{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,2,15]],"date-time":"2024-02-15T06:10:30Z","timestamp":1707977430643},"reference-count":15,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2007,6,22]],"date-time":"2007-06-22T00:00:00Z","timestamp":1182470400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Des. Codes Cryptogr."],"published-print":{"date-parts":[[2007,9,5]]},"DOI":"10.1007\/s10623-007-9091-4","type":"journal-article","created":{"date-parts":[[2007,6,21]],"date-time":"2007-06-21T16:35:30Z","timestamp":1182443730000},"page":"95-121","source":"Crossref","is-referenced-by-count":6,"title":["A sequence approach to linear perfect hash families"],"prefix":"10.1007","volume":"45","author":[{"given":"Susan G.","family":"Barwick","sequence":"first","affiliation":[]},{"given":"Wen-Ai","family":"Jackson","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2007,6,22]]},"reference":[{"key":"9091_CR1","doi-asserted-by":"crossref","first-page":"353","DOI":"10.1002\/(SICI)1520-6610(1996)4:5<353::AID-JCD4>3.0.CO;2-E","volume":"4","author":"M Atici","year":"1996","unstructured":"Atici M, Magliveras SS, Stinson DR, Wei W-D (1996) Some recursive constructions for perfect hash families. J Combin Designs 4:353\u2013363","journal-title":"J Combin Designs"},{"key":"9091_CR2","first-page":"127","volume":"35","author":"M Atici","year":"2000","unstructured":"Atici M, Stinson DR, Wei R (2000) A new practical algorithm for the construction of a perfect hash function. J Combin Math Combin Comput 35:127\u2013145","journal-title":"J Combin Math Combin Comput"},{"key":"9091_CR3","doi-asserted-by":"crossref","first-page":"311","DOI":"10.1002\/jcd.20010","volume":"12","author":"SG Barwick","year":"2004","unstructured":"Barwick SG, Jackson W-A, Quinn CT (2004) Optimal linear perfect hash families with small parameters. J Combin Designs 12:311\u2013324","journal-title":"J Combin Designs"},{"key":"9091_CR4","unstructured":"Barwick SG, Jackson W-A (Preprint) Geometrical constructions of optimal linear perfect hash families. Available at Cryptology ePrint Archive: Report 2006\/002"},{"key":"9091_CR5","first-page":"49","volume":"403","author":"SR Blackburn","year":"1999","unstructured":"Blackburn SR (1999) Combinatorics and threshold cryptography. Combinatorial designs and their applications. CRC Res Notes Math 403:49\u201370","journal-title":"CRC Res Notes Math"},{"key":"9091_CR6","doi-asserted-by":"crossref","first-page":"54","DOI":"10.1006\/jcta.1999.3050","volume":"92","author":"SR Blackburn","year":"2000","unstructured":"Blackburn SR (2000) Perfect hash families: probabilistic methods and explicit constructions. J Combin Theory Ser A 92:54\u201360","journal-title":"J Combin Theory Ser A"},{"key":"9091_CR7","doi-asserted-by":"crossref","unstructured":"Blackburn SR, Burmester M, Desmedt Y, Wild PR (1996) Efficient multiplicative sharing schemes. Advances in Cryptology\u2014EUROCRYPT \u201996 (Lecture Notes in Computer Science 1070):107\u2013118","DOI":"10.1007\/3-540-68339-9_10"},{"key":"9091_CR8","doi-asserted-by":"crossref","first-page":"233","DOI":"10.1006\/jcta.1998.2876","volume":"83","author":"SR Blackburn","year":"1998","unstructured":"Blackburn SR,Wild PR (1998) Optimal linear perfect hash families. J Combin Theory Ser A 83:233\u2013250","journal-title":"J Combin Theory Ser A"},{"key":"9091_CR9","unstructured":"Casse LRA (2006) A guide to projective geometry. Oxford University Press"},{"key":"9091_CR10","doi-asserted-by":"crossref","unstructured":"Fiat A, Naor M (1994) Broadcast Encryption. Advances in Cryptology\u2014CRYPTO \u201993 (Lecture Notes in Computer Science 773):480\u2013491","DOI":"10.1007\/3-540-48329-2_40"},{"key":"9091_CR11","doi-asserted-by":"crossref","DOI":"10.1093\/oso\/9780198502951.001.0001","volume-title":"Projective geometry over finite fields","author":"JWP Hirschfeld","year":"1998","unstructured":"Hirschfeld JWP (1998) Projective geometry over finite fields. Oxford Mathematical Monographs, Oxford, UK"},{"key":"9091_CR12","volume-title":"Projective planes","author":"DR Hughes","year":"1973","unstructured":"Hughes DR, Piper FC (1973) Projective planes. Springer-Verlag, Berlin"},{"key":"9091_CR13","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-642-69672-5","volume-title":"Data structures and algorithms 1: sorting and searching","author":"K Mehlhorn","year":"1984","unstructured":"Mehlhorn K (1984) Data structures and algorithms 1: sorting and searching. Springer Verlag, Berlin"},{"key":"9091_CR14","doi-asserted-by":"crossref","first-page":"595","DOI":"10.1016\/S0378-3758(99)00131-7","volume":"86","author":"DR Stinson","year":"2000","unstructured":"Stinson DR, van Trung T,Wei R (2000) Secure frameproof codes, key distribution patterns, group testing algorithms and related structures. J Statist Plan Infer 86:595\u2013617","journal-title":"J Statist Plan Infer"},{"key":"9091_CR15","doi-asserted-by":"crossref","first-page":"112","DOI":"10.1006\/jcta.2000.3068","volume":"93","author":"H Wang","year":"2001","unstructured":"Wang H, Xing C (2001) Explicit constructions of perfect hash families from algebraic curves over finite fields. J Combin Theory Ser A. 93:112\u2013124","journal-title":"J Combin Theory Ser A"}],"container-title":["Designs, Codes and Cryptography"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-007-9091-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10623-007-9091-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-007-9091-4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,2,15]],"date-time":"2024-02-15T05:36:47Z","timestamp":1707975407000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10623-007-9091-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007,6,22]]},"references-count":15,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2007,9,5]]}},"alternative-id":["9091"],"URL":"https:\/\/doi.org\/10.1007\/s10623-007-9091-4","relation":{},"ISSN":["0925-1022","1573-7586"],"issn-type":[{"value":"0925-1022","type":"print"},{"value":"1573-7586","type":"electronic"}],"subject":[],"published":{"date-parts":[[2007,6,22]]}}}