{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T23:10:29Z","timestamp":1725664229778},"publisher-location":"Berlin, Heidelberg","reference-count":12,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540606932"},{"type":"electronic","value":"9783540492801"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1995]]},"DOI":"10.1007\/3-540-60693-9_24","type":"book-chapter","created":{"date-parts":[[2012,2,26]],"date-time":"2012-02-26T20:54:13Z","timestamp":1330289653000},"page":"205-212","source":"Crossref","is-referenced-by-count":2,"title":["A new algorithm for finding minimum-weight words in large linear codes"],"prefix":"10.1007","author":[{"given":"Anne","family":"Canteaut","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2005,6,7]]},"reference":[{"key":"24_CR1","unstructured":"A. Canteaut and H. Chabanne. A further improvement of the work factor in an attempt at breaking McEliece's cryptosystem. In P. Charpin, editor, EUROCODE 94, pages 163\u2013167. INRIA, 1994."},{"key":"24_CR2","volume-title":"Rapport interne du D\u00e9partement Math\u00e9matiques et Informatique LIENS-95-21","author":"A. Canteaut","year":"1995","unstructured":"A. Canteaut and F. Chabaud. Improvements of the attacks on cryptosystems based on error-correcting codes. Rapport interne du D\u00e9partement Math\u00e9matiques et Informatique LIENS-95-21, Ecole Normale Sup\u00e9rieure, Paris, July 1995."},{"key":"24_CR3","doi-asserted-by":"crossref","unstructured":"F. Chabaud. On the security of some cryptosystems based on error-correcting codes. In A. De Santis, editor, Advances in Cryptology \u2014 EUROCRYPT '94, number 950 in Lecture Notes in Computer Science, pages 131\u2013139. Springer-Verlag, 1995.","DOI":"10.1007\/BFb0053430"},{"key":"24_CR4","doi-asserted-by":"crossref","unstructured":"M. Girault. A (non-practical) three-pass identification protocol using coding theory. In J. Seberry and J. Pieprzyk, editors, Advances in Cryptology \u2014 AUSCRYPT '90, number 453 in Lecture Notes in Computer Science, pages 265\u2013272. Springer-Verlag, 1991.","DOI":"10.1007\/BFb0030367"},{"key":"24_CR5","doi-asserted-by":"crossref","unstructured":"P.J. Lee and E.F. Brickell. An observation on the security of McEliece's publickey cryptosystem. In C.G. G\u00fcnther, editor, Advances in Cryptology \u2014 EUROCRYPT '88, number 330 in Lecture Notes in Computer Science, pages 275\u2013280. Springer-Verlag, 1988.","DOI":"10.1007\/3-540-45961-8_25"},{"issue":"5","key":"24_CR6","doi-asserted-by":"publisher","first-page":"1354","DOI":"10.1109\/18.21270","volume":"IT-34","author":"J.S. Leon","year":"1988","unstructured":"J.S. Leon. A probabilistic algorithm for computing minimum weights of large errorcorrecting codes. IEEE Trans. Inform. Theory, IT-34(5): 1354\u20131359, September 1988.","journal-title":"IEEE Trans. Inform. Theory"},{"key":"24_CR7","first-page":"114","volume":"42\u201344","author":"R.J. McEliece","year":"1978","unstructured":"R.J. McEliece. A public-key cryptosystem based on algebraic coding theory. DSN progress report 42\u201344, pages 114\u2013116, 1978.","journal-title":"DSN progress report"},{"issue":"2","key":"24_CR8","first-page":"159","volume":"15","author":"H. Niederreiter","year":"1986","unstructured":"H. Niederreiter. Knapsack-type cryptosystems and algebraic coding theory. Problems of Control and Information Theory, 15(2): 159\u2013166, 1986.","journal-title":"Problems of Control and Information Theory"},{"key":"24_CR9","doi-asserted-by":"publisher","first-page":"193","DOI":"10.1016\/0012-365X(72)90033-7","volume":"3","author":"J.K. Omura","year":"1972","unstructured":"J.K. Omura. Iterative decoding of linear codes by a modulo-2 linear program. Discrete Math, 3:193\u2013208, 1972.","journal-title":"Discrete Math"},{"key":"24_CR10","doi-asserted-by":"crossref","unstructured":"J. Stern. A method for finding codewords of small weight. In G. Cohen and J. Wolfmann, editors, Coding Theory and Applications, number 388 in Lecture Notes in Computer Science, pages 106\u2013113. Springer-Verlag, 1989.","DOI":"10.1007\/BFb0019850"},{"key":"24_CR11","doi-asserted-by":"crossref","unstructured":"J. Stern. A new identification scheme based on syndrome decoding. In D.R. Stinson, editor, Advances in Cryptology \u2014 CRYPTO '93, number 773 in Lecture Notes in Computer Science. Springer-Verlag, 1994.","DOI":"10.1007\/3-540-48329-2_2"},{"key":"24_CR12","doi-asserted-by":"crossref","unstructured":"J. van Tilburg. On the McEliece public-key cryptosystem. In S. Goldwasser, editor, Advances in Cryptology \u2014 CRYPTO '88, number 403 in Lecture Notes in Computer Science, pages 119\u2013131. Springer-Verlag, 1990.","DOI":"10.1007\/0-387-34799-2_10"}],"container-title":["Lecture Notes in Computer Science","Cryptography and Coding"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-60693-9_24.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,17]],"date-time":"2020-11-17T21:01:31Z","timestamp":1605646891000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-60693-9_24"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1995]]},"ISBN":["9783540606932","9783540492801"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/3-540-60693-9_24","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[1995]]}}}