{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,25]],"date-time":"2025-11-25T13:26:24Z","timestamp":1764077184032},"reference-count":20,"publisher":"Springer Science and Business Media LLC","issue":"8","license":[{"start":{"date-parts":[[2014,3,15]],"date-time":"2014-03-15T00:00:00Z","timestamp":1394841600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Circuits Syst Signal Process"],"published-print":{"date-parts":[[2014,8]]},"DOI":"10.1007\/s00034-014-9759-8","type":"journal-article","created":{"date-parts":[[2014,3,18]],"date-time":"2014-03-18T00:56:47Z","timestamp":1395104207000},"page":"2539-2548","source":"Crossref","is-referenced-by-count":11,"title":["The Number Theoretic Hilbert Transform"],"prefix":"10.1007","volume":"33","author":[{"given":"Subhash","family":"Kak","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,3,15]]},"reference":[{"key":"9759_CR1","doi-asserted-by":"crossref","unstructured":"R.C. Agarwal, C.S. Burrus, Number theoretic transforms to implement fast digital convolution. Proc. IEEE 63, 550\u2013560 (1975)","DOI":"10.1109\/PROC.1975.9791"},{"key":"9759_CR2","unstructured":"C.H. Bennett, G. Brassard, Quantum cryptography: Public key distribution and coin tossing. Proceedings of the IEEE International Conference on Computers, Systems, and Signal Processing, Bangalore, India, 175\u2013179, IEEE, New York, 1984"},{"key":"9759_CR3","doi-asserted-by":"crossref","unstructured":"Y. Chen et al, Multi-photon tolerant secure quantum communication from theory to practice. IEEE ICC 2013 Communication and Information Systems Security Symposium, 2013","DOI":"10.1109\/ICC.2013.6654838"},{"key":"9759_CR4","doi-asserted-by":"crossref","DOI":"10.1017\/CBO9780511546891","volume-title":"Foundations of Cryptography","author":"O Goldreich","year":"2001","unstructured":"O. Goldreich, Foundations of Cryptography (Cambridge University Press, Cambridge, 2001)"},{"key":"9759_CR5","unstructured":"N.S. Jayant and S. Kak, Uniform permutation privacy system, US Patent No. 4,100,374, 11 July 1978"},{"key":"9759_CR6","doi-asserted-by":"crossref","first-page":"585","DOI":"10.1109\/PROC.1970.7696","volume":"58","author":"S Kak","year":"1970","unstructured":"S. Kak, The discrete Hilbert transform. Proc. IEEE 58, 585\u2013586 (1970)","journal-title":"Proc. IEEE"},{"key":"9759_CR7","doi-asserted-by":"crossref","first-page":"177","DOI":"10.1080\/00207217308938428","volume":"34","author":"S Kak","year":"1973","unstructured":"S. Kak, Hilbert transformation for discrete data. Int. J. Electron. 34, 177\u2013183 (1973)","journal-title":"Int. J. Electron."},{"key":"9759_CR8","first-page":"1385","volume":"8","author":"S Kak","year":"1977","unstructured":"S. Kak, The discrete finite Hilbert transform. Indian J. Pure Appl. Math. 8, 1385\u20131390 (1977)","journal-title":"Indian J. Pure Appl. Math."},{"key":"9759_CR9","doi-asserted-by":"crossref","first-page":"781","DOI":"10.1002\/j.1538-7305.1977.tb00539.x","volume":"56","author":"S Kak","year":"1977","unstructured":"S. Kak, N.S. Jayant, Speech encryption using waveform scrambling. Bell Syst. Tech. J. 56, 781\u2013808 (1977)","journal-title":"Bell Syst. Tech. J."},{"key":"9759_CR10","doi-asserted-by":"crossref","first-page":"347","DOI":"10.1016\/0020-0255(88)90010-2","volume":"45","author":"S Kak","year":"1988","unstructured":"S. Kak, Multilayered array computing. Inf. Sci. 45, 347\u2013365 (1988)","journal-title":"Inf. Sci."},{"key":"9759_CR11","doi-asserted-by":"crossref","first-page":"383","DOI":"10.1016\/0167-8191(88)90078-6","volume":"6","author":"S Kak","year":"1988","unstructured":"S. Kak, A two-layered mesh array for matrix multiplication. Parallel Computing 6, 383\u2013385 (1988)","journal-title":"Parallel Computing"},{"key":"9759_CR12","doi-asserted-by":"crossref","first-page":"293","DOI":"10.1007\/s10702-006-0520-9","volume":"19","author":"S Kak","year":"2006","unstructured":"S. Kak, A three-stage quantum cryptography protocol. Found. Phys. Lett. 19, 293\u2013296 (2006)","journal-title":"Found. Phys. Lett."},{"key":"9759_CR13","unstructured":"R. Kandregula, The basic discrete Hilbert transform with an information hiding application. (2009). arXiv:0907.4176"},{"key":"9759_CR14","unstructured":"R. Kandregula, Towards a number theoretic discrete Hilbert transform. (2009). arXiv:0911.2466"},{"key":"9759_CR15","doi-asserted-by":"crossref","first-page":"259","DOI":"10.1049\/ip-cds:19971399","volume":"144","author":"SK Padala","year":"1997","unstructured":"S.K. Padala, K.M.M. Prabhu, Systolic arrays for the discrete Hilbert transform. Circuits Dev. Syst. IEEE Proc. 144, 259\u2013264 (1997)","journal-title":"Circuits Dev. Syst. IEEE Proc."},{"key":"9759_CR16","doi-asserted-by":"crossref","unstructured":"J.M. Pollard, Implementation of number theoretic transforms. Electron. Lett. 12, 378\u2013379 (1976)","DOI":"10.1049\/el:19760289"},{"key":"9759_CR17","unstructured":"R.S. Reddy, Encryption of binary and non-binary data using chained Hadamard transforms. (2010). arXiv:1012.4452"},{"key":"9759_CR18","doi-asserted-by":"crossref","first-page":"468","DOI":"10.1109\/TIT.1976.1055583","volume":"IT\u201322","author":"IS Reed","year":"1976","unstructured":"I.S. Reed, T.K. Truong, Convolutions over residue classes of quadratic integers. IEEE Trans. Inf. Theory IT\u201322, 468\u2013475 (1976)","journal-title":"IEEE Trans. Inf. Theory"},{"key":"9759_CR19","doi-asserted-by":"crossref","first-page":"270","DOI":"10.1109\/TBC.2009.2014993","volume":"55","author":"M Satti","year":"2009","unstructured":"M. Satti, S. Kak, Multilevel indexed quasigroup encryption for data and speech. IEEE Trans. Broadcast. 55, 270\u2013281 (2009)","journal-title":"IEEE Trans. Broadcast."},{"key":"9759_CR20","doi-asserted-by":"crossref","DOI":"10.1017\/CBO9780511815911","volume-title":"Statistical Signal Processing of Complex-valued Data: The Theory of Improper and Noncircular Signals","author":"P Schreier","year":"2010","unstructured":"P. Schreier, L. Scharf, Statistical Signal Processing of Complex-valued Data: The Theory of Improper and Noncircular Signals (Cambridge University Press, Cambridge, 2010)"}],"container-title":["Circuits, Systems, and Signal Processing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00034-014-9759-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s00034-014-9759-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00034-014-9759-8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,8]],"date-time":"2019-08-08T11:01:40Z","timestamp":1565262100000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s00034-014-9759-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,3,15]]},"references-count":20,"journal-issue":{"issue":"8","published-print":{"date-parts":[[2014,8]]}},"alternative-id":["9759"],"URL":"https:\/\/doi.org\/10.1007\/s00034-014-9759-8","relation":{},"ISSN":["0278-081X","1531-5878"],"issn-type":[{"value":"0278-081X","type":"print"},{"value":"1531-5878","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014,3,15]]}}}