{"id":"https://openalex.org/W2167618132","doi":"https://doi.org/10.1007/978-3-540-78440-1_17","title":"A Digital Signature Scheme Based on CVP \u2009\u221e","display_name":"A Digital Signature Scheme Based on CVP \u2009\u221e","publication_year":2008,"publication_date":"2008-02-26","ids":{"openalex":"https://openalex.org/W2167618132","doi":"https://doi.org/10.1007/978-3-540-78440-1_17","mag":"2167618132"},"language":"en","primary_location":{"id":"doi:10.1007/978-3-540-78440-1_17","is_oa":true,"landing_page_url":"https://doi.org/10.1007/978-3-540-78440-1_17","pdf_url":"https://link.springer.com/content/pdf/10.1007%2F978-3-540-78440-1_17.pdf","source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"bronze","oa_url":"https://link.springer.com/content/pdf/10.1007%2F978-3-540-78440-1_17.pdf","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5083804785","display_name":"Thomas Plantard","orcid":"https://orcid.org/0000-0003-2521-2520"},"institutions":[{"id":"https://openalex.org/I204824540","display_name":"University of Wollongong","ror":"https://ror.org/00jtmb277","country_code":"AU","type":"education","lineage":["https://openalex.org/I204824540"]}],"countries":["AU"],"is_corresponding":true,"raw_author_name":"Thomas Plantard","raw_affiliation_strings":["Centre for Computer and Information Security Research School of Computer Science and Software Engineering, University of Wollongong, Wollongong, Australia","Centre for Computer and Information Security Research, School of Computer Science and Software Engineering, University of Wollongong, Wollongong, NSW, Australia"],"affiliations":[{"raw_affiliation_string":"Centre for Computer and Information Security Research School of Computer Science and Software Engineering, University of Wollongong, Wollongong, Australia","institution_ids":["https://openalex.org/I204824540"]},{"raw_affiliation_string":"Centre for Computer and Information Security Research, School of Computer Science and Software Engineering, University of Wollongong, Wollongong, NSW, Australia","institution_ids":["https://openalex.org/I204824540"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5054741725","display_name":"Willy Susilo","orcid":"https://orcid.org/0000-0002-1562-5105"},"institutions":[{"id":"https://openalex.org/I204824540","display_name":"University of Wollongong","ror":"https://ror.org/00jtmb277","country_code":"AU","type":"education","lineage":["https://openalex.org/I204824540"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Willy Susilo","raw_affiliation_strings":["Centre for Computer and Information Security Research School of Computer Science and Software Engineering, University of Wollongong, Wollongong, Australia","Centre for Computer and Information Security Research, School of Computer Science and Software Engineering, University of Wollongong, Wollongong, NSW, Australia"],"affiliations":[{"raw_affiliation_string":"Centre for Computer and Information Security Research School of Computer Science and Software Engineering, University of Wollongong, Wollongong, Australia","institution_ids":["https://openalex.org/I204824540"]},{"raw_affiliation_string":"Centre for Computer and Information Security Research, School of Computer Science and Software Engineering, University of Wollongong, Wollongong, NSW, Australia","institution_ids":["https://openalex.org/I204824540"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5014462090","display_name":"Khin Than Win","orcid":"https://orcid.org/0000-0002-7810-6388"},"institutions":[{"id":"https://openalex.org/I204824540","display_name":"University of Wollongong","ror":"https://ror.org/00jtmb277","country_code":"AU","type":"education","lineage":["https://openalex.org/I204824540"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Khin Than Win","raw_affiliation_strings":["Centre for Computer and Information Security Research School of Computer Science and Software Engineering, University of Wollongong, Wollongong, Australia","Centre for Computer and Information Security Research, School of Computer Science and Software Engineering, University of Wollongong, Wollongong, NSW, Australia"],"affiliations":[{"raw_affiliation_string":"Centre for Computer and Information Security Research School of Computer Science and Software Engineering, University of Wollongong, Wollongong, Australia","institution_ids":["https://openalex.org/I204824540"]},{"raw_affiliation_string":"Centre for Computer and Information Security Research, School of Computer Science and Software Engineering, University of Wollongong, Wollongong, NSW, Australia","institution_ids":["https://openalex.org/I204824540"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5083804785"],"corresponding_institution_ids":["https://openalex.org/I204824540"],"apc_list":{"value":5000,"currency":"EUR","value_usd":5392},"apc_paid":null,"fwci":0.2788,"has_fulltext":true,"cited_by_count":2,"citation_normalized_percentile":{"value":0.59325103,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"288","last_page":"307"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11693","display_name":"Cryptography and Residue Arithmetic","score":0.9980999827384949,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11181","display_name":"Advanced Data Storage Technologies","score":0.9857000112533569,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/cryptosystem","display_name":"Cryptosystem","score":0.6967836618423462},{"id":"https://openalex.org/keywords/lattice-problem","display_name":"Lattice problem","score":0.6930537223815918},{"id":"https://openalex.org/keywords/merkle-signature-scheme","display_name":"Merkle signature scheme","score":0.6299075484275818},{"id":"https://openalex.org/keywords/cryptanalysis","display_name":"Cryptanalysis","score":0.5940083265304565},{"id":"https://openalex.org/keywords/digital-signature","display_name":"Digital signature","score":0.5851749777793884},{"id":"https://openalex.org/keywords/mceliece-cryptosystem","display_name":"McEliece cryptosystem","score":0.5477430820465088},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.5405113101005554},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.5171977281570435},{"id":"https://openalex.org/keywords/norm","display_name":"Norm (philosophy)","score":0.5067062973976135},{"id":"https://openalex.org/keywords/hybrid-cryptosystem","display_name":"Hybrid cryptosystem","score":0.4882047772407532},{"id":"https://openalex.org/keywords/lattice","display_name":"Lattice (music)","score":0.48820143938064575},{"id":"https://openalex.org/keywords/elgamal-signature-scheme","display_name":"ElGamal signature scheme","score":0.4722430408000946},{"id":"https://openalex.org/keywords/euclidean-distance","display_name":"Euclidean distance","score":0.46373453736305237},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.4624808728694916},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.45411232113838196},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.4410214424133301},{"id":"https://openalex.org/keywords/lattice-based-cryptography","display_name":"Lattice-based cryptography","score":0.4359132647514343},{"id":"https://openalex.org/keywords/schnorr-signature","display_name":"Schnorr signature","score":0.4296188950538635},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.4199764132499695},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.3851657509803772},{"id":"https://openalex.org/keywords/blind-signature","display_name":"Blind signature","score":0.3772027790546417},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.1254066824913025},{"id":"https://openalex.org/keywords/quantum-cryptography","display_name":"Quantum cryptography","score":0.08248695731163025},{"id":"https://openalex.org/keywords/physics","display_name":"Physics","score":0.07611456513404846}],"concepts":[{"id":"https://openalex.org/C6295992","wikidata":"https://www.wikidata.org/wiki/Q976521","display_name":"Cryptosystem","level":3,"score":0.6967836618423462},{"id":"https://openalex.org/C168482242","wikidata":"https://www.wikidata.org/wiki/Q6497128","display_name":"Lattice problem","level":3,"score":0.6930537223815918},{"id":"https://openalex.org/C40404285","wikidata":"https://www.wikidata.org/wiki/Q1921816","display_name":"Merkle signature scheme","level":5,"score":0.6299075484275818},{"id":"https://openalex.org/C181149355","wikidata":"https://www.wikidata.org/wiki/Q897511","display_name":"Cryptanalysis","level":3,"score":0.5940083265304565},{"id":"https://openalex.org/C118463975","wikidata":"https://www.wikidata.org/wiki/Q220849","display_name":"Digital signature","level":3,"score":0.5851749777793884},{"id":"https://openalex.org/C16935551","wikidata":"https://www.wikidata.org/wiki/Q1042583","display_name":"McEliece cryptosystem","level":4,"score":0.5477430820465088},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.5405113101005554},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.5171977281570435},{"id":"https://openalex.org/C191795146","wikidata":"https://www.wikidata.org/wiki/Q3878446","display_name":"Norm (philosophy)","level":2,"score":0.5067062973976135},{"id":"https://openalex.org/C73468433","wikidata":"https://www.wikidata.org/wiki/Q1639918","display_name":"Hybrid cryptosystem","level":4,"score":0.4882047772407532},{"id":"https://openalex.org/C2781204021","wikidata":"https://www.wikidata.org/wiki/Q6497091","display_name":"Lattice (music)","level":2,"score":0.48820143938064575},{"id":"https://openalex.org/C132860680","wikidata":"https://www.wikidata.org/wiki/Q1328731","display_name":"ElGamal signature scheme","level":5,"score":0.4722430408000946},{"id":"https://openalex.org/C120174047","wikidata":"https://www.wikidata.org/wiki/Q847073","display_name":"Euclidean distance","level":2,"score":0.46373453736305237},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.4624808728694916},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.45411232113838196},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.4410214424133301},{"id":"https://openalex.org/C137660015","wikidata":"https://www.wikidata.org/wiki/Q6497083","display_name":"Lattice-based cryptography","level":5,"score":0.4359132647514343},{"id":"https://openalex.org/C124968333","wikidata":"https://www.wikidata.org/wiki/Q1465057","display_name":"Schnorr signature","level":5,"score":0.4296188950538635},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.4199764132499695},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.3851657509803772},{"id":"https://openalex.org/C18899389","wikidata":"https://www.wikidata.org/wiki/Q2736593","display_name":"Blind signature","level":4,"score":0.3772027790546417},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.1254066824913025},{"id":"https://openalex.org/C144901912","wikidata":"https://www.wikidata.org/wiki/Q471906","display_name":"Quantum cryptography","level":4,"score":0.08248695731163025},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.07611456513404846},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0},{"id":"https://openalex.org/C84114770","wikidata":"https://www.wikidata.org/wiki/Q46344","display_name":"Quantum","level":2,"score":0.0},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0},{"id":"https://openalex.org/C169699857","wikidata":"https://www.wikidata.org/wiki/Q2122243","display_name":"Quantum information","level":3,"score":0.0},{"id":"https://openalex.org/C99138194","wikidata":"https://www.wikidata.org/wiki/Q183427","display_name":"Hash function","level":2,"score":0.0},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0},{"id":"https://openalex.org/C24890656","wikidata":"https://www.wikidata.org/wiki/Q82811","display_name":"Acoustics","level":1,"score":0.0},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1007/978-3-540-78440-1_17","is_oa":true,"landing_page_url":"https://doi.org/10.1007/978-3-540-78440-1_17","pdf_url":"https://link.springer.com/content/pdf/10.1007%2F978-3-540-78440-1_17.pdf","source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},{"id":"pmh:oai:ro.uow.edu.au:infopapers-10529","is_oa":false,"landing_page_url":"https://ro.uow.edu.au/infopapers/3193","pdf_url":null,"source":{"id":"https://openalex.org/S4306400510","display_name":"Research Online (University of Wollongong)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I204824540","host_organization_name":"University of Wollongong","host_organization_lineage":["https://openalex.org/I204824540"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Faculty of Informatics - Papers (Archive)","raw_type":"presentation"},{"id":"mag:2167618132","is_oa":false,"landing_page_url":"https://link.springer.com/content/pdf/10.1007%2F978-3-540-78440-1_17.pdf","pdf_url":null,"source":{"id":"https://openalex.org/S4306420756","display_name":"Public Key Cryptography","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":null,"raw_source_name":"Public Key Cryptography","raw_type":null}],"best_oa_location":{"id":"doi:10.1007/978-3-540-78440-1_17","is_oa":true,"landing_page_url":"https://doi.org/10.1007/978-3-540-78440-1_17","pdf_url":"https://link.springer.com/content/pdf/10.1007%2F978-3-540-78440-1_17.pdf","source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2167618132.pdf","grobid_xml":"https://content.openalex.org/works/W2167618132.grobid-xml"},"referenced_works_count":65,"referenced_works":["https://openalex.org/W57720693","https://openalex.org/W159028217","https://openalex.org/W185089934","https://openalex.org/W1495333819","https://openalex.org/W1496801598","https://openalex.org/W1529207657","https://openalex.org/W1532770887","https://openalex.org/W1536948141","https://openalex.org/W1541721626","https://openalex.org/W1557027117","https://openalex.org/W1576982162","https://openalex.org/W1582043969","https://openalex.org/W1592882366","https://openalex.org/W1601111578","https://openalex.org/W1675339804","https://openalex.org/W1761303171","https://openalex.org/W1886646278","https://openalex.org/W1893972099","https://openalex.org/W1904122824","https://openalex.org/W1966034053","https://openalex.org/W1967448158","https://openalex.org/W1977195026","https://openalex.org/W1981627190","https://openalex.org/W1989510734","https://openalex.org/W1995990042","https://openalex.org/W2005350412","https://openalex.org/W2012589104","https://openalex.org/W2013737143","https://openalex.org/W2013794527","https://openalex.org/W2031600610","https://openalex.org/W2032980094","https://openalex.org/W2037483935","https://openalex.org/W2050689197","https://openalex.org/W2057728026","https://openalex.org/W2067935912","https://openalex.org/W2077244027","https://openalex.org/W2087843362","https://openalex.org/W2096221836","https://openalex.org/W2097678797","https://openalex.org/W2101196233","https://openalex.org/W2111416661","https://openalex.org/W2118284443","https://openalex.org/W2135124252","https://openalex.org/W2140940105","https://openalex.org/W2141040012","https://openalex.org/W2149789050","https://openalex.org/W2151241472","https://openalex.org/W2155178472","https://openalex.org/W2157396841","https://openalex.org/W2160639384","https://openalex.org/W2181114408","https://openalex.org/W2189439054","https://openalex.org/W2193335728","https://openalex.org/W2399190650","https://openalex.org/W2585338815","https://openalex.org/W2798909945","https://openalex.org/W2986959318","https://openalex.org/W3022136271","https://openalex.org/W3035235874","https://openalex.org/W3143329128","https://openalex.org/W3217775779","https://openalex.org/W4238141527","https://openalex.org/W4241011531","https://openalex.org/W4242212920","https://openalex.org/W4293259454"],"related_works":["https://openalex.org/W2358057278","https://openalex.org/W2131035209","https://openalex.org/W2807720898","https://openalex.org/W1585084598","https://openalex.org/W2346363964","https://openalex.org/W3006343021","https://openalex.org/W2481286888","https://openalex.org/W2989157340","https://openalex.org/W3031594148","https://openalex.org/W2003115354","https://openalex.org/W2367533237","https://openalex.org/W2565100599","https://openalex.org/W1804795452","https://openalex.org/W1506156414","https://openalex.org/W2014756344","https://openalex.org/W2377220110","https://openalex.org/W2335395307","https://openalex.org/W2372652828","https://openalex.org/W3095064648","https://openalex.org/W1565836096"],"abstract_inverted_index":null,"counts_by_year":[{"year":2013,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
