{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,12]],"date-time":"2025-10-12T06:06:22Z","timestamp":1760249182329},"publisher-location":"Berlin, Heidelberg","reference-count":8,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540534334"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/3-540-46885-4_58","type":"book-chapter","created":{"date-parts":[[2007,11,15]],"date-time":"2007-11-15T14:15:56Z","timestamp":1195136156000},"page":"617-625","source":"Crossref","is-referenced-by-count":26,"title":["A New Multiple Key Cipher and an Improved Voting Scheme"],"prefix":"10.1007","author":[{"given":"Colin","family":"Boyd","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"58_CR1","doi-asserted-by":"crossref","unstructured":"C.A. Boyd, Some Applications of Multiple Key Ciphers, Proceedings of Eurocrypt 88, Springer-Verlag, 1988.","DOI":"10.1007\/3-540-45961-8_40"},{"issue":"2","key":"58_CR2","doi-asserted-by":"publisher","first-page":"84","DOI":"10.1145\/358549.358563","volume":"24","author":"D.L. Chaum","year":"1981","unstructured":"D.L. Chaum, Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms, Comm.ACM, 24,2, (1981), 84\u201388.","journal-title":"Comm.ACM"},{"key":"58_CR3","doi-asserted-by":"crossref","unstructured":"D.L. Chaum, Elections with Unconditionally-Secret Ballots and Disruption Equivalent to Breaking RSA, Proceedings of Eurocrpyt 88, Springer-Verlag, 1988.","DOI":"10.1007\/3-540-45961-8_15"},{"issue":"1","key":"58_CR4","doi-asserted-by":"publisher","first-page":"65","DOI":"10.1007\/BF00206326","volume":"1","author":"D.L. Chaum","year":"1988","unstructured":"D.L. Chaum, The Dining Cryptographers Problem, Journal of Cryptology, 1,1, (1988), 65\u201375.","journal-title":"Journal of Cryptology"},{"key":"58_CR5","doi-asserted-by":"crossref","unstructured":"J.D. Cohen & M.J. Fischer, A Robust and Verifiable Cryptographically Secure Election Scheme, Proceedings of IEEE Conference on Foundations of Computer Science, 1985.","DOI":"10.1109\/SFCS.1985.2"},{"key":"58_CR6","doi-asserted-by":"crossref","unstructured":"W. Diffie & M. Hellman, New Directions in Cryptography, IEEE Transactions on Information Theory, IT-22,6, 1976.","DOI":"10.1109\/TIT.1976.1055638"},{"issue":"2","key":"58_CR7","doi-asserted-by":"publisher","first-page":"95","DOI":"10.1007\/BF02351718","volume":"1","author":"K.S. McCurley","year":"1988","unstructured":"K.S. McCurley, A Key Distribution System Equivalent to Factoring, Journal of Cryptology, 1,2, (1988), 95\u2013105.","journal-title":"Journal of Cryptology"},{"key":"58_CR8","doi-asserted-by":"crossref","unstructured":"S.C. Pohlig & M. Hellman, An Improved Algorithm for Computing Logarithms over GF(p) and Its Cryptographic Significance, IEEE Transactions on Information Theory, IT-24,1, 1978.","DOI":"10.1109\/TIT.1978.1055817"}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2014 EUROCRYPT \u201989"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-46885-4_58.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,17]],"date-time":"2020-11-17T21:13:39Z","timestamp":1605647619000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-46885-4_58"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540534334"],"references-count":8,"URL":"https:\/\/doi.org\/10.1007\/3-540-46885-4_58","relation":{},"subject":[]}}