{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,26]],"date-time":"2025-10-26T21:14:38Z","timestamp":1761513278896},"publisher-location":"Boston, MA","reference-count":8,"publisher":"Springer US","isbn-type":[{"type":"print","value":"9781475706048"},{"type":"electronic","value":"9781475706024"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1983]]},"DOI":"10.1007\/978-1-4757-0602-4_26","type":"book-chapter","created":{"date-parts":[[2013,4,16]],"date-time":"2013-04-16T21:14:41Z","timestamp":1366146881000},"page":"267-275","source":"Crossref","is-referenced-by-count":80,"title":["Quantum Cryptography, or Unforgeable Subway Tokens"],"prefix":"10.1007","author":[{"given":"Charles H.","family":"Bennett","sequence":"first","affiliation":[]},{"given":"Gilles","family":"Brassard","sequence":"additional","affiliation":[]},{"given":"Seth","family":"Breidbart","sequence":"additional","affiliation":[]},{"given":"Stephen","family":"Wiesner","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"26_CR1","doi-asserted-by":"crossref","unstructured":"W. Diffie and M.E. Hellman, New Directions in Cryptography, IEEE Trans. Info. Th., IT-22: 644 (1976).","DOI":"10.1109\/TIT.1976.1055638"},{"key":"26_CR2","first-page":"120","volume":"21","author":"RL Rivest","year":"1978","unstructured":"R.L. Rivest, A. Shamir and L. Adleman, On Digital Signatures and Public-Key Cryptosystems, CACM, 21: 120 (1978).","journal-title":"On Digital Signatures and Public-Key Cryptosystems, CACM"},{"key":"26_CR3","first-page":"694","volume":"208","author":"GB Kolata","year":"1980","unstructured":"G.B. Kolata, New Codes Coming into Use, Science Magazine 208: 694 (1980).","journal-title":"New Codes Coming into Use, Science Magazine"},{"key":"26_CR4","volume-title":"Oxford University Press","author":"PAM Dirac","year":"1958","unstructured":"P.A.M. Dirac, \u201cThe Principles of Quantum Mechanics, 4th edition,\u201d Oxford University Press (1958)."},{"key":"26_CR5","volume-title":"Computationally Secure Authentication Tags Requiring Short Secret Shared Keys, in: \u201cAdvances in Cryptography: Proceedings of CRYPTO 82,\u201d R. Rivest, ed.","author":"G Brassard","year":"1983","unstructured":"G. Brassard, Computationally Secure Authentication Tags Requiring Short Secret Shared Keys, in: \u201cAdvances in Cryptography: Proceedings of CRYPTO 82,\u201d R. Rivest, ed., Plenum Press, New York (1983)."},{"key":"26_CR6","volume-title":"New York","author":"M Blum","year":"1982","unstructured":"M. Blum, Coin Flipping by telephone: A Protocol for Solving Impossible Problems, in: \u201cProceedings of 24th Compcon,\u201d IEEE, New York (1982)."},{"key":"26_CR7","volume-title":"Digitalized Signatures and Public-Key Functions as Intractable as Factorization MIT\/LCS\/TR-212","author":"MO Rabin","year":"1979","unstructured":"M.O. Rabin, Digitalized Signatures and Public-Key Functions as Intractable as Factorization, MIT\/LCS\/TR-212 (1979)."},{"key":"26_CR8","unstructured":"D. Chaum, personal communication (1982)."}],"container-title":["Advances in Cryptology"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-1-4757-0602-4_26","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,12]],"date-time":"2019-05-12T09:49:06Z","timestamp":1557654546000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-1-4757-0602-4_26"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1983]]},"ISBN":["9781475706048","9781475706024"],"references-count":8,"URL":"https:\/\/doi.org\/10.1007\/978-1-4757-0602-4_26","relation":{},"subject":[],"published":{"date-parts":[[1983]]}}}