{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T05:00:57Z","timestamp":1725858057290},"publisher-location":"Cham","reference-count":12,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319401881"},{"type":"electronic","value":"9783319401898"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-40189-8_11","type":"book-chapter","created":{"date-parts":[[2016,6,13]],"date-time":"2016-06-13T11:34:07Z","timestamp":1465817647000},"page":"105-114","source":"Crossref","is-referenced-by-count":0,"title":["Semantic Security and Key-Privacy with Random Split of St-Gen Codes"],"prefix":"10.1007","author":[{"given":"Danilo","family":"Gligoroski","sequence":"first","affiliation":[]},{"given":"Simona","family":"Samardjiska","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,6,14]]},"reference":[{"key":"11_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"566","DOI":"10.1007\/3-540-45682-1_33","volume-title":"Advances in Cryptology - ASIACRYPT 2001","author":"M Bellare","year":"2001","unstructured":"Bellare, M., Boldyreva, A., Desai, A., Pointcheval, D.: Key-privacy in public-key encryption. In: Boyd, C. (ed.) ASIACRYPT 2001. LNCS, vol. 2248, p. 566. Springer, Heidelberg (2001)"},{"key":"11_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"26","DOI":"10.1007\/BFb0055718","volume-title":"Advances in Cryptology - CRYPTO 1998","author":"M Bellare","year":"1998","unstructured":"Bellare, M., Desai, A., Pointcheval, D., Rogaway, P.: Relations among notions of security for public-key encryption schemes. In: Krawczyk, H. (ed.) CRYPTO 1998. LNCS, vol. 1462, p. 26. Springer, Heidelberg (1998)"},{"key":"11_CR3","unstructured":"Gligoroski, D., Samardjiska, S., Jacobsen, H., Bezzateev, S.: McEliece in the world of Escher. Cryptology ePrint Archive: Report 2014\/360 (2014). http:\/\/eprint.iacr.org\/"},{"issue":"2","key":"11_CR4","doi-asserted-by":"crossref","first-page":"270","DOI":"10.1016\/0022-0000(84)90070-9","volume":"28","author":"S Goldwasser","year":"1984","unstructured":"Goldwasser, S., Micali, S.: Probabilistic encryption. J. Comput. Syst. Sci. 28(2), 270\u2013299 (1984)","journal-title":"J. Comput. Syst. Sci."},{"key":"11_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"19","DOI":"10.1007\/3-540-44586-2_2","volume-title":"Public Key Cryptography","author":"K Kobara","year":"2001","unstructured":"Kobara, K., Imai, H.: Semantically secure McEliece public-key cryptosystems -conversions for McEliece PKC. In: Kim, K. (ed.) PKC 2001. LNCS, vol. 1992, pp. 19\u201335. Springer, Heidelberg (2001)"},{"key":"11_CR6","unstructured":"McEliece, R.J.: A Public-Key System Based on Algebraic Coding Theory, pp. 114\u2013116. Jet Propulsion Lab (1978). DSN Progress Report 44"},{"key":"11_CR7","unstructured":"Moody, D., Perlner, R.: Vulnerabilities of \u201cMcEliece in the World of Escher\u201d. Cryptology ePrint Archive: Report 2015\/966 (2015). http:\/\/eprint.iacr.org\/"},{"issue":"1\u20133","key":"11_CR8","doi-asserted-by":"crossref","first-page":"289","DOI":"10.1007\/s10623-008-9175-9","volume":"49","author":"R Nojima","year":"2008","unstructured":"Nojima, R., Imai, H., Kobara, K., Morozov, K.: Semantic security for the McEliece cryptosystem without random oracles. Des. Codes Crypt. 49(1\u20133), 289\u2013305 (2008)","journal-title":"Des. Codes Crypt."},{"key":"11_CR9","doi-asserted-by":"crossref","unstructured":"Samardjiska, S., Gligoroski, D.: Approaching maximum embedding efficiency on small covers using staircase-generator codes. In: 2015 IEEE International Symposium on Information Theory (ISIT), pp. 2752\u20132756, June 2015","DOI":"10.1109\/ISIT.2015.7282957"},{"key":"11_CR10","unstructured":"Samardjiska, S., Gligoroski, D.: An Encryption Scheme Based on Random Split of St-Gen Codes. Cryptology ePrint Archive: Report 2016\/202 (2016). https:\/\/eprint.iacr.org\/2016\/202"},{"key":"11_CR11","unstructured":"Sendrier, N., Tillich, J.-P.: Private communication, October 2014"},{"key":"11_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"168","DOI":"10.1007\/978-3-540-77224-8_21","volume-title":"Applied Algebra, Algebraic Algorithms and Error-Correcting Codes","author":"S Yamakawa","year":"2007","unstructured":"Yamakawa, S., Cui, Y., Kobara, K., Hagiwara, M., Imai, H.: On the Key-Privacy Issue of McEliece Public-Key Encryption. In: Bozta\u015f, S., Lu, H.-F.F. (eds.) AAECC 2007. LNCS, vol. 4851, pp. 168\u2013177. Springer, Heidelberg (2007)"}],"container-title":["Lecture Notes in Computer Science","Pursuit of the Universal"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-40189-8_11","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,24]],"date-time":"2017-06-24T12:17:30Z","timestamp":1498306650000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-40189-8_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319401881","9783319401898"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-40189-8_11","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2016]]}}}