{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,28]],"date-time":"2026-02-28T12:57:43Z","timestamp":1772283463475,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":7,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540858546","type":"print"},{"value":"9783540858553","type":"electronic"}],"license":[{"start":{"date-parts":[[2008,1,1]],"date-time":"2008-01-01T00:00:00Z","timestamp":1199145600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2008,1,1]],"date-time":"2008-01-01T00:00:00Z","timestamp":1199145600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008]]},"DOI":"10.1007\/978-3-540-85855-3_22","type":"book-chapter","created":{"date-parts":[[2008,8,28]],"date-time":"2008-08-28T13:27:52Z","timestamp":1219930072000},"page":"327-339","source":"Crossref","is-referenced-by-count":8,"title":["Linear Bandwidth Naccache-Stern Encryption"],"prefix":"10.1007","author":[{"given":"Beno\u00eet","family":"Chevallier-Mames","sequence":"first","affiliation":[]},{"given":"David","family":"Naccache","sequence":"additional","affiliation":[]},{"given":"Jacques","family":"Stern","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"22_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"537","DOI":"10.1007\/3-540-48405-1_34","volume-title":"Advances in Cryptology - CRYPTO \u201999","author":"E. Fujisaki","year":"1999","unstructured":"Fujisaki, E., Okamoto, T.: Secure integration of asymmetric and symmetric encryption schemes. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol.\u00a01666, pp. 537\u2013554. Springer, Heidelberg (1999)"},{"issue":"1","key":"22_CR2","first-page":"24","volume":"E83-A","author":"E. Fujisaki","year":"2000","unstructured":"Fujisaki, E., Okamoto, T.: How to enhance the security of public-key encryption at minimum cost. IEICE Transaction of Fundamentals of Electronic Communications and Computer Science\u00a0E83-A(1), 24\u201332 (2000)","journal-title":"IEICE Transaction of Fundamentals of Electronic Communications and Computer Science"},{"key":"22_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"136","DOI":"10.1007\/3-540-36504-4_10","volume-title":"Financial Cryptography","author":"P.-A. Fouque","year":"2003","unstructured":"Fouque, P.-A., Stern, J., Wackers, J.-G.: Cryptocomputing with rationals. In: Blaze, M. (ed.) FC 2002. LNCS, vol.\u00a02357, pp. 136\u2013146. Springer, Heidelberg (2003)"},{"issue":"2","key":"22_CR4","doi-asserted-by":"publisher","first-page":"270","DOI":"10.1016\/0022-0000(84)90070-9","volume":"28","author":"S. Goldwasser","year":"1984","unstructured":"Goldwasser, S., Micali, S.: Probabilistic encryption. Journal of Computer and System Sciences\u00a028(2), 270\u2013299 (1984)","journal-title":"Journal of Computer and System Sciences"},{"key":"22_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"27","DOI":"10.1007\/3-540-69053-0_3","volume-title":"Advances in Cryptology - EUROCRYPT \u201997","author":"D. Naccache","year":"1997","unstructured":"Naccache, D., Stern, J.: A new public-key cryptosystem. In: Fumy, W. (ed.) EUROCRYPT 1997. LNCS, vol.\u00a01233, pp. 27\u201336. Springer, Heidelberg (1997)"},{"key":"22_CR6","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4612-4968-9","volume-title":"Constructive combinatorics","author":"D. Stanton","year":"1986","unstructured":"Stanton, D., White, D.: Constructive combinatorics. Springer, New York (1986)"},{"issue":"4","key":"22_CR7","doi-asserted-by":"publisher","first-page":"556","DOI":"10.1016\/0196-6774(91)90033-U","volume":"12","author":"B. Vall\u00e9e","year":"1991","unstructured":"Vall\u00e9e, B.: Gauss\u2019 algorithm revisited. Journal of Algorithms\u00a012(4), 556\u2013572 (1991)","journal-title":"Journal of Algorithms"}],"container-title":["Lecture Notes in Computer Science","Security and Cryptography for Networks"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-85855-3_22","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,5,10]],"date-time":"2024-05-10T03:37:52Z","timestamp":1715312272000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-540-85855-3_22"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008]]},"ISBN":["9783540858546","9783540858553"],"references-count":7,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-85855-3_22","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2008]]}}}