{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,5]],"date-time":"2026-05-05T07:01:01Z","timestamp":1777964461748,"version":"3.51.4"},"publisher-location":"Berlin, Heidelberg","reference-count":21,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540666820","type":"print"},{"value":"9783540479420","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1999]]},"DOI":"10.1007\/978-3-540-47942-0_2","type":"book-chapter","created":{"date-parts":[[2010,12,16]],"date-time":"2010-12-16T23:16:22Z","timestamp":1292541382000},"page":"2-12","source":"Crossref","is-referenced-by-count":54,"title":["Reaction Attacks against Several Public-Key Cryptosystem"],"prefix":"10.1007","author":[{"given":"Chris","family":"Hall","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Ian","family":"Goldberg","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Bruce","family":"Schneier","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"key":"2_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"224","DOI":"10.1007\/3-540-48184-2_20","volume-title":"Advances in Cryptology - CRYPTO \u201987","author":"C.M. Adams","year":"1988","unstructured":"Adams, C.M., Meijer, H.: Security-Related Comments Regarding McEliece\u2019s Public-Key Cryptosystem. In: Pomerance, C. (ed.) CRYPTO 1987. LNCS, vol.\u00a0293, pp. 224\u2013230. Springer, Heidelberg (1988)"},{"key":"2_CR2","doi-asserted-by":"crossref","unstructured":"Ajtai, M., Dwork, C.: A Public-Key Cryptosystem with Worst-Case\/Average-Case Equivalence. In: 29th ACM Symposium on Theory of Computing, pp. 284\u2013293 (1997)","DOI":"10.1145\/258533.258604"},{"key":"2_CR3","unstructured":"Berlekamp, E.R.: Nonbinary BCH Decoding. In: Paper presented at the 1967 International Symposium on Information Theory, San Remo, Italy (1967)"},{"key":"2_CR4","volume-title":"Algebraic Coding Theory","author":"E.R. Berlekamp","year":"1968","unstructured":"Berlekamp, E.R.: Algebraic Coding Theory. McGraw-Hill, New York (1968)"},{"issue":"5","key":"2_CR5","doi-asserted-by":"publisher","first-page":"590","DOI":"10.1109\/TIT.1973.1055088","volume":"19","author":"E.R. Berlekamp","year":"1973","unstructured":"Berlekamp, E.R.: Goppa Codes. IEEE Transactions on Information Theory\u00a0 IT-19(5), 590\u2013592 (1973)","journal-title":"IEEE Transactions on Information Theory"},{"key":"2_CR6","doi-asserted-by":"publisher","first-page":"384","DOI":"10.1109\/TIT.1978.1055873","volume":"24","author":"E.R. Berlekamp","year":"1978","unstructured":"Berlekamp, E.R., McEliece, R.J., van Tilborg, H.: On the Inherent In- tractability of Certain Coding Problems. IEEE Transactions on Infor-mation Theory\u00a024, 384\u2013386 (1978)","journal-title":"IEEE Transactions on Infor-mation Theory"},{"key":"2_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"213","DOI":"10.1007\/BFb0052237","volume-title":"Advances in Cryptology - CRYPTO \u201997","author":"T. Berson","year":"1997","unstructured":"Berson, T.: Failure of the McEliece Public-Key Cryptosystem Under Message-Resend and Related-Message Attack. In: Kaliski Jr., B.S. (ed.) CRYPTO 1997. LNCS, vol.\u00a01294, pp. 213\u2013220. Springer, Heidelberg (1997)"},{"key":"2_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"105","DOI":"10.1007\/BFb0052230","volume-title":"Advances in Cryptology - CRYPTO \u201997","author":"O. Goldreich","year":"1997","unstructured":"Goldreich, O., Goldwasser, S., Halevi, S.: Eliminating Errors in the Ajtai- Dwork Cryptosystem. In: Kaliski Jr., B.S. (ed.) CRYPTO 1997. LNCS, vol.\u00a01294, pp. 105\u2013111. Springer, Heidelberg (1997)"},{"key":"2_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"540","DOI":"10.1007\/0-387-34799-2_39","volume-title":"Advances in Cryptology - CRYPTO \u201988","author":"T. Hwang","year":"1990","unstructured":"Hwang, T., Rao, T.R.N.: Secret Error-Correcting Codes (SECC). In: Goldwasser, S. (ed.) CRYPTO 1988. LNCS, vol.\u00a0403, pp. 540\u2013563. Springer, Heidelberg (1990)"},{"issue":"2","key":"2_CR10","doi-asserted-by":"publisher","first-page":"157","DOI":"10.1049\/el:19920098","volume":"28","author":"L. Harn","year":"1992","unstructured":"Harn, L., Wang, D.C.: Cryptanalysis and Modification of Digital Sig-nature Scheme Based on Error-Correcting Codes. Electronics Letters\u00a028(2), 157\u2013159 (1992)","journal-title":"Electronics Letters"},{"key":"2_CR11","doi-asserted-by":"crossref","unstructured":"Jordan, J.P.: A Variant of a Public-Key Cryptosystem Based on Goppa Codes. Sigact News, 61\u201366 (1983)","DOI":"10.1145\/1008908.1008918"},{"key":"2_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"68","DOI":"10.1007\/3-540-46416-6_5","volume-title":"Advances in Cryptology - EUROCRYPT \u201991","author":"V.I. Korzhik","year":"1991","unstructured":"Korzhik, V.I., Turkin, A.I.: Cryptanalysis of McEliece\u2019s Public Key Cryptosystem. In: Davies, D.W. (ed.) EUROCRYPT 1991. LNCS, vol.\u00a0547, pp. 68\u201370. Springer, Heidelberg (1991)"},{"key":"2_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"275","DOI":"10.1007\/3-540-45961-8_25","volume-title":"Advances in Cryptology - EUROCRYPT \u201988","author":"P.J. Lee","year":"1988","unstructured":"Lee, P.J., Brickell, E.F.: An Observation on the Security of McEliece\u2019s Public-Key Cryptosystem. In: G\u00fcnther, C.G. (ed.) EUROCRYPT 1988. LNCS, vol.\u00a0330, pp. 275\u2013280. Springer, Heidelberg (1988)"},{"key":"2_CR14","doi-asserted-by":"publisher","first-page":"271","DOI":"10.1109\/18.272496","volume":"40","author":"Y.X. Li","year":"1994","unstructured":"Li, Y.X., Deng, R.H., Wang, X.M.: On the Equivalence of McEliece\u2019s and Niederreiter\u2019s Public-Key Cryptosystems. IEEE Transactions on Information Theory\u00a040, 271\u2013273 (1994)","journal-title":"IEEE Transactions on Information Theory"},{"issue":"1","key":"2_CR15","doi-asserted-by":"publisher","first-page":"122","DOI":"10.1109\/TIT.1969.1054260","volume":"15","author":"J.L. Massey","year":"1969","unstructured":"Massey, J.L.: Shift Register Synthesis and BCH Decoding. IEEE Tran- sactions on Information Theory\u00a0IT-15(1), 122\u2013127 (1969)","journal-title":"IEEE Tran- sactions on Information Theory"},{"key":"2_CR16","unstructured":"McEliece, R.J.: A Public-Key Cryptosystem Based on Algebraic Co-ding Theory. Deep Space Network Progress Report 42-44, Jet Propul- sion Laboratory, California Institute of Technology, pp. 104\u2013113 (1978)"},{"issue":"2","key":"2_CR17","first-page":"159","volume":"15","author":"H. Niederreiter","year":"1986","unstructured":"Niederreiter, H.: Knapsack-Type Cryptosystems and Algebraic Coding Theory. Problems of Control and Information Theory\u00a015(2), 159\u2013166 (1986)","journal-title":"Problems of Control and Information Theory"},{"issue":"2","key":"2_CR18","doi-asserted-by":"publisher","first-page":"203","DOI":"10.1109\/TIT.1975.1055350","volume":"21","author":"N.J. Patterson","year":"1975","unstructured":"Patterson, N.J.: The Algebraic Decoding of Goppa Codes. IEEE Tran- sactions on Information Theory\u00a0IT-21(2), 203\u2013207 (1975)","journal-title":"IEEE Tran- sactions on Information Theory"},{"key":"2_CR19","doi-asserted-by":"crossref","unstructured":"Sugiyama, Y., Kasahara, M., Hirasawa, S., Namekawa, T.: A method for solving the key equation for decoding Goppa codes. Presented at the IEEE Int. Symp. Information Theory, Notre Dame, Ind., October 27-31 (1974)","DOI":"10.1016\/S0019-9958(75)90090-X"},{"key":"2_CR20","doi-asserted-by":"crossref","unstructured":"Sagiyama, Y., Kasahara, M., Hirasawa, S., Namekawa, T.: An Erasures- and-Errors Decoding Algorithm for Goppa Codes. IEEE Transactions on Information Theory, 238\u2013241 (March 1976)","DOI":"10.1109\/TIT.1976.1055517"},{"key":"2_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"119","DOI":"10.1007\/0-387-34799-2_10","volume-title":"Advances in Cryptology - CRYPTO \u201988","author":"J. Tilburg van","year":"1990","unstructured":"van Tilburg, J.: On the McEliece Cryptosystem. In: Goldwasser, S. (ed.) CRYPTO 1988. LNCS, vol.\u00a0403, pp. 119\u2013131. Springer, Heidelberg (1990)"}],"container-title":["Lecture Notes in Computer Science","Information and Communication Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-47942-0_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,7]],"date-time":"2019-06-07T00:46:28Z","timestamp":1559868388000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-47942-0_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1999]]},"ISBN":["9783540666820","9783540479420"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-47942-0_2","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[1999]]}}}