{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T20:02:08Z","timestamp":1725480128563},"publisher-location":"Boston, MA","reference-count":5,"publisher":"Springer US","isbn-type":[{"type":"print","value":"9781475706048"},{"type":"electronic","value":"9781475706024"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1983]]},"DOI":"10.1007\/978-1-4757-0602-4_2","type":"book-chapter","created":{"date-parts":[[2013,4,16]],"date-time":"2013-04-16T21:14:41Z","timestamp":1366146881000},"page":"15-19","source":"Crossref","is-referenced-by-count":1,"title":["Some Remarks on the Herlestam-Johannesson Algorithm for Computing Logarithms over GF(2p)"],"prefix":"10.1007","author":[{"given":"E. F.","family":"Brickell","sequence":"first","affiliation":[]},{"given":"J. H.","family":"Moore","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"2_CR1","doi-asserted-by":"crossref","first-page":"2","DOI":"10.1109\/MCOM.1979.1090001","volume":"17","author":"S Berkovits","year":"1979","unstructured":"S. Berkovits, J. Kowalchuk and B. Schanning, \u201cImplementing a Public Key Scheme,\u201d IEEE Communications Magazine, 17, May 1979, pp. 2\u20133.","journal-title":"IEEE Communications Magazine"},{"key":"2_CR2","doi-asserted-by":"publisher","first-page":"644","DOI":"10.1109\/TIT.1976.1055638","volume":"IT-22","author":"W Diffie","year":"1976","unstructured":"W. Diffie and M. Hellman, \u201cNew Directions in Cryptography,\u201d IEEE Trans. Inform. Theory, IT-22 (1976), pp. 644\u2013654.","journal-title":"IEEE Trans. Inform. Theory"},{"key":"2_CR3","doi-asserted-by":"publisher","first-page":"326","DOI":"10.1007\/BF01941467","volume":"21","author":"T Herlestam","year":"1981","unstructured":"T. Herlestam and R. Johannesson, \u201cOn Computing Logarithms over GF(2P),\u201d BIT 21 (1981), pp. 326\u2013334.","journal-title":"BIT"},{"key":"2_CR4","first-page":"106","volume":"IT-24","author":"S Herlestam","year":"1981","unstructured":"S. Pohlig and M. Hellman, \u201cAn Improved Algorithm for Computing Logarithms over GF(p) and its Cryptographic Significance,\u201d IEEE Trans. Inform. Theory, IT-24 (1978), pp. 106\u2013110.","journal-title":"IEEE Trans. Inform. Theory"},{"key":"2_CR5","unstructured":"J. Sachs, private communication."}],"container-title":["Advances in Cryptology"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-1-4757-0602-4_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,12]],"date-time":"2019-05-12T09:43:22Z","timestamp":1557654202000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-1-4757-0602-4_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1983]]},"ISBN":["9781475706048","9781475706024"],"references-count":5,"URL":"https:\/\/doi.org\/10.1007\/978-1-4757-0602-4_2","relation":{},"subject":[],"published":{"date-parts":[[1983]]}}}