{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,5]],"date-time":"2022-04-05T18:47:32Z","timestamp":1649184452541},"reference-count":17,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[1982,12,1]],"date-time":"1982-12-01T00:00:00Z","timestamp":407548800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Computing"],"published-print":{"date-parts":[[1982,12]]},"DOI":"10.1007\/bf02246756","type":"journal-article","created":{"date-parts":[[2005,11,15]],"date-time":"2005-11-15T01:10:48Z","timestamp":1132017048000},"page":"277-287","source":"Crossref","is-referenced-by-count":1,"title":["\u00dcber die mathematischen Grundlagen einiger Chiffrierverfahren"],"prefix":"10.1007","volume":"29","author":[{"given":"A.","family":"Ecker","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"BF02246756_CR1","unstructured":"Acz\u00e9l, J.: Lectures on functional equations and their applications. Academic Press 1966."},{"key":"BF02246756_CR2","first-page":"670","volume":"80","author":"J. V. Brawley","year":"1973","unstructured":"Brawley, J. V., Carlitz, L.: A characterization of the n\u00d7n matrices over a finite field. Amer. Math. Monthly80, 670\u2013672 (1973).","journal-title":"Amer. Math. Monthly"},{"key":"BF02246756_CR3","doi-asserted-by":"crossref","first-page":"644","DOI":"10.1109\/TIT.1976.1055638","volume":"22","author":"W. Diffie","year":"1976","unstructured":"Diffie, W., Hellman, M. E.: New directions in cryptography, IEEE Trans. Inf. Theory IT-22, 644\u2013654 (1976).","journal-title":"IEEE Trans. Inf. Theory IT"},{"key":"BF02246756_CR4","first-page":"811","volume":"87","author":"A. Ecker","year":"1980","unstructured":"Ecker, A.: Comment on the note: \u201cThe congruencea r+s \u2261a r (modm)\u201d by A. E. Livingston and M. L. Livingston. Amer. Math. Monthly87, 811\u2013814 (1980).","journal-title":"Amer. Math. Monthly"},{"key":"BF02246756_CR5","first-page":"30","volume":"6","author":"A. Engel","year":"1979","unstructured":"Engel, A.: Datenschutz durch Chiffrieren: Mathematische und algorithmische Aspekte. MU6, 30\u201351 (1979).","journal-title":"MU"},{"key":"BF02246756_CR6","doi-asserted-by":"crossref","unstructured":"Hellman, M. E.: The mathematics of public-key cryptography. Scientific Amer., 130\u2013139 (August 1979).","DOI":"10.1038\/scientificamerican0879-146"},{"key":"BF02246756_CR7","first-page":"2","volume":"17","author":"E. Henze","year":"1979","unstructured":"Henze, E.: Kryptographie, Datenschutz und Daten\u00fcbertragung, Diebold Forschungsprogramm, Kryptographie. Arbeitsgruppenbericht AB17, 2\u201323 (1979).","journal-title":"Arbeitsgruppenbericht AB"},{"key":"BF02246756_CR8","first-page":"271","volume":"36","author":"H. K. Kaiser","year":"1974","unstructured":"Kaiser, H. K.: \u00dcber das Interpolationsproblem in nichtkommutativen Ringen. Acta Scient. Math. Szeged.36, 271\u2013273 (1974).","journal-title":"Acta Scient. Math. Szeged."},{"key":"BF02246756_CR9","unstructured":"Lausch, H., N\u00f6bauer, W.: Algebra of polynomials. North-Holland 1973."},{"key":"BF02246756_CR10","first-page":"97","volume":"85","author":"A. E. Livingston","year":"1978","unstructured":"Livingston, A. E., Livingston, M. L.: The congruencea r+s \u2261a r (modm). Amer. Math. Monthly85, 97\u2013100 (1978).","journal-title":"Amer. Math. Monthly"},{"key":"BF02246756_CR11","doi-asserted-by":"crossref","first-page":"180","DOI":"10.1016\/0020-0190(80)90135-0","volume":"10","author":"F. Luccio","year":"1980","unstructured":"Luccio, F., Mazzone, S.: A cryptosystem for multiple communication. Information Processing Letters10, 180\u2013183 (1980).","journal-title":"Information Processing Letters"},{"issue":"8","key":"BF02246756_CR12","first-page":"731","volume":"55","author":"Y. Matras","year":"1969","unstructured":"Matras, Y.: Sur l'equation fonctionnellef(xf(y))=f(x)f(y). Bull. Acad. Roy. Belg. Cl. Sci. (8)55, 731\u2013751 (1969).","journal-title":"Bull. Acad. Roy. Belg. Cl. Sci."},{"issue":"5","key":"BF02246756_CR13","first-page":"1118","volume":"59","author":"Y. Matras","year":"1973","unstructured":"Matras, Y.: T-op\u00e9rateurs sur un demi-groupe cyclique infini. Bull. Acad. Roy. Belg. Cl. Sci. (5)59, 1118\u20131123 (1973).","journal-title":"Bull. Acad. Roy. Belg. Cl. Sci."},{"key":"BF02246756_CR14","doi-asserted-by":"crossref","first-page":"106","DOI":"10.1109\/TIT.1978.1055817","volume":"24","author":"S. C. Pohlig","year":"1978","unstructured":"Pohlig, S. C., Hellman, M. E.: An improved algorithm for computing logarithms overGF(p) and its cryptographic significance. IEEE Trans. Inf. Theory IT-24, 106\u2013110 (1978).","journal-title":"IEEE Trans. Inf. Theory IT"},{"key":"BF02246756_CR15","doi-asserted-by":"crossref","first-page":"120","DOI":"10.1145\/359340.359342","volume":"21","author":"R. Rivest","year":"1978","unstructured":"Rivest, R., Shamir, A., Adleman, L.: A method for obtaining digital signatures and public-key cryptosystems. CACM21, 120\u2013126 (1978).","journal-title":"CACM"},{"key":"BF02246756_CR16","doi-asserted-by":"crossref","first-page":"406","DOI":"10.1080\/0161-117791833219","volume":"1","author":"G. J. Simmons","year":"1977","unstructured":"Simmons, G. J., Norris, J. J.: Preliminary remarks on the M.I.T. cryptosystem. Cryptologia1, 406\u2013414 (1977).","journal-title":"Cryptologia"},{"key":"BF02246756_CR17","doi-asserted-by":"crossref","first-page":"233","DOI":"10.1007\/BF03028244","volume":"1","author":"G. J. Simmons","year":"1979","unstructured":"Simmons, G. J.: Cryptology: The mathematics of secure communication. Mathematical Intelligencer1, 233\u2013246 (1979).","journal-title":"Mathematical Intelligencer"}],"container-title":["Computing"],"original-title":[],"language":"de","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/BF02246756.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/BF02246756\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/BF02246756","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,16]],"date-time":"2019-05-16T14:30:25Z","timestamp":1558017025000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/BF02246756"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1982,12]]},"references-count":17,"journal-issue":{"issue":"4","published-print":{"date-parts":[[1982,12]]}},"alternative-id":["BF02246756"],"URL":"https:\/\/doi.org\/10.1007\/bf02246756","relation":{},"ISSN":["0010-485X","1436-5057"],"issn-type":[{"value":"0010-485X","type":"print"},{"value":"1436-5057","type":"electronic"}],"subject":[],"published":{"date-parts":[[1982,12]]}}}