{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,31]],"date-time":"2026-03-31T16:56:26Z","timestamp":1774976186341,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":11,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783642129285","type":"print"},{"value":"9783642129292","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-12929-2_5","type":"book-chapter","created":{"date-parts":[[2010,5,31]],"date-time":"2010-05-31T05:17:53Z","timestamp":1275283073000},"page":"61-72","source":"Crossref","is-referenced-by-count":72,"title":["Cryptanalysis of the Niederreiter Public Key Scheme Based on GRS Subcodes"],"prefix":"10.1007","author":[{"given":"Christian","family":"Wieschebrink","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"5_CR1","first-page":"114","volume":"42-44","author":"R. McEliece","year":"1978","unstructured":"McEliece, R.: A public-key cryptosystem based on algebraic coding theory. DSN Progress Report, Jet Prop. Lab., California Inst. Tech.\u00a042-44, 114\u2013116 (1978)","journal-title":"DSN Progress Report, Jet Prop. Lab., California Inst. Tech."},{"key":"5_CR2","doi-asserted-by":"publisher","DOI":"10.1007\/0-387-23483-7","volume-title":"Encyclopedia of Cryptography and Security","author":"H. Tilborg van","year":"2005","unstructured":"van Tilborg, H.: Encyclopedia of Cryptography and Security. Springer, Heidelberg (2005)"},{"key":"5_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"347","DOI":"10.1007\/978-3-540-72540-4_20","volume-title":"Advances in Cryptology - EUROCRYPT 2007","author":"L. Minder","year":"2007","unstructured":"Minder, L., Shokrollahi, A.: Cryptanalysis of the Sidelnikov cryptosystem. In: Naor, M. (ed.) EUROCRYPT 2007. LNCS, vol.\u00a04515, pp. 347\u2013360. Springer, Heidelberg (2007)"},{"key":"5_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"212","DOI":"10.1007\/3-540-68339-9_19","volume-title":"Advances in Cryptology - EUROCRYPT \u201996","author":"K. Gibson","year":"1996","unstructured":"Gibson, K.: The security of the Gabidulin public-key cryptosystem. In: Maurer, U.M. (ed.) EUROCRYPT 1996. LNCS, vol.\u00a01070, pp. 212\u2013223. Springer, Heidelberg (1996)"},{"key":"5_CR5","doi-asserted-by":"publisher","first-page":"439","DOI":"10.1515\/dma.1992.2.4.439","volume":"2","author":"V. Sidelnikov","year":"1992","unstructured":"Sidelnikov, V., Shestakov, S.: On insecurity of cryptosystems based on generalized Reed-Solomon codes. Discrete Math. Appl.\u00a02, 439\u2013444 (1992)","journal-title":"Discrete Math. Appl."},{"key":"5_CR6","doi-asserted-by":"publisher","first-page":"63","DOI":"10.1007\/s10623-003-6151-2","volume":"35","author":"T. Berger","year":"2005","unstructured":"Berger, T., Loidreau, P.: How to mask the structure of codes for a cryptographic use. Designs, Codes and Cryptography\u00a035, 63\u201379 (2005)","journal-title":"Designs, Codes and Cryptography"},{"key":"5_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"14","DOI":"10.1007\/11745853_2","volume-title":"Public Key Cryptography - PKC 2006","author":"C. Wieschebrink","year":"2006","unstructured":"Wieschebrink, C.: An attack on a modified Niederreiter encryption scheme. In: Yung, M., Dodis, Y., Kiayias, A., Malkin, T.G. (eds.) PKC 2006. LNCS, vol.\u00a03958, pp. 14\u201326. Springer, Heidelberg (2006)"},{"key":"5_CR8","unstructured":"Berlekamp, E., Welch, L.: Error correction of algebraic block codes, US Patent No. 4,633,470 (1986)"},{"key":"5_CR9","doi-asserted-by":"crossref","unstructured":"Guruswami, V., Sudan, M.: Improved decoding of Reed-Solomon and algebraic-geometric codes. In: Proceedings of 39th Annual Symposium on Foundations of Computer Science, pp. 28\u201337 (1998)","DOI":"10.1109\/SFCS.1998.743426"},{"key":"5_CR10","volume-title":"The Theory of Error-Correcting Codes","author":"F. MacWilliams","year":"1997","unstructured":"MacWilliams, F., Sloane, N.: The Theory of Error-Correcting Codes. North-Holland, Amsterdam (1997)"},{"key":"5_CR11","first-page":"159","volume":"15","author":"N. Niederreiter","year":"1986","unstructured":"Niederreiter, N.: Knapsack-type cryptosystems and algebraic coding theory. Problems of Control and Information Theory\u00a015, 159\u2013166 (1986)","journal-title":"Problems of Control and Information Theory"}],"container-title":["Lecture Notes in Computer Science","Post-Quantum Cryptography"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-12929-2_5.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,30]],"date-time":"2021-04-30T11:49:00Z","timestamp":1619783340000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-12929-2_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642129285","9783642129292"],"references-count":11,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-12929-2_5","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2010]]}}}