{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T18:50:10Z","timestamp":1725475810164},"publisher-location":"Berlin, Heidelberg","reference-count":10,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540677420"},{"type":"electronic","value":"9783540450306"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2000]]},"DOI":"10.1007\/10718964_22","type":"book-chapter","created":{"date-parts":[[2006,12,29]],"date-time":"2006-12-29T16:04:09Z","timestamp":1167408249000},"page":"266-277","source":"Crossref","is-referenced-by-count":0,"title":["Construction and Categories of Codes"],"prefix":"10.1007","author":[{"given":"G. R.","family":"Blakley","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"I.","family":"Borosh","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"A.","family":"Klappenecker","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"key":"22_CR1","volume-title":"Arrows, Structures, and Functors \u2013 The Categorical Imperative","author":"M.A. Arbib","year":"1975","unstructured":"Arbib, M.A., Manes, E.: Arrows, Structures, and Functors \u2013 The Categorical Imperative. Academic Press, New York (1975)"},{"key":"22_CR2","first-page":"1","volume-title":"Proceedings of the Klagenfurt Conference, Contributions to General Algebra","author":"G.R. Blakley","year":"1998","unstructured":"Blakley, G.R., Borosh, I.: A general theory of codes, I: Basic concepts. In: Dorninger, D., Eigenthaler, G., Kaiser, H.K., Kautschistsch, H., More, W. (eds.) Proceedings of the Klagenfurt Conference, Contributions to General Algebra, vol.\u00a010, pp. 1\u201329. Verlag Johannes Heyn, Klagenfurt, Austria (1998)"},{"key":"22_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/BFb0030405","volume-title":"Information Security","author":"G.R. Blakley","year":"1998","unstructured":"Blakley, G.R., Borosh, I.: A general theory of codes, II: Paradigms and homomorphisms. In: Okamoto, E. (ed.) ISW 1997. LNCS, vol.\u00a01396, pp. 1\u201330. Springer, Heidelberg (1998)"},{"key":"22_CR4","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1007\/BF01390768","volume":"6","author":"A.R. Calderbank","year":"1995","unstructured":"Calderbank, A.R., Sloane, N.J.A.: Modular and padic cyclic codes. Designs, Codes, and Cryptography\u00a06, 21\u201335 (1995)","journal-title":"Designs, Codes, and Cryptography"},{"key":"22_CR5","doi-asserted-by":"crossref","DOI":"10.1007\/978-94-009-8399-1","volume-title":"Universal Algebra","author":"P.M. Cohn","year":"1981","unstructured":"Cohn, P.M.: Universal Algebra. D. Reidel Publishing Company, Dordrecht (1981) (revised edition)"},{"key":"22_CR6","doi-asserted-by":"publisher","first-page":"644","DOI":"10.1109\/TIT.1976.1055638","volume":"22","author":"W. Diffie","year":"1976","unstructured":"Diffie, W., Hellman, M.E.: New directions in cryptography. IEEE Trans. Inform. Theory\u00a022, 644\u2013654 (1976)","journal-title":"IEEE Trans. Inform. Theory"},{"key":"22_CR7","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4612-9839-7","volume-title":"Categories for the Working Mathematician","author":"S. Mac Lane","year":"1971","unstructured":"Mac Lane, S.: Categories for the Working Mathematician. Springer, Berlin (1971)"},{"key":"22_CR8","doi-asserted-by":"publisher","first-page":"106","DOI":"10.1109\/TIT.1978.1055817","volume":"24","author":"S.C. Pohlig","year":"1978","unstructured":"Pohlig, S.C., Hellman, M.E.: An improved algorithm for computing logarithms over GF(p) and its cryptographic significance. IEEE Trans. Inform. Theory\u00a024, 106\u2013110 (1978)","journal-title":"IEEE Trans. Inform. Theory"},{"issue":"4","key":"22_CR9","doi-asserted-by":"publisher","first-page":"442","DOI":"10.1145\/361082.361089","volume":"17","author":"G.P. Purdy","year":"1974","unstructured":"Purdy, G.P.: A high-security log-in procedure. Comm. of the ACM\u00a017(4), 442\u2013445 (1974)","journal-title":"Comm. of the ACM"},{"key":"22_CR10","doi-asserted-by":"publisher","first-page":"120","DOI":"10.1145\/359340.359342","volume":"21","author":"R.L. Rivest","year":"1978","unstructured":"Rivest, R.L., Shamir, A., Adleman, L.M.: A method for obtaining digital signatures and public-key cryptosystems. Comm. ACM\u00a021, 120\u2013126 (1978)","journal-title":"Comm. ACM"}],"container-title":["Lecture Notes in Computer Science","Information Security and Privacy"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/10718964_22","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,3,17]],"date-time":"2019-03-17T21:52:56Z","timestamp":1552859576000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/10718964_22"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2000]]},"ISBN":["9783540677420","9783540450306"],"references-count":10,"URL":"https:\/\/doi.org\/10.1007\/10718964_22","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2000]]}}}