{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,21]],"date-time":"2025-12-21T06:25:36Z","timestamp":1766298336722,"version":"3.33.0"},"publisher-location":"New York, NY","reference-count":14,"publisher":"Springer New York","isbn-type":[{"type":"print","value":"9780387971964"},{"type":"electronic","value":"9780387347998"}],"license":[{"start":{"date-parts":[[1990,1,1]],"date-time":"1990-01-01T00:00:00Z","timestamp":631152000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1990]]},"DOI":"10.1007\/0-387-34799-2_39","type":"book-chapter","created":{"date-parts":[[2007,8,6]],"date-time":"2007-08-06T01:17:36Z","timestamp":1186363056000},"page":"540-563","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":20,"title":["Secret Error-Correcting Codes (SECC)"],"prefix":"10.1007","author":[{"given":"Tzonelih","family":"Hwang","sequence":"first","affiliation":[]},{"given":"T. R. N.","family":"Rao","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2000,12,1]]},"reference":[{"key":"39_CR1","unstructured":"Dorothy E. Denning, Cryptography and Data Security Addison Wesley, 1982."},{"issue":"6","key":"39_CR2","doi-asserted-by":"publisher","first-page":"644","DOI":"10.1109\/TIT.1976.1055638","volume":"IT-22","author":"76_Whitfield Diffie","year":"1976","unstructured":"76]_Whitfield Diffie and Martin E. Hellman, \u201cNew Directions in Cryptography,\u201d IEEE Trans. on Information Theory, Vol. IT-22, No. 6, pp. 644\u2013654, Nov. 1976","journal-title":"IEEE Trans. on Information Theory"},{"key":"39_CR3","unstructured":"_Shu Lin and Daniel J. Costello, Jr., Error Control Coding: Fundamentals and Applications, Prentice-Hall, 1983."},{"key":"39_CR4","volume-title":"The Theory of Error-Correcting Codes","author":"F.J. MacWilliams","year":"1977","unstructured":"F.J. MacWilliams and J.J.A. Sloane, The Theory of Error-Correcting Codes, North-Holland, Amsterdam, 1977."},{"key":"39_CR5","first-page":"42","volume-title":"DSN Progress Report","author":"R.J. McEliece","year":"1978","unstructured":"R.J. McEliece, \u201cA Public-Key Cryptosystem Based on Algebraic Coding Theory\u201d, DSN Progress Report, Jet Propulsion Laboratory, CA., Jan. & Feb. 1978, pp. 42\u201344."},{"key":"39_CR6","unstructured":"Meyer C.H. and Matyas S.M., Cryptography: A New Dimension in Computer Data Security, John Wiley & Sons, Inc., 1982."},{"key":"39_CR7","unstructured":"W. Wesley Peterson and E.J. Weldon, Jr., Error-Correcting Codes, Second Edition, The MIT Press, 1972."},{"key":"39_CR8","doi-asserted-by":"publisher","first-page":"378","DOI":"10.1016\/S0019-9958(68)90874-7","volume":"13","author":"F.P. Preparata","year":"1968","unstructured":"F.P. Preparata, \u201cA Class of Optimum Nonlinear Double-Error-Correcting Codes,\u201d Inform. and Control, 13, pp. 378\u2013400, 1968.","journal-title":"Inform. and Control"},{"key":"39_CR9","unstructured":"T.R.N. Rao, \u201cCryptosystems Using Algebraic Codes,\u201d IEEE International Symp. on Info. Theory., Brighton, England, June, 1985."},{"key":"39_CR10","first-page":"35","volume-title":"Advances in Cryptology CRYPTO\u2019 86","author":"T.R.N. Rao","year":"1987","unstructured":"T.R.N. Rao and K.H. Nam \u201cA Private-Key Algebraic-Coded Cryptosystem\u201d, Advances in Cryptology CRYPTO\u2019 86, editor A.M. Odlyzko, New York, Springier Verlag, pp. 35\u201348, 1987."},{"key":"39_CR11","doi-asserted-by":"publisher","first-page":"379","DOI":"10.1002\/j.1538-7305.1948.tb01338.x","volume":"27","author":"C.E. Shannon","year":"1948","unstructured":"C.E. Shannon. \u201cA Mathematical Theory of Communication,\u201d Bell Syst. Tech. J., 27, pp. 379\u2013423 (Part I), 623-656 (Part II), July 1948.","journal-title":"Bell Syst. Tech. J."},{"key":"39_CR12","doi-asserted-by":"crossref","unstructured":"R. Struik and van Tilburg J., \u201cThe Rao-Nam Scheme is Insecure Against a Chosen-plaintext Attack,\u201d Advances in Cryptology CRYPTO\u2019 87, pp. 445\u2013457, 1987.","DOI":"10.1007\/3-540-48184-2_40"},{"key":"39_CR13","doi-asserted-by":"crossref","unstructured":"Charles C. Wood, \u201cFuture Application of Cryptography,\u201d Proc. of the 1981 Symposium on Security and Privacy, pp. 70\u201374, Apr. 1981.","DOI":"10.1109\/SP.1981.10013"},{"key":"39_CR14","first-page":"337","volume":"8","author":"V. L Jr.","year":"1962","unstructured":"Vasil\u2019yev, Jr. L. \u201cNongroup Close-Packed Codes\u201d, Probl. Cybernet. (USSR) 8, pp. 337\u2013339, 1962.","journal-title":"Probl. Cybernet"}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2014 CRYPTO\u2019 88"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/0-387-34799-2_39","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,20]],"date-time":"2025-01-20T04:18:26Z","timestamp":1737346706000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/0-387-34799-2_39"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1990]]},"ISBN":["9780387971964","9780387347998"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/0-387-34799-2_39","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[1990]]},"assertion":[{"value":"1 December 2000","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}