{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,21]],"date-time":"2025-12-21T06:26:24Z","timestamp":1766298384125},"publisher-location":"Berlin, Heidelberg","reference-count":17,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540633846"},{"type":"electronic","value":"9783540695288"}],"license":[{"start":{"date-parts":[[1997,1,1]],"date-time":"1997-01-01T00:00:00Z","timestamp":852076800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1997]]},"DOI":"10.1007\/bfb0052237","type":"book-chapter","created":{"date-parts":[[2006,8,17]],"date-time":"2006-08-17T18:37:31Z","timestamp":1155839851000},"page":"213-220","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":48,"title":["Failure of the McEliece public-key cryptosystem under message-resend and related-message attack"],"prefix":"10.1007","author":[{"given":"Thomas A.","family":"Berson","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2006,5,17]]},"reference":[{"key":"14_CR1","first-page":"224","volume":"293","author":"C. Adams","year":"1988","unstructured":"C. Adams and H. Meijer, \u201cSecurity-related comments regarding McEliece's public-key cryptosystem\u201d, Advances in Cryptology\u2014Crypto '87 (LNCS 293), 224\u2013228, 1988.","journal-title":"LNCS"},{"key":"14_CR2","doi-asserted-by":"publisher","first-page":"454","DOI":"10.1109\/18.32140","volume":"35","author":"C. Adams","year":"1989","unstructured":"C. Adams and H. Meijer, \u201cSecurity-related comments regarding McEliece's public-key cryptosystem\u201d, IEEE Transactions on Information Theory, 35 (1989), 454\u2013455.","journal-title":"IEEE Transactions on Information Theory"},{"key":"14_CR3","first-page":"232","volume":"950","author":"M. Bellare","year":"1994","unstructured":"M. Bellare and P. Rogaway, \u201cOptimal asymmetric encryption\u201d, Advances in Cryptology \u2014 EUROCRYPT 94 (LNCS 950), 232\u2013249, 1994.","journal-title":"LNCS"},{"key":"14_CR4","doi-asserted-by":"publisher","first-page":"384","DOI":"10.1109\/TIT.1978.1055873","volume":"24","author":"E.R. Berlekamp","year":"1978","unstructured":"E.R. Berlekamp, R.J. McEliece, and H.C.A. van Tilborg, \u201cOn the inherent intractability of certain coding problems\u201d, IEEE Transactions on Information Theory, 24 (1978), 384\u2013386.","journal-title":"IEEE Transactions on Information Theory"},{"key":"14_CR5","first-page":"482","volume":"547","author":"E.M. Gabidulin","year":"1991","unstructured":"E.M. Gabidulin, A.V. Paramonov, and O.V. Tretjakov, \u201cIdeals over a non-commutative ring and their application in cryptology\u201d. Advances in Cryptology\u2014EUROCRYPT '91 (LNCS 547), 482\u2013489, 1991.","journal-title":"LNCS"},{"key":"14_CR6","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1007\/BF01390769","volume":"6","author":"J.K. Gibson","year":"1995","unstructured":"J.K. Gibson, \u201cSeverely denting the Gabidulin version of the McEliece public key cryptosystem\u201d, Designs, Codes and Cryptography, 6 (1995), 37\u201345.","journal-title":"Designs, Codes and Cryptography"},{"key":"14_CR7","first-page":"212","volume":"1070","author":"J.K. Gibson","year":"1996","unstructured":"J.K. Gibson, \u201cThe security of the Gabidulin public key cryptosystem\u201d, Advances in Cryptology\u2014EUROCRYPT '96 (LNCS 1070), 212\u2013223, 1996.","journal-title":"LNCS"},{"key":"14_CR8","volume-title":"M.Sc. Thesis","author":"R. Heiman","year":"1987","unstructured":"R. Heiman, \u201cOn the security of cryptosystems based on linear error-correcting codes\u201d, M.Sc. Thesis, Feinburg Graduate School, Weitzmann Institute of Science, Rehovot, August, 1987."},{"key":"14_CR9","volume-title":"M.Sc. Thesis","author":"P.J.M. Hin","year":"1986","unstructured":"P.J.M. Hin, \u201cChannel-error-correcting privacy cryptosystems\u201d, M.Sc. Thesis, Delft University of Technology, Delft, 1986."},{"key":"14_CR10","unstructured":"F. Jorissen, \u201cA security evaluation of the public-key cipher system proposed by R.J. McEliece, used as a combined scheme\u201d, Technical report, Katholieke Universiteit Leuven, Dept. Elektrotechniek, January, 1986."},{"key":"14_CR11","first-page":"68","volume":"547","author":"V.I. Korzhik","year":"1991","unstructured":"V.I. Korzhik and A.I. Turkin, \u201cCryptanalysis of McEliece's public-key cryptosystem\u201d, Advances in Cryptology\u2014EUROCRYPT 91 (LNCS 547), 68\u201370, 1991.","journal-title":"LNCS"},{"key":"14_CR12","first-page":"275","volume":"330","author":"P.J. Lee","year":"1988","unstructured":"P.J. Lee and E.F. Brickell, \u201cAn observation on the security of McEliece's public-key cryptosystem\u201d, Advances in Cryptology\u2014EUROCRYPT '88 (LNCS 330), 275\u2013280, 1988.","journal-title":"LNCS"},{"key":"14_CR13","doi-asserted-by":"publisher","first-page":"271","DOI":"10.1109\/18.272496","volume":"40","author":"Y.X. Li","year":"1994","unstructured":"Y.X. Li, R.H. Deng, and X.M. Wang, \u201cOn the equivalence of McEliece's and Neiderreiter's public-key cryptosystem\u201d, IEEE Transactions on Information Theory, 40 (1994), 271\u2013273.","journal-title":"IEEE Transactions on Information Theory"},{"key":"14_CR14","volume-title":"DSN Progress Report 42-44","author":"R.J. McEliece","year":"1978","unstructured":"R.J. McEliece, \u201cA public-key cryptosystem based on algebraic coding theory\u201d, DSN Progress Report 42-44, Jet Propulsion Laboratory, Pasadena, 1978."},{"key":"14_CR15","first-page":"159","volume":"15","author":"H. Neiderreiter","year":"1986","unstructured":"H. Neiderreiter, \u201cKnapsack-type cryptosystems and algebraic coding theory\u201d, Problems of Control and Information Theory, 15 (1986), 159\u2013166.","journal-title":"Problems of Control and Information Theory"},{"key":"14_CR16","first-page":"119","volume":"403","author":"J. Tilburg Van","year":"1990","unstructured":"J. Van Tilburg, \u201cOn the McEliece public-key cryptosystem\u201d, Advances in Cryptology\u2014Crypto '88 (LNCS 403), 119\u2013131, 1990.","journal-title":"LNCS"},{"key":"14_CR17","volume-title":"Ph.D. Thesis","author":"J. Tilburg Van","year":"1994","unstructured":"J. Van Tilburg, \u201cSecurity analysis of a class of cryptosystems based on linear error-correcting codes\u201d, Ph.D. Thesis, Technische Universiteit Eindhoven, Eindhoven, November, 1994."}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2014 CRYPTO '97"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/BFb0052237","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,1,30]],"date-time":"2020-01-30T03:22:55Z","timestamp":1580354575000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/BFb0052237"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1997]]},"ISBN":["9783540633846","9783540695288"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/bfb0052237","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[1997]]},"assertion":[{"value":"17 May 2006","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}