{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T15:13:49Z","timestamp":1725808429474},"publisher-location":"Cham","reference-count":15,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319120119"},{"type":"electronic","value":"9783319120126"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-12012-6_3","type":"book-chapter","created":{"date-parts":[[2014,10,31]],"date-time":"2014-10-31T11:09:45Z","timestamp":1414753785000},"page":"21-28","source":"Crossref","is-referenced-by-count":1,"title":["Generating Digital Signature Using DNA Coding"],"prefix":"10.1007","author":[{"given":"Gadang","family":"Madhulika","sequence":"first","affiliation":[]},{"given":"Chinta Seshadri","family":"Rao","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"3_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"271","DOI":"10.1007\/3-540-44495-5_24","volume-title":"Progress in Cryptology - INDOCRYPT 2000","author":"D. Boneh","year":"2000","unstructured":"Boneh, D., Modadugu, N., Kim, M.: Generating RSA keys on a handheld using an untrusted server. In: Roy, B., Okamoto, E. (eds.) INDOCRYPT 2000. LNCS, vol.\u00a01977, pp. 271\u2013282. Springer, Heidelberg (2000)"},{"key":"3_CR2","volume-title":"Applied Cryptography: protocols, Algorithms, and Source Code in C","author":"B. Schneier","year":"1996","unstructured":"Schneier, B.: Applied Cryptography: protocols, Algorithms, and Source Code in C, 2nd edn. Wiley, New York (1996)","edition":"2"},{"key":"3_CR3","unstructured":"The Elliptic Curve Digital Signature Algorithm (ECDSA), ANSI X9.62, American National Standards Institute (1998)"},{"key":"3_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"252","DOI":"10.1007\/BFb0054867","volume-title":"Algorithmic Number Theory","author":"E. De Win","year":"1998","unstructured":"De Win, E., Mister, S., Preneel, B., Wiener, M.: On the performance of signature schemes based on elliptic curves. In: Buhler, J.P. (ed.) ANTS 1998. LNCS, vol.\u00a01423, pp. 252\u2013266. Springer, Heidelberg (1998)"},{"key":"3_CR5","doi-asserted-by":"crossref","first-page":"233","DOI":"10.1090\/dimacs\/054\/19","volume-title":"DNA Based Computers V","author":"A. Gehani","year":"2000","unstructured":"Gehani, A., LaBean, T.H., Reif, J.H.: DNA-based cryptography. In: DNA Based Computers V, vol.\u00a054, pp. 233\u2013249. American Mathematical Society, Providence (2000)"},{"key":"3_CR6","doi-asserted-by":"crossref","unstructured":"Wang, X., Zhang, Q.: DNA computing-based cryptography. In: 4th International Conference on \u201cBio-Inspired Computing\u201d, BIC-TA 2009, pp. 1\u20133. IEEE (2009)","DOI":"10.1109\/BICTA.2009.5338153"},{"key":"3_CR7","doi-asserted-by":"publisher","first-page":"1021","DOI":"10.1126\/science.7973651","volume":"266","author":"L. Adleman","year":"1994","unstructured":"Adleman, L.: Molecular Computation of Solutions to Combinatorial Problems. Science\u00a0266, 1021\u20131024 (1994)","journal-title":"Science"},{"key":"3_CR8","doi-asserted-by":"publisher","first-page":"542","DOI":"10.1126\/science.7725098","volume":"268","author":"R.J. Lipton","year":"1995","unstructured":"Lipton, R.J.: Using DNA to solve NP-complete problems. Science\u00a0268, 542\u2013545 (1995)","journal-title":"Science"},{"key":"3_CR9","doi-asserted-by":"crossref","unstructured":"Boneh, D., Dunworth, C., Lipton, R.: Breaking DES using a molecular Computer, pp. 37\u201365. American Mathematical Society (1995)","DOI":"10.1090\/dimacs\/027\/04"},{"key":"3_CR10","doi-asserted-by":"publisher","first-page":"533","DOI":"10.1038\/21092","volume":"399","author":"C.T. Celland","year":"1999","unstructured":"Celland, C.T., Risca, V., Bancroft, C.: Hiding messages in DNA microdots. Nature\u00a0399, 533\u2013534 (1999)","journal-title":"Nature"},{"key":"3_CR11","doi-asserted-by":"crossref","unstructured":"Cui, G., Qin, L., Wang, Y., Zhang, X.: An encryption scheme using DNA technology. In: IEEE 3rd International Conference on Bio-Inspired Computing: Theories and Applications (BICTA 2008), Adelaid, SA, Australia, pp. 37\u201342 (2008)","DOI":"10.1109\/BICTA.2008.4656701"},{"key":"3_CR12","unstructured":"Naveen, J.K., Karthigaikumar, P., Sivamangai, N.M., Sandhya, R., Asok, S.B.: Hardware Implementation of DNA Based Cryptography. In: IEEE Conference on Information and Communication Technologies, ICT, pp. 696\u2013700 (2013)"},{"issue":"I0","key":"3_CR13","first-page":"2482","volume":"E84-A","author":"K. Katayangi","year":"2001","unstructured":"Katayangi, K., Murakami, Y.: A new product-sum public-key cryptosystem using message extension. IEICE Transactions on Fundamentals\u00a0E84-A(I0), 2482\u20132487 (2001)","journal-title":"IEICE Transactions on Fundamentals"},{"key":"3_CR14","doi-asserted-by":"crossref","unstructured":"Zhang, Q., Guo, L., Xue, X., Wei, X.: An Image Encryption Algorithm Based on DNA Sequenc Addition Operation. In: 4th International Conference on Bio-Inspired Computing, BICTA, pp. 75\u201379 (2009)","DOI":"10.1109\/BICTA.2009.5338151"},{"key":"3_CR15","unstructured":"Torana, O., Borda, M.: 8th International Conference on Communications (COMM), pp. 451\u2013456. IEEE (2010)"}],"container-title":["Advances in Intelligent Systems and Computing","Proceedings of the 3rd International Conference on Frontiers of Intelligent Computing: Theory and Applications (FICTA) 2014"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-12012-6_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,14]],"date-time":"2023-02-14T18:53:02Z","timestamp":1676400782000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-12012-6_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319120119","9783319120126"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-12012-6_3","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2015]]}}}