{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T18:26:55Z","timestamp":1725733615472},"publisher-location":"Berlin, Heidelberg","reference-count":10,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642396489"},{"type":"electronic","value":"9783642396496"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-39649-6_45","type":"book-chapter","created":{"date-parts":[[2013,6,21]],"date-time":"2013-06-21T05:09:21Z","timestamp":1371791361000},"page":"629-642","source":"Crossref","is-referenced-by-count":6,"title":["Quasi-inverse Based Cryptography"],"prefix":"10.1007","author":[{"given":"Thuc Dinh","family":"Nguyen","sequence":"first","affiliation":[]},{"given":"Van H.","family":"Dang","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"5","key":"45_CR1","doi-asserted-by":"publisher","first-page":"560","DOI":"10.1109\/5.4442","volume":"76","author":"W. Diffie","year":"1988","unstructured":"Diffie, W.: The First Ten of Public Key Cryptography. Proceedings of the IEEE\u00a076(5), 560\u2013577 (1988)","journal-title":"Proceedings of the IEEE"},{"key":"45_CR2","unstructured":"Rivest, R.L., Shamir, A., Adleman, L.M.: Cryptographic Communications System and Method. U.S. Patent #4,405,829 (1983)"},{"key":"45_CR3","doi-asserted-by":"crossref","unstructured":"Steinberg, B.: A Theory of Transformation Monoids: Combinatorics and Representation Theory. The Electronic Journal of Combinatorics 17 #R164 (2010)","DOI":"10.37236\/436"},{"key":"45_CR4","unstructured":"Waters, B., Balfanz, D., Durfee, G., Smetters, D.: Building an Encrypted and Searchable Audit Log. In: The 11th Annual Network and Distributed System Security Symposium, NDSS 2004, San Diego, California (2004)"},{"key":"45_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"506","DOI":"10.1007\/978-3-540-24676-3_30","volume-title":"Advances in Cryptology - EUROCRYPT 2004","author":"D. Boneh","year":"2004","unstructured":"Boneh, D., Di Crescenzo, G., Ostrovsky, R., Persiano, G.: Public Key Encryption with Keyword Search. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol.\u00a03027, pp. 506\u2013522. Springer, Heidelberg (2004)"},{"key":"45_CR6","volume-title":"Generalized Inverse of Linear Transformations","author":"S.L. Campell","year":"1979","unstructured":"Campell, S.L., Meyer, C.D.: Generalized Inverse of Linear Transformations. Dover Publications, New York (1979)"},{"key":"45_CR7","unstructured":"Menezes, A.J., Oorschot, P.C.V., Vanstone, S.A.: Handbook of Applied Cryptography, p. 33. CRC Press (1997)"},{"key":"45_CR8","unstructured":"ANSI X9.30 (PART 2), American National Standard for Financial Services - Public key cryptography using irreversible algorithms for the financial services industry - Part 2: The secure hash algorithm (SHA), ASC X9 Secretariat - American Bankers Association (1993)"},{"key":"45_CR9","doi-asserted-by":"crossref","unstructured":"Rivest, R.: The MD5 Message-Digest Algorithm. RFC 1321 (1992)","DOI":"10.17487\/rfc1321"},{"key":"45_CR10","unstructured":"Gorenstein, D.: The Classification of Finite Simple Groups Vol. 1. Groups of Noncharacteristic 2 Type. The University Series in Mathematics. Plenum Press (1983) ISBN 978-0-306-41305-6, MR 746470"}],"container-title":["Lecture Notes in Computer Science","Computational Science and Its Applications \u2013 ICCSA 2013"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-39649-6_45","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,7,28]],"date-time":"2020-07-28T22:04:07Z","timestamp":1595973847000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-39649-6_45"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642396489","9783642396496"],"references-count":10,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-39649-6_45","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2013]]}}}