{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,28]],"date-time":"2026-02-28T13:04:05Z","timestamp":1772283845167,"version":"3.50.1"},"publisher-location":"New York, NY","reference-count":9,"publisher":"Springer New York","isbn-type":[{"value":"9780387971964","type":"print"},{"value":"9780387347998","type":"electronic"}],"license":[{"start":{"date-parts":[[1990,1,1]],"date-time":"1990-01-01T00:00:00Z","timestamp":631152000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1990]]},"DOI":"10.1007\/0-387-34799-2_10","type":"book-chapter","created":{"date-parts":[[2007,8,5]],"date-time":"2007-08-05T21:17:36Z","timestamp":1186348656000},"page":"119-131","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":17,"title":["On the McEliece Public-Key Cryptosystem"],"prefix":"10.1007","author":[{"given":"Johan","family":"van Tilburg","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2000,12,1]]},"reference":[{"key":"10_CR1","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"224","DOI":"10.1007\/3-540-48184-2_20","volume-title":"Advances in Cryptology-CRYPTO\u2019 87","author":"C. Adams","year":"1988","unstructured":"C. Adams and H. Meijer, \u201cSecurity-Related Comments Regarding McEliece\u2019s Public-Key Cryptosystem\u201d, in: Advances in Cryptology-CRYPTO\u2019 87, Carl Pomerance ed., Lecture Notes in Computer Science # 293, Springer-Verlag, pp. 224\u2013228, 1988."},{"key":"10_CR2","doi-asserted-by":"publisher","first-page":"384","DOI":"10.1109\/TIT.1978.1055873","volume":"IT-24","author":"E.R. Berlekamp","year":"1978","unstructured":"E.R. Berlekamp, R.J. McEliece and H.C.A. van Tilborg, \u201cOn the inherent intractability of certain coding problems\u201d, IEEE Trans. Inform. Theory, vol. IT-24, pp. 384\u2013386, 1978.","journal-title":"IEEE Trans. Inform. Theory"},{"key":"10_CR3","doi-asserted-by":"publisher","first-page":"644","DOI":"10.1109\/TIT.1976.1055638","volume":"IT-22","author":"W. Diffie","year":"1976","unstructured":"W. Diffie and M.E. Hellman, \u201cNew Directions in Cryptography\u201d, IEEE Trans. Inform. Theory, vol. IT-22, pp. 644\u2013654, 1976.","journal-title":"IEEE Trans. Inform. Theory"},{"key":"10_CR4","unstructured":"P.J.M. Hin, \u201cChannel-Error-Correcting Privacy Cryptosystems\u201d, M.Sc. Thesis, Delft University of Technology, 1986 (in Dutch)."},{"key":"10_CR5","unstructured":"P.J.M. Hin, Private Communication, December 1986."},{"key":"10_CR6","unstructured":"D.E. Knuth, The art of computer Programming, Vol.2 \/ Seminumerical Algorithms, Addison-Wesley Publishing Company, 1981."},{"key":"10_CR7","doi-asserted-by":"crossref","unstructured":"P.J. Lee and E.F. Brickell, \u201cAn observation on the Security of McEliece\u2019s Public-Key Cryptosystem\u201d, Presented at Eurocrypt\u201988, Davos, May 1988.","DOI":"10.1007\/3-540-45961-8_25"},{"key":"10_CR8","volume-title":"The Theory of Error-Correcting Codes","author":"F.J. MacWilliams","year":"1978","unstructured":"F.J. MacWilliams and N.J.A. Sloane, The Theory of Error-Correcting Codes, Amsterdam: North-Holland, 1978."},{"key":"10_CR9","unstructured":"R.J. McEliece, \u201cA Public-Key Cryptosystem Based on Algebraic Coding Theory\u201d, DSN Progress Report 42-44, JPL Pasadena, pp. 114\u2013116, 1978."}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2014 CRYPTO\u2019 88"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/0-387-34799-2_10","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,12,12]],"date-time":"2019-12-12T10:26:20Z","timestamp":1576146380000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/0-387-34799-2_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1990]]},"ISBN":["9780387971964","9780387347998"],"references-count":9,"URL":"https:\/\/doi.org\/10.1007\/0-387-34799-2_10","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[1990]]},"assertion":[{"value":"1 December 2000","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}