{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T14:27:32Z","timestamp":1743085652716,"version":"3.40.3"},"publisher-location":"Boston, MA","reference-count":5,"publisher":"Springer US","isbn-type":[{"type":"print","value":"9781441959058"},{"type":"electronic","value":"9781441959065"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-1-4419-5906-5_482","type":"book-chapter","created":{"date-parts":[[2011,10,27]],"date-time":"2011-10-27T13:50:45Z","timestamp":1319723445000},"page":"1317-1318","source":"Crossref","is-referenced-by-count":0,"title":["Trapdoor One-Way Function"],"prefix":"10.1007","author":[{"given":"Matthew J. B.","family":"Robshaw","sequence":"first","affiliation":[]}],"member":"297","reference":[{"doi-asserted-by":"crossref","unstructured":"Diffie W, Hellman ME (1976) New directions in cryptography. IEEE T Info Theory IT-22(6):644\u2013654","key":"482_CR1_482","DOI":"10.1109\/TIT.1976.1055638"},{"key":"482_CR2_482","volume-title":"Handbook of applied cryptography","author":"AJ Menezes","year":"1997","unstructured":"Menezes AJ, van Oorschot PC, Vanstone SA (1997) Handbook of applied cryptography. CRC Press, Boca Raton"},{"key":"482_CR3_482","doi-asserted-by":"publisher","first-page":"525","DOI":"10.1109\/TIT.1978.1055927","volume":"24","author":"RC Merkle","year":"1978","unstructured":"Merkle RC, Hellman ME (1978) Hiding information and signatures in trap door knapsacks. IEEE T Info Theory 24:525\u2013530","journal-title":"IEEE T Info Theory"},{"key":"482_CR4_482","doi-asserted-by":"publisher","first-page":"120","DOI":"10.1145\/359340.359342","volume":"21","author":"RL Rivest","year":"1978","unstructured":"Rivest RL, Shamir A, Adleman LM (1978) A method for obtaining digital signatures and public-key cryptosystems. Commun ACM 21:120\u2013126","journal-title":"Commun ACM"},{"doi-asserted-by":"crossref","unstructured":"Yao AC (1982) Theory and applications of trapdoor functions. In: Proceedings of the IEEE 23rd annual symposium on foundations of computer science, Chicago, pp\u00a080\u201391","key":"482_CR5_482","DOI":"10.1109\/SFCS.1982.45"}],"container-title":["Encyclopedia of Cryptography and Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-1-4419-5906-5_482","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,6,2]],"date-time":"2020-06-02T00:20:14Z","timestamp":1591057214000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-1-4419-5906-5_482"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9781441959058","9781441959065"],"references-count":5,"URL":"https:\/\/doi.org\/10.1007\/978-1-4419-5906-5_482","relation":{},"subject":[],"published":{"date-parts":[[2011]]}}}