{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,30]],"date-time":"2025-07-30T14:47:33Z","timestamp":1753886853662,"version":"3.32.0"},"publisher-location":"Berlin, Heidelberg","reference-count":14,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540593393"},{"type":"electronic","value":"9783540492368"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1995]]},"DOI":"10.1007\/bfb0000438","type":"book-chapter","created":{"date-parts":[[2005,10,7]],"date-time":"2005-10-07T15:27:29Z","timestamp":1128698849000},"page":"238-248","source":"Crossref","is-referenced-by-count":5,"title":["A digital signature scheme based on linear error-correcting block codes"],"prefix":"10.1007","author":[{"given":"Mohssen","family":"Alabbadi","sequence":"first","affiliation":[]},{"given":"Stephen B.","family":"Wicker","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2005,9,8]]},"reference":[{"issue":"11","key":"19_CR1","doi-asserted-by":"crossref","first-page":"644","DOI":"10.1109\/TIT.1976.1055638","volume":"22","author":"W. Diffie","year":"1976","unstructured":"W. Diffie and M. E. Hellman. New direction in cryptography. IEEE Transactions on Information theory, 22(11):644\u2013654, November 1976.","journal-title":"IEEE Transactions on Information theory"},{"key":"19_CR2","first-page":"114","volume-title":"JPL DSN Progress Report 42\u201344","author":"R. J. McEliece","year":"1987","unstructured":"R. J. McEliece. Public-key cryptosystem based on algebraic coding theory. JPL DSN Progress Report 42\u201344, Jet Propulsion Laboratory, California Institute of Technology, Pasadena, CA, USA, January & February 1987, pages 114\u2013116."},{"issue":"3","key":"19_CR3","doi-asserted-by":"crossref","first-page":"384","DOI":"10.1109\/TIT.1978.1055873","volume":"IT-24","author":"E. R. Berlekamp","year":"1978","unstructured":"E. R. Berlekamp, R.J. McEliece, and H. van Tilborg. On the inherent intractibility of certain coding problem. IEEE Transactions on Information theory, IT-24(3):384\u2013386, May 1978.","journal-title":"IEEE Transactions on Information theory"},{"issue":"13","key":"19_CR4","doi-asserted-by":"crossref","first-page":"898","DOI":"10.1049\/el:19900586","volume":"26","author":"W. Xinmei","year":"1990","unstructured":"W. Xinmei. Digital signature scheme based on error-correcting codes. Electronics Letters, 26(13):898\u2013899, 21st June 1990.","journal-title":"Electronics Letters"},{"issue":"4","key":"19_CR5","doi-asserted-by":"crossref","first-page":"829","DOI":"10.1109\/18.32159","volume":"35","author":"T. R. N. Rao","year":"1989","unstructured":"T. R. N. Rao and K. Nam. Private-key algebraic-code encryption. IEEE Transactions on Information theory, 35(4):829\u2013833, July 1989.","journal-title":"IEEE Transactions on Information theory"},{"issue":"2","key":"19_CR6","doi-asserted-by":"crossref","first-page":"157","DOI":"10.1049\/el:19920098","volume":"28","author":"L. Harn","year":"1992","unstructured":"L. Harn and D.-C. Wang. Cryptanalysis and modification of digital signature scheme based on error-correcting codes. Electronics Letters, 28(2):157\u2013159, 16th January 1992.","journal-title":"Electronics Letters"},{"issue":"9","key":"19_CR7","doi-asserted-by":"crossref","first-page":"890","DOI":"10.1049\/el:19920561","volume":"28","author":"M. Alabbadi","year":"1992","unstructured":"M. Alabbadi and S. B. Wicker. Security of Xinmei's digital signature scheme. Electronics Letters, 28(9):890\u2013891, 23rd April 1992.","journal-title":"Electronics Letters"},{"issue":"18","key":"19_CR8","doi-asserted-by":"crossref","first-page":"1756","DOI":"10.1049\/el:19921118","volume":"28","author":"M. Alabbadi","year":"1992","unstructured":"M. Alabbadi and S. B. Wicker. Cryptanalysis of the Harn and Wang modification of the Xinmei digital signature scheme. Electronics Letters, 28(18):1756\u20131758, 27th August 1992.","journal-title":"Electronics Letters"},{"issue":"20","key":"19_CR9","doi-asserted-by":"crossref","first-page":"1935","DOI":"10.1049\/el:19921238","volume":"28","author":"J. Tilburg van","year":"1992","unstructured":"J. van Tilburg. Cryptanalysis of Xinmei digital signature scheme. Electronics Letters, 28(20):1935\u20131936, 24th September 1992.","journal-title":"Electronics Letters"},{"key":"19_CR10","doi-asserted-by":"crossref","unstructured":"M. Alabbadi and S. B. Wicker. Digital signature schemes based on errorcorrecting codes. In IEEE International Symposium on Information Theory, page 199, San Antonio, Texas, USA, January 17\u201322 1993.","DOI":"10.1109\/ISIT.1993.748513"},{"key":"19_CR11","doi-asserted-by":"crossref","unstructured":"M. Alabbadi and S. B. Wicker. Susceptiblity of digital signature schemes based on error-correcting codes to universal forgery. In The Workshop on Information Protection, Moscow, December 6\u20139 1993.","DOI":"10.1007\/3-540-58265-7_2"},{"key":"19_CR12","unstructured":"J. van Tilburg. Cryptanalysis of the Alabbadi-Wicker digital signature scheme. In Proceedings of the Fourteenth Symposium on Information Theory in the Benelux, pages 114\u2013119, Veldhoven, Netherlands, May 17\u201318 1993."},{"key":"19_CR13","first-page":"445","volume-title":"Lecture Notes in Computer Science # 239","author":"R. Struik","year":"1987","unstructured":"R. Struik and J. van Tilburg. The Rao-Nam scheme is insecure against a chosen plaintext attack. In C. Pomeranc, editor, Advances in Crypology-Crypto'87 Proceedings, pages 445\u2013457, Santa Barbara, CA, USA, August 16\u201320 1987, Springer-Verlag. (Lecture Notes in Computer Science # 239)."},{"key":"19_CR14","doi-asserted-by":"crossref","unstructured":"J. Meijers and J. van Tilburg. On the Rao-Nam private-key cryptosystem using linear codes. In IEEE International Symposium on Information Theory, page 126, Budapest, Hungar, June 24\u201328 1991.","DOI":"10.1109\/ISIT.1991.695182"}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2014 ASIACRYPT'94"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/BFb0000438","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,4]],"date-time":"2025-01-04T21:05:52Z","timestamp":1736024752000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/BFb0000438"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1995]]},"ISBN":["9783540593393","9783540492368"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/bfb0000438","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[1995]]}}}