{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T04:05:03Z","timestamp":1742961903611,"version":"3.40.3"},"publisher-location":"Cham","reference-count":12,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319172958"},{"type":"electronic","value":"9783319172965"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-17296-5_31","type":"book-chapter","created":{"date-parts":[[2015,7,24]],"date-time":"2015-07-24T14:30:01Z","timestamp":1437748201000},"page":"291-296","source":"Crossref","is-referenced-by-count":1,"title":["New Variant of the McEliece Cryptosystem"],"prefix":"10.1007","author":[{"given":"Hamza","family":"Moufek","sequence":"first","affiliation":[]},{"given":"Kenza","family":"Guenda","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"31_CR1","doi-asserted-by":"crossref","unstructured":"Barbier, M., Baretto, P.S.L.M.: Key reduction of McEliece\u2019s cryptosystem using list decoding. In: International Symposium of Information Theory ISIT 2011, Saint-Pettersburg (2011)","DOI":"10.1109\/ISIT.2011.6034058"},{"key":"31_CR2","doi-asserted-by":"crossref","unstructured":"Berger, T.P., Cayrel, P.L., Gaborit, P., Otmani, A.: Reducing key length of the McEliece cryptosystem. In: Preneel, B. (Ed.) AFRICACRYPT 2009, Gammarth. Volume 5580 of Lecture Notes in Computer Science, pp.\u00a077\u201397. Springer Berlin\/Heidelberg (2009)","DOI":"10.1007\/978-3-642-02384-2_6"},{"key":"31_CR3","doi-asserted-by":"crossref","unstructured":"Berson, T.A.: Failure of the McEliece public-key cryptosystem under message-resend and related-message attack. In: Kaliski, B.S., Jr. (ed.) Advances in Cryptology-CRYPTO \u201997, Santa Barbara, California, USA, 17\u201321 Aug 1997. Volume 1294 of Lecture Notes in Computer Science, pp.\u00a0213\u2013220. Springer (1997)","DOI":"10.1007\/BFb0052237"},{"issue":"1","key":"31_CR4","doi-asserted-by":"publisher","first-page":"367","DOI":"10.1109\/18.651067","volume":"44","author":"A. Canteaut","year":"1998","unstructured":"Canteaut, A., Chabaud, F.: A new algorithm for finding minimum-weight words in a linear code: application to McEliece\u2019s cryptosystem and to narrow-sense BCH codes of length 511. IEEE Trans. Inf. Theory 44(1), 367\u2013378 (1998)","journal-title":"IEEE Trans. Inf. Theory"},{"key":"31_CR5","doi-asserted-by":"publisher","DOI":"10.1109\/9780470544693","volume-title":"Fundamentals of Convolutional Coding","author":"R. Johannesson","year":"1999","unstructured":"Johannesson, R., SZigangirov, K.: Fundamentals of Convolutional Coding. IEEE, New York (1999)"},{"issue":"5","key":"31_CR6","doi-asserted-by":"publisher","first-page":"993","DOI":"10.1016\/j.compeleceng.2010.02.004","volume":"36","author":"A. Kanso","year":"2010","unstructured":"Kanso, A.: Modified self-shrinking generator. Comput. Electr. Eng. 36(5), 993\u20131001 (2010)","journal-title":"Comput. Electr. Eng."},{"key":"31_CR7","first-page":"102","volume-title":"PQCrypto 2013. Lecture Notes in Computer Science","author":"G. Landais","year":"2013","unstructured":"Landais, G., Tillich, J.P.: An efficient attack of a McEliece cryptosystem variant based on convolutional codes. In: Gaborit, P. (ed.) PQCrypto 2013. Lecture Notes in Computer Science, vol.\u00a07932, pp.\u00a0102\u2013117. Springer, Berlin\/Heidelberg (2013)"},{"key":"31_CR8","doi-asserted-by":"crossref","unstructured":"Londahl, C., Johansson, T.: A new version of McEliece PKC based on convolutional codes. In: International Conference on Information and Communications Security ICICS 2012, Hong-Kong, Oct 2012","DOI":"10.1007\/978-3-642-34129-8_45"},{"issue":"2","key":"31_CR9","doi-asserted-by":"publisher","first-page":"122","DOI":"10.1049\/iet-spr.2010.0343","volume":"6","author":"M. Marazin","year":"2012","unstructured":"Marazin, M., Gautier, R., Burel, G.: Algebraic method for blind recovery of punctured convolutional encoders from an erroneous bitstream. IET Signal Process, 6(2), 122\u2013131 (2012)","journal-title":"IET Signal Process"},{"key":"31_CR10","first-page":"114","volume":"42\u201344","author":"R.J. McEliece","year":"1978","unstructured":"McEliece, R.J.: A public-key cryptosystem based on algebraic coding theory. DSN Progress Report 42\u201344, pp.\u00a0114\u2013116 (1978)","journal-title":"DSN Progress Report"},{"key":"31_CR11","doi-asserted-by":"publisher","first-page":"205","DOI":"10.1007\/BFb0053436","volume-title":"Advances in Cryptology, Eurocrypt 94. Lecture Note in Computer Science","author":"W. Meier","year":"1995","unstructured":"Meier, W., Statfelbach, O.: The self-shrinking generator. In: De Santis, A. (ed.) Advances in Cryptology, Eurocrypt 94. Lecture Note in Computer Science, vol.\u00a0950, pp.\u00a0205\u2013214. Springer, Berlin (1995)"},{"key":"31_CR12","doi-asserted-by":"crossref","unstructured":"Wieschebrink, C.: Two NP-complete problems in coding theory with an application in code based cryptography. In: International Symposium on Information Theory (ISIT06), Seattle, July 2006","DOI":"10.1109\/ISIT.2006.261651"}],"container-title":["CIM Series in Mathematical Sciences","Coding Theory and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-17296-5_31","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,8]],"date-time":"2023-02-08T14:56:22Z","timestamp":1675868182000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-17296-5_31"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319172958","9783319172965"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-17296-5_31","relation":{},"ISSN":["2364-950X","2364-9518"],"issn-type":[{"type":"print","value":"2364-950X"},{"type":"electronic","value":"2364-9518"}],"subject":[],"published":{"date-parts":[[2015]]}}}