{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,9]],"date-time":"2026-01-09T19:45:23Z","timestamp":1767987923508,"version":"3.49.0"},"reference-count":10,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[1995,7,1]],"date-time":"1995-07-01T00:00:00Z","timestamp":804556800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Des Codes Crypt"],"published-print":{"date-parts":[[1995,7]]},"DOI":"10.1007\/bf01390769","type":"journal-article","created":{"date-parts":[[2005,4,2]],"date-time":"2005-04-02T12:14:19Z","timestamp":1112444059000},"page":"37-45","source":"Crossref","is-referenced-by-count":50,"title":["Severely denting the Gabidulin version of the McEliece Public Key Cryptosystem"],"prefix":"10.1007","volume":"6","author":[{"given":"J. K.","family":"Gibson","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"CR1","series-title":"Lecture Notes in Computer Science","first-page":"196","volume-title":"Breaking Iterated Knapsacks","author":"E. F. Brickell","year":"1984","unstructured":"E. F. Brickell,Breaking Iterated Knapsacks, Lecture Notes in Computer Science, Springer-Verlag, New York, 196 (1984)."},{"key":"CR2","series-title":"Lecture Notes in Computer Science","first-page":"547","volume-title":"Ideals over a Non-Commutative Ring and their Applications in Cryptography","author":"E. M. Gabidulin","year":"1991","unstructured":"E. M. Gabidulin,Ideals over a Non-Commutative Ring and their Applications in Cryptography, Lecture Notes in Computer Science, Springer-Verlag, New York, 547 (1991)."},{"key":"CR3","unstructured":"E. M. Gabidulin, Theory of codes with maximum rank distance,Problems of Information Transmission, Vol. 21, No. 1 (1985). (Russian original January?March 1985)."},{"key":"CR4","unstructured":"E. M. Gabidulin, Rank Metrics, Array-Error Correcting Codes, and Applications. Seminar given at R.H.B.N.C, University of London, 1992."},{"key":"CR5","series-title":"Lecture Notes in Computer Science","first-page":"547","volume-title":"Equivalent Goppa Codes and Trapdoors to McEliece's Public Key Cryptosystem","author":"J. K. Gibson","year":"1991","unstructured":"J. K. Gibson,Equivalent Goppa Codes and Trapdoors to McEliece's Public Key Cryptosystem, Lecture Notes in Computer Science, Springer-Verlag, New York, 547 (1991)."},{"key":"CR6","unstructured":"R. Heiman,On the Security of Cryptosystems Based on Linear Error Correcting Codes. MSc. Thesis, Feinberg Graduate School of the Weizmann Institute of Science. August 1987."},{"key":"CR7","series-title":"Lecture Notes in Computer Science","first-page":"330","volume-title":"An Observation on the Security of McEliece's Public Key Cryptosystem","author":"P. J. Lee","year":"1988","unstructured":"P. J. Lee and E. F. Brickell,An Observation on the Security of McEliece's Public Key Cryptosystem, Lecture Notes in Computer Science, Springer-Verlag, New York, 330 (1988)."},{"key":"CR8","unstructured":"R. Lidl and H. Niederreiter,Introduction to Finite Fields and their Applications, Cambridge University Press (1986)."},{"key":"CR9","unstructured":"R. J. McEliece,A Public Key Cryptosystem Based on Algebraic Coding Theory, DSN Progress Report (Jan, Feb), Jet Propulsion Lab., California Institute of Technology, 1978."},{"key":"CR10","series-title":"Lecture Notes in Computer Science","first-page":"403","volume-title":"On the McEliece Public Key Cryptosystem","author":"J. Tilburg Van","year":"1988","unstructured":"J. Van Tilburg,On the McEliece Public Key Cryptosystem, Lecture Notes in Computer Science, Springer-Verlag, New York, 403 (1988)."}],"container-title":["Designs, Codes and Cryptography"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/BF01390769\/fulltext.html","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/BF01390769.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/BF01390769\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/BF01390769","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,2]],"date-time":"2019-05-02T12:25:44Z","timestamp":1556799944000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/BF01390769"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1995,7]]},"references-count":10,"journal-issue":{"issue":"1","published-print":{"date-parts":[[1995,7]]}},"alternative-id":["BF01390769"],"URL":"https:\/\/doi.org\/10.1007\/bf01390769","relation":{},"ISSN":["0925-1022","1573-7586"],"issn-type":[{"value":"0925-1022","type":"print"},{"value":"1573-7586","type":"electronic"}],"subject":[],"published":{"date-parts":[[1995,7]]}}}