{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T13:21:51Z","timestamp":1725456111841},"publisher-location":"Berlin, Heidelberg","reference-count":6,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540636960"},{"type":"electronic","value":"9783540696285"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1997]]},"DOI":"10.1007\/bfb0028493","type":"book-chapter","created":{"date-parts":[[2005,11,22]],"date-time":"2005-11-22T03:09:54Z","timestamp":1132628994000},"page":"381-385","source":"Crossref","is-referenced-by-count":0,"title":["On the powerline system"],"prefix":"10.1007","author":[{"given":"Paul","family":"Camion","sequence":"first","affiliation":[]},{"given":"Herv\u00e9","family":"Chabanne","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2005,6,17]]},"reference":[{"key":"37_CR1","doi-asserted-by":"publisher","first-page":"578","DOI":"10.1109\/5.4443","volume":"76","author":"E.F. Brickell","year":"1988","unstructured":"E.F. Brickell, A.M. Odlyzko, Cryptanalysis: a survey of recent resiults,Proc. IEEE 76 (1988),578\u2013593.","journal-title":"Proc. IEEE"},{"key":"37_CR2","doi-asserted-by":"publisher","first-page":"901","DOI":"10.1109\/18.21214","volume":"34","author":"B. Chor","year":"1988","unstructured":"B.Chor, R.L. Rivest, A knapsack-type public key Cyptosystem based on arithmetic in finite fields, IEEE Trans. Informs. Theory 34 (1988), 901\u2013909.","journal-title":"IEEE Trans. Informs. Theory"},{"key":"37_CR3","doi-asserted-by":"crossref","unstructured":"T.M. Cover, Enumerative source encoding, IEEE Trans. Inf. Theory, VolIT-19,p. 73 77,1973.","DOI":"10.1109\/TIT.1973.1054929"},{"key":"37_CR4","doi-asserted-by":"publisher","first-page":"149","DOI":"10.1007\/BF00196908","volume":"3","author":"H.W. Lenstra Jr.","year":"1991","unstructured":"H.W.Lenstra, Jr. On the Chor-Rivest Knapsack Cryptosystem, J. Cryptology (1991) 3:149\u2013155","journal-title":"J. Cryptology"},{"key":"37_CR5","volume-title":"The theory of Error-correcting codes","author":"F.J. MacWilliams","year":"1977","unstructured":"F.J. MacWilliams and N. J. A. Sloane, The theory of Error-correcting codes, Amsterdam, North-Holland, 1977."},{"key":"37_CR6","unstructured":"C.P. Schnorr and H.H. H\u00f6rner, Attacking the Chor-Rivest Cryptosystem by Lattice Reduction Advances in Cryptology-EUROCRYPT'95 LNCS NO 921 Springer"}],"container-title":["Lecture Notes in Computer Science","Information and Communications Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/BFb0028493","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,4,10]],"date-time":"2020-04-10T22:57:58Z","timestamp":1586559478000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/BFb0028493"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1997]]},"ISBN":["9783540636960","9783540696285"],"references-count":6,"URL":"https:\/\/doi.org\/10.1007\/bfb0028493","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[1997]]}}}