{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,6]],"date-time":"2025-12-06T04:53:44Z","timestamp":1764996824438},"publisher-location":"Berlin, Heidelberg","reference-count":11,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540003243"},{"type":"electronic","value":"9783540362883"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2003]]},"DOI":"10.1007\/3-540-36288-6_22","type":"book-chapter","created":{"date-parts":[[2007,6,3]],"date-time":"2007-06-03T20:45:01Z","timestamp":1180903501000},"page":"292-308","source":"Crossref","is-referenced-by-count":9,"title":["A Lattice Based Public Key Cryptosystem Using Polynomial Representations"],"prefix":"10.1007","author":[{"given":"Seong-Hun","family":"Paeng","sequence":"first","affiliation":[]},{"given":"Bae Eun","family":"Jung","sequence":"additional","affiliation":[]},{"given":"Kil-Chan","family":"Ha","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2002,12,18]]},"reference":[{"key":"22_CR1","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"52","DOI":"10.1007\/3-540-69053-0_5","volume-title":"Advances in Cryptology-Eurocrypt\u2019 97","author":"D. Coppersmith","year":"1997","unstructured":"D. Coppersmith, A. Shamir Lattice Attacks on NTRU, Advances in Cryptology-Eurocrypt\u2019 97, LNCS 1233 (1997), 52\u201361"},{"key":"22_CR2","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"537","DOI":"10.1007\/3-540-48405-1_34","volume-title":"Advances in Cryptology-Crypto\u2019 99","author":"E. Fujisaki","year":"1999","unstructured":"E. Fujisaki, T. Okamoto Secure Integration of Asymmetric and Symmetric Encryption Schemes, Advances in Cryptology-Crypto\u2019 99, LNCS 1666 (1999), 537\u2013554 306"},{"key":"22_CR3","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"182","DOI":"10.1007\/3-540-44987-6_12","volume-title":"Advances in Cryptology-Eurocrypt\u2019 01","author":"C. Gentry","year":"2001","unstructured":"C. Gentry Key Recovery and Message Attacks on NTRU-Composite, Advances in Cryptology-Eurocrypt\u2019 01, LNCS 2045 (2001), 182\u2013194"},{"key":"22_CR4","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"112","DOI":"10.1007\/BFb0052231","volume-title":"Advances in Cryptology-Crypto\u2019 97","author":"O. Goldreich","year":"1997","unstructured":"O. Goldreich, S. Goldwasser, S. Halevi Public Key Cryptosystems from Lattice Reduction Problems, Advances in Cryptology-Crypto\u2019 97, LNCS 1294 (1997), 112\u2013131 292, 294"},{"key":"22_CR5","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"267","DOI":"10.1007\/BFb0054868","volume-title":"ANTS III","author":"J. Hoffstein","year":"1998","unstructured":"J. Hoffstein, J. Pipher, J. Silverman NTRU: a Ring Based Public Key Cryptosystem, ANTS III, LNCS 1423 (1998), 267\u2013288 295"},{"key":"22_CR6","series-title":"Lect Notes Comput Sci","first-page":"20","volume-title":"Advances in Cryptology-Crypto 2000","author":"E. Jaumels","year":"2000","unstructured":"E. Jaumels, A. Joux A Chosen-Ciphertext Attack against NTRU, Advances in Cryptology-Crypto 2000, LNCS 1880 (2000), 20\u201335"},{"key":"22_CR7","unstructured":"R. Lidl, H. Niederreiter Introduction to Finite Fields and Their Applications, Cambridge University Press, (1986) 300"},{"key":"22_CR8","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"126","DOI":"10.1007\/3-540-44670-2_11","volume-title":"CaLC 2001","author":"D. Micciancio","year":"2001","unstructured":"D. Micciancio Improving Lattice Based Cryptosystems Using the Hermite Normal Form, CaLC 2001, LNCS 2146 (2001), 126\u2013145 292, 300, 305"},{"key":"22_CR9","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"288","DOI":"10.1007\/3-540-48405-1_18","volume-title":"Advances in Cryptology-Crypto\u2019 99","author":"P. Nguyen","year":"1999","unstructured":"P. Nguyen Cryptanalysis of the Goldreich-Goldwasser-Halevi Cryptosystem from Crypto\u2019 97, Advances in Cryptology-Crypto\u2019 99, LNCS 1666 (1999), 288\u2013304 292, 293, 294, 299"},{"key":"22_CR10","doi-asserted-by":"publisher","first-page":"201","DOI":"10.1016\/0304-3975(87)90064-8","volume":"53","author":"C.P. Schnorr","year":"1987","unstructured":"C.P. Schnorr A Hierarchy of Polynomial Time Lattice Basis Reduction Algorithms, Theoretical Computer Science 53 (1987), 201\u2013224 295, 300","journal-title":"Theoretical Computer Science"},{"key":"22_CR11","doi-asserted-by":"crossref","unstructured":"L. C. Washington Introduction to Cyclotomic Fields, Springer-Verlag, GTM 83 (1996)","DOI":"10.1007\/978-1-4612-1934-7"}],"container-title":["Lecture Notes in Computer Science","Public Key Cryptography \u2014 PKC 2003"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-36288-6_22","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,4,28]],"date-time":"2019-04-28T16:56:08Z","timestamp":1556470568000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-36288-6_22"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2002,12,18]]},"ISBN":["9783540003243","9783540362883"],"references-count":11,"URL":"https:\/\/doi.org\/10.1007\/3-540-36288-6_22","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[2002,12,18]]}}}