{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,28]],"date-time":"2026-02-28T13:00:34Z","timestamp":1772283634892,"version":"3.50.1"},"reference-count":12,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2003,11,1]],"date-time":"2003-11-01T00:00:00Z","timestamp":1067644800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IJIS"],"published-print":{"date-parts":[[2003,11]]},"DOI":"10.1007\/s10207-003-0023-7","type":"journal-article","created":{"date-parts":[[2003,12,11]],"date-time":"2003-12-11T00:44:12Z","timestamp":1071103452000},"page":"37-44","source":"Crossref","is-referenced-by-count":6,"title":["Zheng and Seberry\u2019s public key encryption scheme revisited"],"prefix":"10.1007","volume":"2","author":[{"given":"Joonsang","family":"Baek","sequence":"first","affiliation":[]},{"given":"Yuliang","family":"Zheng","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2003,11,1]]},"reference":[{"key":"23_CRDHIES","doi-asserted-by":"crossref","unstructured":"Abdala M, Bellare M, Rogaway P (2001) The oracle Diffie\u2013Hellman assumptions and an analysis of DHIES. In: Naccache D (ed) Progress in cryptology \u2013 CT-RSA 2001, San Francisco. Lecture notes in computer science, vol 2020, Springer, Berlin Heidelberg New York, pp 143\u2013158","DOI":"10.1007\/3-540-45353-9_12"},{"key":"23_CRRANS","doi-asserted-by":"crossref","unstructured":"Bellare M, Desai A, Pointcheval D, Rogaway P (1998) Relations among notions of security for public-key encryption schemes. In: Krawczyk H (ed) Advances in cryptology \u2013 Crypto \u201998, Santa Barbara. Lecture notes in computer science, vol 1462, Springer, Berlin Heidelberg New York, pp 26\u201345","DOI":"10.1007\/BFb0055718"},{"key":"23_CRROP","doi-asserted-by":"crossref","unstructured":"Bellare M, Rogaway P (1993) Random oracles are practical: A paradigm for designing efficient protocols. In: Proceedings of the 1st ACM conference on computer and communications security, Fairfax, VA, November 1993. ACM Press, New York, pp 62\u201373","DOI":"10.1145\/168588.168596"},{"key":"23_CRSHA1","unstructured":"FIPS Publication 180-1 (1995) Secure hash standard"},{"key":"23_CRIEEEP1363","doi-asserted-by":"crossref","unstructured":"IEEE P1363 (2000) Standard specifications for public key cryptography","DOI":"10.1016\/S1353-4858(00)03013-0"},{"key":"23_CRLL","unstructured":"Lim C, Lee P (1993) Another method for attaining security against adaptively chosen ciphertext attack. In: Stinson D (ed) Advances in cryptology \u2013 Crypto \u201993, Santa Barbara, CA. Lecture notes in computer science, vol 773, Springer, Berlin Heidelberg New York, pp 410\u2013434"},{"key":"23_CROP","doi-asserted-by":"crossref","unstructured":"Okamoto T, Pointcheval D (2001) The Gap-problems: a new class of problems for the security of cryptographic schemes. In: Kim K (ed) Public key cryptography \u2013 PKC 2001, Cheju Island, South Korea. Lecture notes in computer science, vol 1992, Springer, Berlin Heidelberg New York, pp 104\u2013118","DOI":"10.1007\/3-540-44586-2_8"},{"key":"23_CROP2","doi-asserted-by":"crossref","unstructured":"Okamoto T, Pointcheval D (2001) REACT: Rapid enhanced-security asymmetric cryptosystem transform. In: Naccache D (ed) Progress in cryptology \u2013 CT-RSA 2001, San Francisco. Lecture notes in computer science, vol 2020, Springer, Berlin Heidelberg New York, pp 159\u2013174","DOI":"10.1007\/3-540-45353-9_13"},{"key":"23_CRSHOUP2","doi-asserted-by":"crossref","unstructured":"Shoup V (2001) OAEP reconsidered. In: Kilian J (ed) Advances in cryptology \u2013 Crypto 2001, Santa Barbara, CA. Lecture notes in computer science, vol 2139, Springer, Berlin Heidelberg New York, pp 239\u2013259","DOI":"10.1007\/3-540-44647-8_15"},{"key":"23_CRSOLDERA","doi-asserted-by":"crossref","unstructured":"Soldera D, Seberry J, Qu C (2002) The analysis of Zheng\u2013Seberry scheme. In: Batten L, Seberry J (eds) Proceedings of the Australasian conference on information security and privacy \u2013 ACISP 2002, Melbourne, Australia, July 2002. Lecture notes in computer science, vol 2384, Springer, Berlin Heidelberg New York, pp 159\u2013168","DOI":"10.1007\/3-540-45450-0_13"},{"key":"23_CRZIM","unstructured":"Zheng Y (1994) Improved public key cryptosystems secure against chosen ciphertext attacks. Technical Note, The Centre for Computer Security Research, University of Wollongong, Sydney, Australia"},{"key":"23_CRZS","unstructured":"Zheng Y, Seberry J (1992) Practical approaches to attaining security against adaptively chosen ciphertext attacks. In: Brickell E (ed) Advances in cryptology \u2013 Crypto \u201992, Santa Barbara, CA. Lecture notes in computer science, vol 742, Springer, Berlin Heidelberg New York, pp 292\u2013304"}],"container-title":["International Journal of Information Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-003-0023-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10207-003-0023-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-003-0023-7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,3,27]],"date-time":"2020-03-27T23:43:06Z","timestamp":1585352586000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10207-003-0023-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2003,11]]},"references-count":12,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2003,11]]}},"alternative-id":["23"],"URL":"https:\/\/doi.org\/10.1007\/s10207-003-0023-7","relation":{},"ISSN":["1615-5262","1615-5270"],"issn-type":[{"value":"1615-5262","type":"print"},{"value":"1615-5270","type":"electronic"}],"subject":[],"published":{"date-parts":[[2003,11]]}}}