{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T14:45:43Z","timestamp":1742913943374,"version":"3.40.3"},"publisher-location":"Cham","reference-count":7,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319018539"},{"type":"electronic","value":"9783319018546"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-01854-6_52","type":"book-chapter","created":{"date-parts":[[2013,8,8]],"date-time":"2013-08-08T06:47:25Z","timestamp":1375944445000},"page":"509-516","source":"Crossref","is-referenced-by-count":0,"title":["Cryptanalysis of the Improvement of an Authentication Scheme Based on the Chinese Remainder Theorem for Multicast Communications"],"prefix":"10.1007","author":[{"given":"Alberto","family":"Peinado","sequence":"first","affiliation":[]},{"given":"Andr\u00e9s","family":"Ortiz","sequence":"additional","affiliation":[]},{"given":"Guillermo","family":"Cotrina","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"unstructured":"Naranjo, J.A.M., L\u00f3pez-Ramos, J.A., Casado, L.G.: Applications of the Extended Euclidean Algorithm to Privacy and Secure Communications. In: Proc. of 10th International Conference on Computational and Mathematical Methods in Science and Engineering (2010)","key":"52_CR1"},{"unstructured":"Naranjo, J.A.M., L\u00f3pez-Ramos, J.A., Casado, L.G.: Key Refreshment in overlay networks: a centralized secure multicast scheme proposal. In: XXI Jornadas de Paralelismo, Valencia, Spain, pp. 931\u2013938 (2010)","key":"52_CR2"},{"key":"52_CR3","series-title":"AISC","doi-asserted-by":"crossref","first-page":"223","DOI":"10.1007\/978-3-642-16626-6_24","volume-title":"Computational Intelligence in Security for Information Systems 2010","author":"J.\u00c1.M. Naranjo","year":"2010","unstructured":"Naranjo, J.\u00c1.M., Ramos, J.A.L., Casado, L.G.: A Key Distribution scheme for Live Streaming Multi-tree Overlays. In: Herrero, \u00c1., Corchado, E., Redondo, C., Alonso, \u00c1. (eds.) Computational Intelligence in Security for Information Systems 2010. AISC, vol.\u00a085, pp. 223\u2013230. Springer, Heidelberg (2010)"},{"unstructured":"Menezes, A., Oorschot, P., Vanstone, S.: Handbook of applied cryptography. CRC Press (1996)","key":"52_CR4"},{"key":"52_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"177","DOI":"10.1007\/978-3-642-21323-6_22","volume-title":"Computational Intelligence in Security for Information Systems","author":"A. Peinado","year":"2011","unstructured":"Peinado, A., Ortiz, A.: Cryptanalysis of Multicast protocols with Key Refreshment based on the Extended Euclidean Algorithm. In: Herrero, \u00c1., Corchado, E. (eds.) CISIS 2011. LNCS, vol.\u00a06694, pp. 177\u2013182. Springer, Heidelberg (2011)"},{"doi-asserted-by":"crossref","unstructured":"Peinado, A., Ortiz, A.: Cryptanalysis of a Key Refreshment Scheme for Multicast protocols by means of Genetic Algorithm. Logic Journal of the IGPL (August 2012), doi:10.1093\/jigpal\/jzs031","key":"52_CR6","DOI":"10.1093\/jigpal\/jzs031"},{"doi-asserted-by":"crossref","unstructured":"Antequera, N., L\u00f3pez-Ramos, J.A.: Remarks and countermeasures on a cryptanalysis of a secure multicast protocol. In: Proc. 7th International Conference on Next Generation Web Services Practices, pp. 210\u2013214 (2011)","key":"52_CR7","DOI":"10.1109\/NWeSP.2011.6088179"}],"container-title":["Advances in Intelligent Systems and Computing","International Joint Conference SOCO\u201913-CISIS\u201913-ICEUTE\u201913"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-01854-6_52","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,20]],"date-time":"2023-01-20T09:26:25Z","timestamp":1674206785000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-01854-6_52"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319018539","9783319018546"],"references-count":7,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-01854-6_52","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2014]]}}}