{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,6]],"date-time":"2025-12-06T04:58:43Z","timestamp":1764997123929},"publisher-location":"Cham","reference-count":10,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319555881"},{"type":"electronic","value":"9783319555898"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-55589-8_17","type":"book-chapter","created":{"date-parts":[[2017,3,7]],"date-time":"2017-03-07T21:01:24Z","timestamp":1488920484000},"page":"254-264","source":"Crossref","is-referenced-by-count":3,"title":["Efficient Implementation of Hybrid Encryption from Coding Theory"],"prefix":"10.1007","author":[{"given":"Pierre-Louis","family":"Cayrel","sequence":"first","affiliation":[]},{"given":"Cheikh Thiecoumba","family":"Gueye","sequence":"additional","affiliation":[]},{"given":"El Hadji Modou","family":"Mboup","sequence":"additional","affiliation":[]},{"given":"Ousmane","family":"Ndiaye","sequence":"additional","affiliation":[]},{"given":"Edoardo","family":"Persichetti","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,3,9]]},"reference":[{"key":"17_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"250","DOI":"10.1007\/978-3-642-40349-1_15","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2013","author":"DJ Bernstein","year":"2013","unstructured":"Bernstein, D.J., Chou, T., Schwabe, P.: McBits: fast constant-time code-based cryptography. In: Bertoni, G., Coron, J.-S. (eds.) CHES 2013. LNCS, vol. 8086, pp. 250\u2013272. Springer, Heidelberg (2013). doi: 10.1007\/978-3-642-40349-1_15"},{"key":"17_CR2","unstructured":"Bernstein, D.J., Chuengsatiansup, C., Lange, T., van Vredendaal, C.: NTRU prime (2016). http:\/\/eprint.iacr.org\/2016\/461"},{"key":"17_CR3","doi-asserted-by":"crossref","unstructured":"Cramer, R., Shoup, V.: Design and analysis of practical public-key encryption schemes secure against adaptive chosen ciphertext attack. SIAM J. Comput.33, 167\u2013226 (2004). Society for Industrial and Applied Mathematics, Philadelphia","DOI":"10.1137\/S0097539702403773"},{"key":"17_CR4","unstructured":"Alrashdan, M.T., Moghaddam, F.F., Karimi, O.: A hybrid encryption algorithm based on RSA small-e and efficient-RSA for cloud computing environments. J. Adv. Comput. Netw. 1(3), 238\u2013241 (2013)"},{"key":"17_CR5","unstructured":"McEliece, R.J.: A public-key cryptosystem based on algebraic coding theory. Jet Propulsion Laboratory DSN Progress Report 42\u201344, pp. 114\u2013116 (1978)"},{"key":"17_CR6","unstructured":"Niederreiter, H.: Knapsack-type cryptosystems and algebraic coding theory. In: Problems of Control and Information Theory, vol. 15, pp. 159\u2013166 (1986)"},{"key":"17_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"174","DOI":"10.1007\/978-3-642-38616-9_12","volume-title":"Post-Quantum Cryptography","author":"E Persichetti","year":"2013","unstructured":"Persichetti, E.: Secure and anonymous hybrid encryption from coding theory. In: Gaborit, P. (ed.) PQCrypto 2013. LNCS, vol. 7932, pp. 174\u2013187. Springer, Heidelberg (2013). doi: 10.1007\/978-3-642-38616-9_12"},{"key":"17_CR8","doi-asserted-by":"crossref","unstructured":"Shor, P.W.: Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer. In: Proceedings of the 35th Annual Symposium on Foundations of Computer Science (1994)","DOI":"10.1109\/SFCS.1994.365700"},{"key":"17_CR9","doi-asserted-by":"crossref","unstructured":"Turan, M.S., Barker, E.B., Burr, W.E., Chen, L.: Sp 800\u2013132, Recommendation for password-based key derivation: Part 1: storage applications. National Institute of Standards & Technology, Gaithersburg (2010)","DOI":"10.6028\/NIST.SP.800-132"},{"key":"17_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-319-29360-8_1","volume-title":"Post-Quantum Cryptography","author":"I Maurich","year":"2016","unstructured":"Maurich, I., Heberle, L., G\u00fcneysu, T.: IND-CCA secure hybrid encryption from QC-MDPC niederreiter. In: Takagi, T. (ed.) PQCrypto 2016. LNCS, vol. 9606, pp. 1\u201317. Springer, Cham (2016). doi: 10.1007\/978-3-319-29360-8_1"}],"container-title":["Lecture Notes in Computer Science","Codes, Cryptology and Information Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-55589-8_17","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,25]],"date-time":"2017-06-25T08:08:59Z","timestamp":1498378139000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-55589-8_17"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319555881","9783319555898"],"references-count":10,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-55589-8_17","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]}}}