{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,30]],"date-time":"2026-03-30T13:28:03Z","timestamp":1774877283873,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":5,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540645184","type":"print"},{"value":"9783540697954","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1998]]},"DOI":"10.1007\/bfb0054127","type":"book-chapter","created":{"date-parts":[[2006,7,27]],"date-time":"2006-07-27T09:13:04Z","timestamp":1153991584000},"page":"201-210","source":"Crossref","is-referenced-by-count":3,"title":["Visual cryptanalysis"],"prefix":"10.1007","author":[{"given":"Adi","family":"Shamir","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2006,5,25]]},"reference":[{"issue":"n.11","key":"15_CR1","doi-asserted-by":"crossref","first-page":"1021","DOI":"10.1126\/science.7973651","volume":"266","author":"L. M. Adleman","year":"1994","unstructured":"L. M. Adleman, Molecular Computation of Solutions to Combinatorial Problems Science, v. 266 n. 11, Nov 1994, p. 1021.","journal-title":"Science"},{"key":"15_CR2","doi-asserted-by":"crossref","unstructured":"E. Biham, A Fast New DES Implementation in Software Proceedings of Fast Software Encryption 1997, Springer-Verlag, 1997.","DOI":"10.1007\/BFb0052329"},{"key":"15_CR3","unstructured":"D. G. Feitelson, Optical Computing published by the MIT Press, 1992."},{"key":"15_CR4","doi-asserted-by":"crossref","unstructured":"M. Naor and A. Shamir, Visual Cryptography Proceedings of Eurocrypt 94, Springer-Verlag, pp. 1\u201312.","DOI":"10.1007\/BFb0053419"},{"key":"15_CR5","doi-asserted-by":"crossref","unstructured":"P. W. Shor, Algorithms for Quantum Computation: Discrete Log and Factoring in Proceedings of the 35-th Symposium on Foundations of Computer Science, 1994, pp. 124\u2013134.","DOI":"10.1109\/SFCS.1994.365700"}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2014 EUROCRYPT'98"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/BFb0054127","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,10]],"date-time":"2025-01-10T03:17:31Z","timestamp":1736479051000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/BFb0054127"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1998]]},"ISBN":["9783540645184","9783540697954"],"references-count":5,"URL":"https:\/\/doi.org\/10.1007\/bfb0054127","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[1998]]}}}