{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T21:34:13Z","timestamp":1725572053321},"publisher-location":"Berlin, Heidelberg","reference-count":10,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540666820"},{"type":"electronic","value":"9783540479420"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1999]]},"DOI":"10.1007\/978-3-540-47942-0_11","type":"book-chapter","created":{"date-parts":[[2010,12,16]],"date-time":"2010-12-16T23:16:22Z","timestamp":1292541382000},"page":"135-142","source":"Crossref","is-referenced-by-count":0,"title":["On the Cryptographic Value of the q th Root Problem"],"prefix":"10.1007","author":[{"given":"Cheryl L.","family":"Beaver","sequence":"first","affiliation":[]},{"given":"Peter S.","family":"Gemmell","sequence":"additional","affiliation":[]},{"given":"Anna M.","family":"Johnston","sequence":"additional","affiliation":[]},{"given":"William","family":"Neumann","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"11_CR1","series-title":"Efficient Algorithms","first-page":"160","volume-title":"Algorithmic Number Theory","author":"E. Bach","year":"1996","unstructured":"Bach, E., Shallit, J.: Algorithmic Number Theory. Efficient Algorithms, vol.\u00a0I, pp. 160\u2013163. MIT Press, Cambridge (1996)"},{"key":"11_CR2","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1007\/BF02351717","volume":"1","author":"U. Feige","year":"1988","unstructured":"Feige, U., Fiat, A., Shamir, A.: Zero-knowledge proofs of identity. Journal of Cryptology\u00a01, 77\u201394 (1988)","journal-title":"Journal of Cryptology"},{"key":"11_CR3","unstructured":"Johnston, A.: A Generalized q\n th\n Root Algorithm. In: Proc. of the Symp. on Discrete Algorithms, Baltimore Maryland (January 1999)"},{"key":"11_CR4","doi-asserted-by":"publisher","DOI":"10.1201\/9781439821916","volume-title":"Handbook of Applied Cryptography","author":"A. Menezes","year":"1996","unstructured":"Menezes, A., van Oorschot, P., Vanstone, S.: Handbook of Applied Cryptography. CRC Press, Boca Raton (1996)"},{"key":"11_CR5","doi-asserted-by":"publisher","first-page":"106","DOI":"10.1109\/TIT.1978.1055817","volume":"24","author":"S. Pohlig","year":"1978","unstructured":"Pohlig, S., Hellman, M.: An improved algorithm for computing logarithms over GF(p) and its cryptographic significance. IEEE Trans. on Information Theory\u00a024, 106\u2013110 (1978)","journal-title":"IEEE Trans. on Information Theory"},{"key":"11_CR6","first-page":"918","volume":"32","author":"J. Pollard","year":"1978","unstructured":"Pollard, J.: Monte Carlo methods for index computation mod p. Math. of Computation\u00a032, 918\u2013924 (1978)","journal-title":"Math. of Computation"},{"key":"11_CR7","unstructured":"Rabin, M.: Digitalized signatures and public key functions as intractable as factorization. MIT\/LCS\/TR-212, MIT Laboratory for Computer Science (1979)"},{"issue":"2","key":"11_CR8","doi-asserted-by":"publisher","first-page":"120","DOI":"10.1145\/359340.359342","volume":"21","author":"R. Rivest","year":"1978","unstructured":"Rivest, R., Hellman, M., Adleman, L.: A Method for Obtaining Digital Signatures and Public Key Cryptosystems. Comm. of the ACM\u00a021(2), 120\u2013126 (1978)","journal-title":"Comm. of the ACM"},{"key":"11_CR9","unstructured":"Shanks D.: Solved and unsolved problems in Number Theory. Washington, D.C., Spartan (1962)"},{"issue":"203","key":"11_CR10","first-page":"475","volume":"61","author":"H. Williams","year":"1993","unstructured":"Williams, H.: A refinement of H.C. Williams\u2019 qth root algorithm. Math. Comp.\u00a061(203), 475\u2013483 (1993)","journal-title":"Math. Comp."}],"container-title":["Lecture Notes in Computer Science","Information and Communication Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-47942-0_11","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,3,22]],"date-time":"2019-03-22T16:17:37Z","timestamp":1553271457000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-47942-0_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1999]]},"ISBN":["9783540666820","9783540479420"],"references-count":10,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-47942-0_11","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[1999]]}}}