{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T00:20:19Z","timestamp":1725495619192},"publisher-location":"Berlin, Heidelberg","reference-count":10,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540534334"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/3-540-46885-4_63","type":"book-chapter","created":{"date-parts":[[2007,11,15]],"date-time":"2007-11-15T09:15:56Z","timestamp":1195118156000},"page":"657-661","source":"Crossref","is-referenced-by-count":0,"title":["Private-Key Algebraic-Code Cryptosystems with High Information Rates"],"prefix":"10.1007","author":[{"given":"Tzonelih","family":"Hwang","sequence":"first","affiliation":[]},{"given":"T. R. N.","family":"Rao","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"63_CR1","unstructured":"Dorothy E. Denning, Cryptography and Data Security, Addison Wesley, 1982."},{"key":"63_CR2","unstructured":"W.F. Denny and T.R.N. Rao, \u201cEncryptions Using Linear and Nonlinear Codes: Implementation and Security Considerations\u201d, Ph.D Dissertation, Univ. of SW Louisiana, Spring 1988."},{"key":"63_CR3","unstructured":"Tzonelih Hwang, Secret Error-Correcting Codes and Algebraic-Code Cryptosystems, Ph.D. Dissertation, Univ. of SW Louisiana, Summer, 1988."},{"key":"63_CR4","unstructured":"R.J. McEliece, \u201cA Public-Key Cryptosystem Based on Algebraic Coding Theory\u201d, DSN Progress Report, Jet Propulsion Laboratory, CA., Jan. & Feb. 1978, pp 42\u201344."},{"key":"63_CR5","unstructured":"\u201cData Encryption Standard\u201d, FIPS PUB 46, National Bureau of Standard, Washington, D.C., Jan. 1977."},{"key":"63_CR6","first-page":"35","volume-title":"Advances in CRYPTO 86","author":"T.R.N. Rao","year":"1987","unstructured":"T.R.N. Rao and K.H. Nam \u201cA Private-Key Algebraic-Code Cryptosystem,\u201d Advances in CRYPTO 86, editor A.M. Odlyzko, New York, Springler Verlag, pp. 35\u201348, 1987."},{"key":"63_CR7","doi-asserted-by":"crossref","unstructured":"T.R.N. Rao and E. Fujiwara, Error Control Coding for Computer Systems, Prentice Hall, 1989.","DOI":"10.1016\/B978-0-12-370720-8.50011-8"},{"key":"63_CR8","doi-asserted-by":"crossref","unstructured":"D.R. Stinson, \u201cSome Construction and Bounds for Authentication Codes,\u201d Journal of Cryptology, Vol. 1, No. 1, 1988.","DOI":"10.1007\/BF00206324"},{"key":"63_CR9","unstructured":"R. Struik and van Tilburg J., \u201cThe Rao-Nam Scheme is Insecure Against a Chosen-plaintext Attack,\u201d CRYPTO\u2019 87."},{"key":"63_CR10","unstructured":"J. van Tilburg, \u201cOn the McEliece Public-key Cryptosystem,\u201d a paper presented in CRYPTO\u2019 88, to appear."}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2014 EUROCRYPT \u201989"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-46885-4_63.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,5,14]],"date-time":"2023-05-14T14:57:22Z","timestamp":1684076242000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-46885-4_63"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540534334"],"references-count":10,"URL":"https:\/\/doi.org\/10.1007\/3-540-46885-4_63","relation":{},"subject":[]}}