{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,7]],"date-time":"2026-05-07T04:27:58Z","timestamp":1778128078392,"version":"3.51.4"},"publisher-location":"Berlin, Heidelberg","reference-count":6,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540546207","type":"print"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/3-540-46416-6_41","type":"book-chapter","created":{"date-parts":[[2007,8,6]],"date-time":"2007-08-06T18:02:07Z","timestamp":1186423327000},"page":"482-489","source":"Crossref","is-referenced-by-count":159,"title":["Ideals over a Non-Commutative Ring and their Application in Cryptology"],"prefix":"10.1007","author":[{"given":"E. M.","family":"Gabidulin","sequence":"first","affiliation":[]},{"given":"A. V.","family":"Paramonov","sequence":"additional","affiliation":[]},{"given":"O. V.","family":"Tretjakov","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"1","key":"41_CR1","first-page":"1","volume":"21","author":"E. M. Gabidulin","year":"1985","unstructured":"E. M. Gabidulin, \u201cTheory of Codes with Maximum Rank Distance\u201d, Problems of Information Transmission, vol. 21, no. 1, pp. 1\u201312, July, 1985 (Russian Original, January\u2013March, 1985).","journal-title":"Problems of Information Transmission"},{"key":"41_CR2","series-title":"DSN Progress Report","first-page":"114","volume-title":"A Public-Key Cryptosystem Based on Algebraic Coding Theory","author":"R. J. McEliece","year":"1978","unstructured":"R. J. McEliece, \u201cA Public-Key Cryptosystem Based on Algebraic Coding Theory\u201d, pp. 114\u2013116 in DSN Progress Report 42-44, Jet Propulsion Lab., Pasadena, CA, January\u2013February, 1978."},{"key":"41_CR3","doi-asserted-by":"publisher","first-page":"384","DOI":"10.1109\/TIT.1978.1055873","volume":"IT-24","author":"E. R. Berlekamp","year":"1978","unstructured":"E. R. Berlekamp, R. J. McEliece and H. C. A. van Tilborg, \u201cOn the Inherent Intractability of Certain Coding Problems\u201d, IEEE Trans. Inf. Th., vol. IT-24, pp. 384\u2013386, May 1978.","journal-title":"IEEE Trans. Inf. Th."},{"key":"41_CR4","series-title":"Lecture Notes in Computer Sci","doi-asserted-by":"crossref","first-page":"224","DOI":"10.1007\/3-540-48184-2_20","volume-title":"Advances in Cryptology\u2014CRYPTO\u2019 87","author":"C. M. Adams","year":"1988","unstructured":"C. M. Adams and H. Meijer, \u201cSecurity-Related Comments Regarding McEliece\u2019s Public-Key Cryptosystem\u201d, pp. 224\u2013228 in Advances in Cryptology\u2014CRYPTO\u2019 87 (Ed. C. Pomerance), Lecture Notes in Computer Sci. No. 293. Heidelberg and New York: Springer-Verlag, 1988."},{"key":"41_CR5","series-title":"Lecture Notes in Computer Sci","doi-asserted-by":"crossref","first-page":"275","DOI":"10.1007\/3-540-45961-8_25","volume-title":"Advances in Cryptology\u2014EUROCRYPT\u2019 88","author":"P. J. Lee","year":"1988","unstructured":"P. J. Lee and E. F. Brickell, \u201cAn Observation on the Security of the McEliece Public-Key Cryptosystem\u201d, pp. 275\u2013280 in Advances in Cryptology\u2014EUROCRYPT\u2019 88 (Ed. C. G\u00fcnther), Lecture Notes in Computer Sci. No. 330. Heidelberg and New York: Springer-Verlag, 1988."},{"key":"41_CR6","series-title":"Lecture Notes in Computer Sci","doi-asserted-by":"publisher","first-page":"100","DOI":"10.1007\/0-387-34805-0_11","volume-title":"Advances in Cryptology\u2014CRYPTO\u2019 89","author":"U. M. Maurer","year":"1990","unstructured":"U. M. Maurer and J. L. Massey, \u201cPerfect Local Randomness in Pseudo-Random Sequences, pp. 100\u2013112 in Advances in Cryptology\u2014CRYPTO\u2019 89 (Ed. G. Brassard), Lecture Notes in Computer Sci. No. 435. Heidelberg and New York: Springer-Verlag, 1990."}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2014 EUROCRYPT \u201991"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-46416-6_41.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,17]],"date-time":"2020-11-17T21:11:33Z","timestamp":1605647493000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-46416-6_41"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540546207"],"references-count":6,"URL":"https:\/\/doi.org\/10.1007\/3-540-46416-6_41","relation":{},"subject":[]}}