{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,24]],"date-time":"2026-01-24T00:31:46Z","timestamp":1769214706209,"version":"3.49.0"},"publisher-location":"Berlin, Heidelberg","reference-count":13,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540210184","type":"print"},{"value":"9783540246329","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2004]]},"DOI":"10.1007\/978-3-540-24632-9_2","type":"book-chapter","created":{"date-parts":[[2010,8,2]],"date-time":"2010-08-02T15:12:48Z","timestamp":1280761968000},"page":"14-27","source":"Crossref","is-referenced-by-count":8,"title":["Cryptanalysis of a Public-Key Encryption Scheme Based on the Polynomial Reconstruction Problem"],"prefix":"10.1007","author":[{"given":"Jean-S\u00e9bastien","family":"Coron","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"2_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"229","DOI":"10.1007\/3-540-39200-9_14","volume-title":"Advances in Cryptology \u2013 EUROCRPYT 2003","author":"D. Augot","year":"2003","unstructured":"Augot, D., Finiasz, M.: A Public Key encryption scheme based on the Polynomial Reconstruction problem. In: Biham, E. (ed.) EUROCRYPT 2003. LNCS, vol.\u00a02656, pp. 229\u2013240. Springer, Heidelberg (2003)"},{"key":"2_CR2","unstructured":"Augot, D., Finiasz, M., Loidreau, P.: Using the Trace Operator to repair the Polynomial Reconstruction based Cryptosystem. Presented at Eurocrypt 2003, Cryptology ePrint Archive, Report 2003\/209 (September 30, 2003), \n                  \n                    http:\/\/eprint.iacr.org\/"},{"key":"2_CR3","first-page":"633","volume":"4","author":"E.R. Berlekamp","year":"1986","unstructured":"Berlekamp, E.R., Welch, L.R.: Error correction for algebraic block codes. US Patent 4 633 470 (1986)","journal-title":"US Patent"},{"key":"2_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"97","DOI":"10.1007\/3-540-45061-0_9","volume-title":"Automata, Languages and Programming","author":"D. Bleichenbacher","year":"2003","unstructured":"Bleichenbacher, D., Kiayias, A., Yung, M.: Decoding of Interleaved Reed Solomon Codes over Noisy Data. In: Baeten, J.C.M., Lenstra, J.K., Parrow, J., Woeginger, G.J. (eds.) ICALP 2003. LNCS, vol.\u00a02719, pp. 97\u2013108. Springer, Heidelberg (2003)"},{"key":"2_CR5","unstructured":"Coron, J.S.: Cryptanalysis of a public-key encryption scheme based on the polynomial reconstruction problem. Cryptology ePrint Archive, Report 2003\/036 (March 5, 2003), \n                  \n                    http:\/\/eprint.iacr.org\/"},{"issue":"4","key":"2_CR6","doi-asserted-by":"publisher","first-page":"169","DOI":"10.1016\/0020-0190(92)90195-2","volume":"43","author":"P. Gemmell","year":"1992","unstructured":"Gemmell, P., Sudan, M.: Highly resilient correctors for multivariate polynomials. Information Processing Letters\u00a043(4), 169\u2013174 (1992)","journal-title":"Information Processing Letters"},{"key":"2_CR7","doi-asserted-by":"publisher","first-page":"1757","DOI":"10.1109\/18.782097","volume":"45","author":"V. Guruswami","year":"1999","unstructured":"Guruswami, V., Sudan, M.: Improved decoding of Reed-Solomon and Algebraic- Geometric codes. IEEE Transactions on Information Theory\u00a045, 1757\u20131767 (1999)","journal-title":"IEEE Transactions on Information Theory"},{"key":"2_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"232","DOI":"10.1007\/3-540-45465-9_21","volume-title":"Automata, Languages and Programming","author":"A. Kiayias","year":"2002","unstructured":"Kiayias, A., Yung, M.: Cryptographic hardness based on the decoding of Reed- Solomon codes with applications. In: Widmayer, P., Triguero, F., Morales, R., Hennessy, M., Eidenbenz, S., Conejo, R. (eds.) ICALP 2002. LNCS, vol.\u00a02380, pp. 232\u2013243. Springer, Heidelberg (2002)"},{"key":"2_CR9","unstructured":"Kiayias, A., Yung, M.: Cryptanalysis of the polynomial reconstruction based public-key cryptosystem of Eurocrypt 2003 in the optimal parameter setting (2003) available at, \n                  \n                    http:\/\/www.cse.uconn.edu\/~akiayias\/"},{"key":"2_CR10","doi-asserted-by":"publisher","first-page":"245","DOI":"10.1145\/301250.301312","volume-title":"STOC 1999","author":"M. Naor","year":"1999","unstructured":"Naor, M., Pinkas, B.: Oblivious transfer and polynomial evaluation. In: STOC 1999, pp. 245\u2013254. ACM, New York (1999)"},{"key":"2_CR11","first-page":"300","volume":"8","author":"I.S. Reed","year":"1960","unstructured":"Reed, I.S., Solomon, G.: Polynomial codes over certain finite fields. J. SIAM\u00a08, 300\u2013304 (1960)","journal-title":"J. SIAM"},{"key":"2_CR12","unstructured":"Shoup, V.: NTL: A Library for doing Number Theory (version 5.3.1), publicly available at, \n                  \n                    www.shoup.net"},{"key":"2_CR13","doi-asserted-by":"crossref","unstructured":"Shoup, V.: A fast deterministic algorithm for factoring polynomials over finite fields of small characteristic. In: Proc. 1991 International Symposium on Symbolic and Algebraic Computation, pp. 14\u201321 (1991)","DOI":"10.1145\/120694.120697"}],"container-title":["Lecture Notes in Computer Science","Public Key Cryptography \u2013 PKC 2004"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-24632-9_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,3,17]],"date-time":"2019-03-17T16:55:23Z","timestamp":1552841723000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-24632-9_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004]]},"ISBN":["9783540210184","9783540246329"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-24632-9_2","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2004]]}}}