{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T11:09:27Z","timestamp":1742987367570,"version":"3.40.3"},"publisher-location":"Boston, MA","reference-count":6,"publisher":"Springer US","isbn-type":[{"type":"print","value":"9781441959058"},{"type":"electronic","value":"9781441959065"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-1-4419-5906-5_467","type":"book-chapter","created":{"date-parts":[[2011,10,27]],"date-time":"2011-10-27T13:50:33Z","timestamp":1319723433000},"page":"887-888","source":"Crossref","is-referenced-by-count":1,"title":["One-Way Function"],"prefix":"10.1007","author":[{"given":"Matthew J. B.","family":"Robshaw","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"467_CR1_467","doi-asserted-by":"crossref","unstructured":"Diffie W, Hellman ME (1976) New directions in cryptography. IEEE T Info Theory IT-22(6):644\u2013654","DOI":"10.1109\/TIT.1976.1055638"},{"key":"467_CR2_467","volume-title":"Computers and intractability: a guide to the theory of NP-completeness","author":"MR Garey","year":"1979","unstructured":"Garey MR, Johnson DS (1979) Computers and intractability: a guide to the theory of NP-completeness. W. Freeman, San Francisco"},{"key":"467_CR3_467","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-662-12521-2","volume-title":"Modern cryptography, probabilistic proofs and pseudorandomness","author":"O Goldreich","year":"1999","unstructured":"Goldreich O (1999) Modern cryptography, probabilistic proofs and pseudorandomness. Springer, Berlin"},{"key":"467_CR4_467","volume-title":"Handbook of applied cryptography","author":"AJ Menezes","year":"1997","unstructured":"Menezes AJ, van Oorschot PC, Vanstone SA (1997) Handbook of applied cryptography. CRC, Boca Raton"},{"key":"467_CR5_467","doi-asserted-by":"publisher","first-page":"993","DOI":"10.1145\/359657.359659","volume":"21","author":"RM Needham","year":"1978","unstructured":"Needham RM, Schroeder MD (1978) Using encryption for authentication in large networks of computers. Commun ACM 21:993\u2013999","journal-title":"Commun ACM"},{"key":"467_CR6_467","first-page":"80","volume-title":"Proceedings of the IEEE 23rd annual symposium on foundations of computer science","author":"AC Yao","year":"1982","unstructured":"Yao AC (1982) Theory and applications of trapdoor functions. In: Proceedings of the IEEE 23rd annual symposium on foundations of computer science, Chicago, pp\u00a080\u201391"}],"container-title":["Encyclopedia of Cryptography and Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-1-4419-5906-5_467","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,6,2]],"date-time":"2020-06-02T00:04:17Z","timestamp":1591056257000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-1-4419-5906-5_467"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9781441959058","9781441959065"],"references-count":6,"URL":"https:\/\/doi.org\/10.1007\/978-1-4419-5906-5_467","relation":{},"subject":[],"published":{"date-parts":[[2011]]}}}