{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T19:55:40Z","timestamp":1725566140226},"publisher-location":"Berlin, Heidelberg","reference-count":19,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540242079"},{"type":"electronic","value":"9783540301141"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2004]]},"DOI":"10.1007\/978-3-540-30114-1_20","type":"book-chapter","created":{"date-parts":[[2010,9,16]],"date-time":"2010-09-16T14:47:16Z","timestamp":1284648436000},"page":"282-292","source":"Crossref","is-referenced-by-count":5,"title":["Optimization and Evaluation of Randomized c-Secure CRT Code Defined on Polynomial Ring"],"prefix":"10.1007","author":[{"given":"Hirofumi","family":"Muratani","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"20_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"452","DOI":"10.1007\/3-540-44750-4_36","volume-title":"Advances in Cryptology - CRYPTO \u201995","author":"D. Boneh","year":"1995","unstructured":"Boneh, D., Shaw, J.: Collusion-Secure Fingerprinting for Digital Data. In: Coppersmith, D. (ed.) CRYPTO 1995. LNCS, vol.\u00a0963, pp. 452\u2013465. Springer, Heidelberg (1995)"},{"unstructured":"Lindkvist, T.: Fingerprinting digital document. PhD thesis, Link\u00f6ping University (1999)","key":"20_CR2"},{"unstructured":"L\u00f6fvenberg, J.: Codes for Digital Fingerprinting. PhD thesis, Department of Electrical Engineering, Link\u00f6pnig University (2001)","key":"20_CR3"},{"unstructured":"Suzuoki, M., Watanabe, H., Kasami, T.: A scheme of marking collusion-secure watermark. In: SCIS 1997, vol. 31B (1997)","key":"20_CR4"},{"doi-asserted-by":"crossref","unstructured":"Watanabe, H., Kasami, T.: A Secure Code for Recipient Watermarking against Conspiracy Attacks by All Users. In: Information and Communication Security, pp. 414\u2013423 (1997)","key":"20_CR5","DOI":"10.1007\/BFb0028497"},{"unstructured":"Yoshida, J., Iwamura, K., Imai, H.: A coding method for collusion-secure watermark and less decline. In: SCIS 1998. vol. (10.2A) (1998)","key":"20_CR6"},{"key":"20_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"134","DOI":"10.1007\/10719724_10","volume-title":"Information Hiding","author":"H.J. Guth","year":"2000","unstructured":"Guth, H.J., Pfitzmann, B.: Error- and Collusion-Secure Fingerprinting for Digital Data. In: Pfitzmann, A. (ed.) IH 1999. LNCS, vol.\u00a01768, pp. 134\u2013145. Springer, Heidelberg (2000)"},{"key":"20_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"378","DOI":"10.1007\/3-540-45353-9_28","volume-title":"Topics in Cryptology \u2013 CT-RSA 2001","author":"Y. Yacobi","year":"2001","unstructured":"Yacobi, Y.: Improved Boneh-Shaw content fingerprinting. In: Naccache, D. (ed.) CT-RSA 2001. LNCS, vol.\u00a02020, pp. 378\u2013391. Springer, Heidelberg (2001)"},{"key":"20_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"303","DOI":"10.1007\/3-540-45496-9_22","volume-title":"Information Hiding","author":"H. Muratani","year":"2001","unstructured":"Muratani, H.: A Collusion-Secure Fingerprinting Code Reduced by Chinese Remaindering and Its Random-Error Resilience. In: Moskowitz, I.S. (ed.) IH 2001. LNCS, vol.\u00a02137, pp. 303\u2013315. Springer, Heidelberg (2001)"},{"unstructured":"Yoshioka, K., Matsumoto, T.: Random-error-resilient tracing algorithm for collusion-secure fingerprinting code. Technical Report of IEICE ISEC2001-52, 247\u2013254 (2001)","key":"20_CR10"},{"unstructured":"Yoshioka, K., Matsumoto, T.: Random-Error-Resilient Tracing Algorithm for Collusion-Secure Fingerprinting Code (part 2). In: SCIS 2002, vol.\u00a0II, pp. 1021\u20131026 (2002)","key":"20_CR11"},{"key":"20_CR12","first-page":"1147","volume":"E86-A","author":"K. Yoshioka","year":"2003","unstructured":"Yoshioka, K., Matsumoto, T.: Random-Error-Resilience of a Short Collusion- Secure Code. IEICE Trans. on Fundamentals\u00a0E86-A, 1147\u20131155 (2003)","journal-title":"IEICE Trans. on Fundamentals"},{"unstructured":"Kim, M., Shikata, J., Muratani, H., Imai, H.: Constructing c-secure codes using polynomials over finite fields. In: SITA2001 \u2013 The 24th Symposium on Information Theory and Its Applications. Number W-B-1-3, pp. 27\u201330 (2001)","key":"20_CR13"},{"unstructured":"Kim, M., Shikata, J., Muratani, H., Imai, H.: On the c-Secure CRT Codes. In: SCIS 2002, vol.\u00a0II, pp. 1015\u20131019 (2002)","key":"20_CR14"},{"key":"20_CR15","first-page":"3256","volume":"E86-A","author":"M. Kim","year":"2003","unstructured":"Kim, M., Shikata, J., Muratani, H., Imai, H.: Constructing c-Secure CRT Codes Using Polynomials over Finite Fields. IEICE Trans. on Fundamentals\u00a0E86-A, 3256\u20133266 (2003)","journal-title":"IEICE Trans. on Fundamentals"},{"unstructured":"Watanabe, H., Kitagawa, T.: An attack for a fingerprinting code and its success probability. In: ISITA 2002, pp. 555\u2013558 (2002)","key":"20_CR16"},{"key":"20_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"173","DOI":"10.1007\/3-540-36159-6_15","volume-title":"Information and Communications Security","author":"H. Watanabe","year":"2002","unstructured":"Watanabe, H., Kitagawa, T.: An ID coding scheme for fingerprinting, randomized c-secure CRT code. In: Deng, R.H., Qing, S., Bao, F., Zhou, J. (eds.) ICICS 2002. LNCS, vol.\u00a02513, pp. 173\u2013183. Springer, Heidelberg (2002)"},{"unstructured":"Peikert, C., Shelat, A., Smith, A.: Lower Bounds for Collusion-Secure Fingerprinting. In: Proceedings of the 14th Annual ACM-SIAM Symposium on Discrete Algorithms (SODA) 2003, pp. 472\u2013479 (2003)","key":"20_CR18"},{"key":"20_CR19","doi-asserted-by":"publisher","first-page":"116","DOI":"10.1145\/780542.780561","volume-title":"STOC 2003","author":"G. Tardos","year":"2003","unstructured":"Tardos, G.: Optimal Probabilistic Fingerprinting Codes. In: STOC 2003, pp. 116\u2013125. ACM, New York (2003)"}],"container-title":["Lecture Notes in Computer Science","Information Hiding"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-30114-1_20.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,2]],"date-time":"2021-05-02T23:46:01Z","timestamp":1619999161000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-30114-1_20"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004]]},"ISBN":["9783540242079","9783540301141"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-30114-1_20","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2004]]}}}