{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,29]],"date-time":"2025-09-29T07:46:36Z","timestamp":1759131996800},"reference-count":6,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[1990,2,1]],"date-time":"1990-02-01T00:00:00Z","timestamp":633830400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J. Cryptology"],"published-print":{"date-parts":[[1990,2]]},"DOI":"10.1007\/bf02252869","type":"journal-article","created":{"date-parts":[[2005,11,22]],"date-time":"2005-11-22T14:23:47Z","timestamp":1132669427000},"page":"51-59","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":57,"title":["A matrix key-distribution scheme"],"prefix":"10.1007","volume":"2","author":[{"given":"Gong","family":"Li","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"David J.","family":"Wheeler","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"key":"BF02252869_CR1","series-title":"Lecture Notes in Computer Science","first-page":"335","volume-title":"Advances in Cryptology: Proceedings of Eurocrypt 84","author":"R. Blom","year":"1984","unstructured":"R. Blom, An Optimal Class of Symmetric Key Generation Systems,Advances in Cryptology: Proceedings of Eurocrypt 84, Lecture Notes in Computer Science, vol. 209, Springer-Verlag, Berlin, 1984, pp. 335\u2013338."},{"issue":"6","key":"BF02252869_CR2","doi-asserted-by":"publisher","first-page":"644","DOI":"10.1109\/TIT.1976.1055638","volume":"22","author":"W. Diffie","year":"1976","unstructured":"W. Diffie and M. E. Hellman, New Directions in Cryptography,IEEE Transactions on Information Theory, vol. 22, no. 6, December 1976, pp. 644\u2013654.","journal-title":"IEEE Transactions on Information Theory"},{"key":"BF02252869_CR3","series-title":"Lecture Notes in Computer Science","first-page":"185","volume-title":"Advances in Cryptology: Proceedings of Crypto 87","author":"T. Matsumto","year":"1987","unstructured":"T. Matsumto and H. Imai, On the Key Predistribution System: A Practical Solutions to the Key Distribution Problem,Advances in Cryptology: Proceedings of Crypto 87, Lecture Notes in Computer Science, vol. 293, Springer-Verlag, Berlin, 1987, pp. 185\u2013193."},{"issue":"2","key":"BF02252869_CR4","doi-asserted-by":"crossref","first-page":"126","DOI":"10.1147\/sj.172.0126","volume":"17","author":"S. M. Matyas","year":"1978","unstructured":"S. M. Matyas and C. H. Meyer, Generation, Distribution, and Installation of Cryptography Keys,IBM Systems Journal, vol. 17, no. 2, 1978, pp. 126\u2013137.","journal-title":"IBM Systems Journal"},{"issue":"12","key":"BF02252869_CR5","doi-asserted-by":"publisher","first-page":"993","DOI":"10.1145\/359657.359659","volume":"21","author":"R. M. Needham","year":"1978","unstructured":"R. M. Needham and M. D. Schroeder, Using Encryption for Authentication in Large Networks of Computers,Communications of the ACM, vol. 21, no. 12, December 1978, pp. 993\u2013999.","journal-title":"Communications of the ACM"},{"issue":"2","key":"BF02252869_CR6","doi-asserted-by":"publisher","first-page":"135","DOI":"10.1145\/356909.356913","volume":"15","author":"V. L. Voydock","year":"1983","unstructured":"V. L. Voydock and S. T. Kent, Security Mechanisms in High-Level Network Protocols,ACM Computing Surveys, vol. 15, no. 2, 1983, pp. 135\u2013171.","journal-title":"ACM Computing Surveys"}],"container-title":["Journal of Cryptology"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/BF02252869.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/BF02252869\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/BF02252869","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/BF02252869.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,4,8]],"date-time":"2020-04-08T08:30:33Z","timestamp":1586334633000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/BF02252869"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1990,2]]},"references-count":6,"journal-issue":{"issue":"1","published-print":{"date-parts":[[1990,2]]}},"alternative-id":["BF02252869"],"URL":"https:\/\/doi.org\/10.1007\/bf02252869","relation":{},"ISSN":["0933-2790","1432-1378"],"issn-type":[{"value":"0933-2790","type":"print"},{"value":"1432-1378","type":"electronic"}],"subject":[],"published":{"date-parts":[[1990,2]]},"assertion":[{"value":"31 March 1988","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"17 August 1989","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}