{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T23:09:12Z","timestamp":1725664152345},"publisher-location":"Berlin, Heidelberg","reference-count":4,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540582656"},{"type":"electronic","value":"9783540485889"}],"license":[{"start":{"date-parts":[[1994,1,1]],"date-time":"1994-01-01T00:00:00Z","timestamp":757382400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1994]]},"DOI":"10.1007\/3-540-58265-7_4","type":"book-chapter","created":{"date-parts":[[2012,2,26]],"date-time":"2012-02-26T10:41:58Z","timestamp":1330252918000},"page":"25-32","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["How to avoid the Sidel'nikov-Shestakov attack"],"prefix":"10.1007","author":[{"given":"Ernst M.","family":"Gabidulin","sequence":"first","affiliation":[]},{"given":"Olaf","family":"Kjelsen","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2005,6,1]]},"reference":[{"key":"4_CR1","first-page":"19","volume":"15","author":"H. Niederreiter","year":"1986","unstructured":"H. Niederreiter, \u201cKnapsack-Type Cryptosystem and Algebraic Coding Theory,\u201d Probl.Control and Inform. Theory, vol.15, pp.19\u201334, 1986.","journal-title":"Probl.Control and Inform. Theory"},{"issue":"no.4","key":"4_CR2","first-page":"439","volume":"1","author":"V.M. Sidelnikov","year":"1992","unstructured":"V.M. Sidelnikov and S.O. Shestakov, \u201cOn the Insecurity of Cryptosystems Based on Generalized Reed-Solomon Codes,\u201d Discrete Math., vol. 1,no. 4, pp. 439\u2013444, 1992.","journal-title":"Discrete Math."},{"key":"4_CR3","first-page":"48","volume-title":"the Report Prospective Telecommunication and Integrated Communication Systems","author":"V.M. Sidelnikov","year":"1992","unstructured":"V.M. Sidelnikov and S.O. Shestakov, \u201cOn the Cryptosystem Based on Generalized Reed-Solomon Codes,\u201d in the Report Prospective Telecommunication and Integrated Communication Systems, Institute for Problems of Information Transmission, Russian Academy of Science, Moscow, 1992, pp. 48\u201361 (in Russian)."},{"key":"4_CR4","volume-title":"The Theory of Error-Correcting Codes","author":"F.J. MacWilliams","year":"1977","unstructured":"F.J. MacWilliams and N.J.A. Sloane, The Theory of Error-Correcting Codes, North-Holland Publishing Company, New-York, 1977."}],"container-title":["Lecture Notes in Computer Science","Error Control, Cryptology, and Speech Compression"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-58265-7_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,19]],"date-time":"2019-05-19T08:50:22Z","timestamp":1558255822000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-58265-7_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1994]]},"ISBN":["9783540582656","9783540485889"],"references-count":4,"URL":"https:\/\/doi.org\/10.1007\/3-540-58265-7_4","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[1994]]},"assertion":[{"value":"1 June 2005","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}