,9,15]],"date-time":"2015-09-15T15:09:28Z","timestamp":1442329768000},"score":1,"resource":{"primary":{"URL":"http:\/\/ojs.academypublisher.com\/index.php\/jcp\/article\/view\/5232"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,1,1]]},"references-count":24,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2012,1,1]]}},"URL":"https:\/\/doi.org\/10.4304\/jcp.7.1.169-178","relation":{},"ISSN":["1796-203X"],"issn-type":[{"value":"1796-203X","type":"print"}],"subject":[],"published":{"date-parts":[[2012,1,1]]}}}