{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,7]],"date-time":"2026-05-07T04:24:45Z","timestamp":1778127885042,"version":"3.51.4"},"publisher-location":"Berlin, Heidelberg","reference-count":13,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540611868","type":"print"},{"value":"9783540683391","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1996]]},"DOI":"10.1007\/3-540-68339-9_19","type":"book-chapter","created":{"date-parts":[[2007,8,6]],"date-time":"2007-08-06T01:31:14Z","timestamp":1186363874000},"page":"212-223","source":"Crossref","is-referenced-by-count":35,"title":["The Security of the Gabidulin Public Key Cryptosystem"],"prefix":"10.1007","author":[{"given":"Keith","family":"Gibson","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2001,7,13]]},"reference":[{"key":"19_CR1","doi-asserted-by":"crossref","unstructured":"BRASSARD, G. \u201cA Note on the Complexity of Cryptography.\u201d IEEE Transactions on Information Theory, Vol IT-25, no. 2, 1979.","DOI":"10.1109\/TIT.1979.1056010"},{"key":"19_CR2","unstructured":"BURDEN R.L., FAIRES J.D., and REYNOLDS A.C. \u201cNumerical Analysis.\u201d 2nd. Ed., Prindle, Weber, and Schmidt, 1981. Page 458."},{"key":"19_CR3","unstructured":"GABIDULIN E.M. \u201cTheory of Codes with Maximum Rank Distance.\u201d Problems of Information Transmission, Vol 21 no. 1, 1985."},{"key":"19_CR4","series-title":"Lect Notes Comput Sci","volume-title":"Proc. Eurocrypt 91","author":"E.M. Gabidulin","year":"1991","unstructured":"GABIDULIN E.M. \u201cIdeals Over a Non-Commutative Ring and their Applications in Cryptography.\u201d Lecture Notes in Computer Science Vol 547, Proc. Eurocrypt 91, Springer Verlag, 1991."},{"key":"19_CR5","series-title":"Lect Notes Comput Sci","volume-title":"A Fast Matrix Decoding Algorithm for Rank-Error-Correcting Codes","author":"E.M. Gabidulin","year":"1992","unstructured":"GABIDULIN E.M. \u201cA Fast Matrix Decoding Algorithm for Rank-Error-Correcting Codes.\u201d Lecture Notes in Computer Science Vol 573, Algebraic Coding, Springer Verlag, 1992."},{"key":"19_CR6","unstructured":"GABIDULIN E.M. \u201cOn Public-Key Cryptosystems Based on Linear Codes: Efficiency and Weakness.\u201d Codes and Ciphers, Proc. 4th IMA Conference on Cryptography and Coding, 1993. IMA Press, 1995."},{"key":"19_CR7","doi-asserted-by":"crossref","unstructured":"GIBSON J.K. \u201cSeverely Denting the Gabidulin Version of the McEliece Public Key Cryptosystem.\u201d Designs, Codes, and Cryptography, Vol 6, 1995.","DOI":"10.1007\/BF01390769"},{"key":"19_CR8","unstructured":"GIBSON J.K. \u201cAlgebraic Coded Cryptosystems\u201d. PhD Thesis, Univ. of London, 1996."},{"key":"19_CR9","doi-asserted-by":"crossref","unstructured":"GOLDREICH O., IMPAGLIAZZO R., LEVIN L., VENKATESAN R., and ZUCKERMAN D. \u201cSecurity Preserving Amplification of Hardness.\u201d Proc. of the 31st Annual Symposium on the Foundations of Computer Science (FOCS), 1990.","DOI":"10.1109\/FSCS.1990.89550"},{"key":"19_CR10","unstructured":"McELIECE R.J. \u201cA Public Key Cryptosystem Based on Algebraic Coding Theory\u201d. DSN Progress Report (Jan\u2013Feb), Jet Propulsion Laboratory, California Institute of Technology, 1978."},{"key":"19_CR11","unstructured":"NIEDERREITER H. \u201cKnapsack-Type Cryptosystems and Algebraic Coding Theory.\u201d Problems of Control and Information Theory, Vol 15 no. 2, 1986."},{"key":"19_CR12","doi-asserted-by":"crossref","unstructured":"SIDELNIKOV V.M. \u201cA Public-Key Cryptosystem Based on Binary Reed-Muller Codes.\u201d Discrete Mathematics and Applications, Vol 4, no. 3, 1994.","DOI":"10.1515\/dma.1994.4.3.191"},{"key":"19_CR13","doi-asserted-by":"crossref","unstructured":"SIDELNIKOV V.M. and SHESTAKOV S.O. \u201cOn Insecurity of Cryptosystems Based on Generalised Reed-Solomon Codes.\u201d Discrete Mathematics and Applications, Vol 2, no. 4, 1992.","DOI":"10.1515\/dma.1992.2.4.439"}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2014 EUROCRYPT \u201996"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-68339-9_19","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,1]],"date-time":"2019-05-01T19:33:02Z","timestamp":1556739182000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-68339-9_19"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1996]]},"ISBN":["9783540611868","9783540683391"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/3-540-68339-9_19","relation":{},"ISSN":["0302-9743"],"issn-type":[{"value":"0302-9743","type":"print"}],"subject":[],"published":{"date-parts":[[1996]]}}}