{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,9]],"date-time":"2026-04-09T22:34:10Z","timestamp":1775774050236,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":9,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540546207","type":"print"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/3-540-46416-6_46","type":"book-chapter","created":{"date-parts":[[2007,8,6]],"date-time":"2007-08-06T18:02:07Z","timestamp":1186423327000},"page":"517-521","source":"Crossref","is-referenced-by-count":14,"title":["Equivalent Goppa Codes and Trapdoors to McEliece\u2019s Public Key Cryptosystem"],"prefix":"10.1007","author":[{"given":"J. K.","family":"Gibson","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"46_CR1","series-title":"Lect Notes Comput Sci","volume-title":"Eurocrypt 87","author":"C.M. Adams","year":"1987","unstructured":"ADAMS C.M. and MEIJER H. \u2018Security Related Comments Regarding McEliece\u2019s Public-Key Cryptosystem\u2019. Lecture Notes in Computer Science vol 293, Eurocrypt 87. Springer-Verlag 1987."},{"key":"46_CR2","series-title":"Lect Notes Comput Sci","volume-title":"Crypto 84","author":"E. F. Brickell","year":"1984","unstructured":"BRICKELL E. F. \u2018Breaking Iterated Knapsacks\u2019. Lecture Notes in Computer Science vol 196, Crypto 84. Springer-Verlag 1984."},{"key":"46_CR3","unstructured":"GABIDULIN E.M. \u2018Ideals over a Non-Commutative Ring and their Applications in Cryptography\u2019. These Proceedings."},{"key":"46_CR4","unstructured":"HEIMAN R. \u2018On the Security of Cryptosystems Based on Linear Error Correcting Codes\u2019. MSc. Thesis, Feinberg Graduate School of the Weizmann Institute of Science. August 1987."},{"key":"46_CR5","unstructured":"KORZHIK V.I. and TURKIN A.I. \u2018Cryptanalysis of McEliece\u2019s Public Key Cryptosystem\u2019. These Proceedings."},{"key":"46_CR6","series-title":"Lect Notes Comput Sci","volume-title":"Eurocrypt 88","author":"P.J. Lee","year":"1988","unstructured":"LEE P.J. and BRICKELL E.F. \u2018An Observation on the Security of McEliece\u2019s Public Key Cryptosystem\u2019. Lecture Notes in Computer Science vol 330, Eurocrypt 88, Springer-Verlag 1988."},{"key":"46_CR7","unstructured":"McELIECE R. J. \u2018A Public Key Cryptosystem Based on Algebraic Coding Theory\u2019. DSN Progress Report (Jan,Feb). Jet Propulsion Lab., Calif. Inst. Tech. 1978."},{"key":"46_CR8","unstructured":"McWILLIAMS F.J. and SLOANE N. J. \u2018The Theory of Error Correcting Codes\u2019. North Holland Publishing Co. 1977."},{"key":"46_CR9","unstructured":"Van TILBURG J. \u2018On the McEliece Public Key Cryptosystem.\u2019 Lect. Notes in Comp. Sc. vol 403, Crypto 88. Springer-Verlag 1988."}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2014 EUROCRYPT \u201991"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-46416-6_46.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,17]],"date-time":"2020-11-17T21:11:36Z","timestamp":1605647496000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-46416-6_46"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540546207"],"references-count":9,"URL":"https:\/\/doi.org\/10.1007\/3-540-46416-6_46","relation":{},"subject":[]}}