{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,23]],"date-time":"2026-01-23T09:13:08Z","timestamp":1769159588889,"version":"3.49.0"},"publisher-location":"Berlin, Heidelberg","reference-count":14,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540239758","type":"print"},{"value":"9783540305392","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2004]]},"DOI":"10.1007\/978-3-540-30539-2_28","type":"book-chapter","created":{"date-parts":[[2010,3,12]],"date-time":"2010-03-12T13:41:57Z","timestamp":1268401317000},"page":"401-416","source":"Crossref","is-referenced-by-count":7,"title":["Cryptanalyzing the Polynomial-Reconstruction Based Public-Key System Under Optimal Parameter Choice"],"prefix":"10.1007","author":[{"given":"Aggelos","family":"Kiayias","sequence":"first","affiliation":[]},{"given":"Moti","family":"Yung","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"28_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"229","DOI":"10.1007\/3-540-39200-9_14","volume-title":"Advances in Cryptology - EUROCRYPT 2003, International Conference on the Theory and Applications of Cryptographic Techniques","author":"D. Augot","year":"2003","unstructured":"Augot, D., Finiasz, M.: A Public Key Encryption Scheme Based on the Polynomial Reconstruction Problem. In: Biham, E. (ed.) EUROCRYPT 2003. LNCS, vol.\u00a02656, pp. 229\u2013240. Springer, Heidelberg (2003)"},{"key":"28_CR2","unstructured":"Augot, D., Finiasz, M., Loidreau, P.: Using the Trace Operator to repair the Polynomial Reconstruction based Cryptosystem presented at Eurocrypt 2003, Cryptology ePrint Archive, Report 2003\/209 (2003), http:\/\/eprint.iacr.org\/"},{"key":"28_CR3","unstructured":"Berlekamp, E.R., Welch, L.: Error Correction of Algebraic Block Codes. U.S. Patent, Number 4,633,470 (1986)"},{"key":"28_CR4","doi-asserted-by":"publisher","first-page":"285","DOI":"10.1016\/0012-365X(79)90084-0","volume":"25","author":"V. Chv\u00e1tal","year":"1979","unstructured":"Chv\u00e1tal, V.: The tail of the hypergeometric distribution. Discrete Math.\u00a025, 285\u2013287 (1979)","journal-title":"Discrete Math."},{"key":"28_CR5","doi-asserted-by":"crossref","unstructured":"Coron, J.-S.: Cryptanalysis of a public-key encryption scheme based on the polynomial reconstruction problem, Cryptology ePrint Archive, Report 2003\/036, http:\/\/eprint.iacr.org\/","DOI":"10.1007\/978-3-540-24632-9_2"},{"key":"28_CR6","doi-asserted-by":"crossref","unstructured":"Coron, J.-S.: Cryptanalysis of the Repaired Public-key Encryption Scheme Based on the Polynomial Reconstruction Problem, Cryptology ePrint Archive, Report 2003\/219, http:\/\/eprint.iacr.org\/","DOI":"10.1007\/978-3-540-24632-9_2"},{"key":"28_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"14","DOI":"10.1007\/978-3-540-24632-9_2","volume-title":"Public Key Cryptography \u2013 PKC 2004","author":"J.-S. Coron","year":"2004","unstructured":"Coron, J.-S.: Cryptanalysis of a public-key encryption scheme based on the polynomial reconstruction problem. In: Bao, F., Deng, R., Zhou, J. (eds.) PKC 2004. LNCS, vol.\u00a02947, pp. 14\u201327. Springer, Heidelberg (2004)"},{"key":"28_CR8","first-page":"28","volume-title":"The Proceedings of the 39th Annual Symposium on Foundations of Computer Science","author":"V. Guruswami","year":"1998","unstructured":"Guruswami, V., Sudan, M.: Improved Decoding of Reed-Solomon and Algebraic-Geometric Codes. In: The Proceedings of the 39th Annual Symposium on Foundations of Computer Science, Palo Alto, California, November 8-11, pp. 28\u201339. IEEE Computer Society, Los Alamitos (1998)"},{"key":"28_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"232","DOI":"10.1007\/3-540-45465-9_21","volume-title":"Automata, Languages and Programming","author":"A. Kiayias","year":"2002","unstructured":"Kiayias, A., Yung, M.: Cryptographic Hardness based on the Decoding of Reed-Solomon Codes. In: Widmayer, P., Triguero, F., Morales, R., Hennessy, M., Eidenbenz, S., Conejo, R. (eds.) ICALP 2002. LNCS, vol.\u00a02380, pp. 232\u2013243. Springer, Heidelberg (2002)"},{"key":"28_CR10","doi-asserted-by":"crossref","unstructured":"Kiayias, A., Yung, M.: Cryptanalyzing the Polynomial-Reconstruction based Public-Key System Under Optimal Parameter Choice, Cryptology ePrint Archive, Report 2004\/217, http:\/\/eprint.iacr.org\/","DOI":"10.1007\/978-3-540-30539-2_28"},{"issue":"44","key":"28_CR11","first-page":"114","volume":"42","author":"R.J. McEliece","year":"1978","unstructured":"McEliece, R.J.: A public key cryptosystem based on algebraic coding theory. Jet Propulsion Lab, DSN Progress Report\u00a042(44), 114\u2013116 (1978)","journal-title":"Jet Propulsion Lab, DSN Progress Report"},{"key":"28_CR12","unstructured":"McEliece, R.J.: The Guruswami-Sudan Decoding Algorithm for Reed-Solomon Codes, IPN Progress Report 42-153 (May 15, 2003), http:\/\/ipnpr.jpl.nasa.gov\/tmo\/progress_report\/42-153\/153F.pdf"},{"issue":"4","key":"28_CR13","doi-asserted-by":"publisher","first-page":"701","DOI":"10.1145\/322217.322225","volume":"27","author":"J.T. Schwartz","year":"1980","unstructured":"Schwartz, J.T.: Fast Probabilistic Algorithms for Verifications of Polynomial Identities. Journal of the ACM\u00a027(4), 701\u2013717 (1980)","journal-title":"Journal of the ACM"},{"issue":"1","key":"28_CR14","doi-asserted-by":"publisher","first-page":"180","DOI":"10.1006\/jcom.1997.0439","volume":"13","author":"M. Sudan","year":"1997","unstructured":"Sudan, M.: Decoding of Reed Solomon Codes beyond the Error-Correction Bound. Journal of Complexity\u00a013(1), 180\u2013193 (1997)","journal-title":"Journal of Complexity"}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology - ASIACRYPT 2004"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-30539-2_28.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,19]],"date-time":"2025-02-19T12:12:40Z","timestamp":1739967160000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-30539-2_28"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004]]},"ISBN":["9783540239758","9783540305392"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-30539-2_28","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2004]]}}}