{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,5,24]],"date-time":"2023-05-24T12:40:15Z","timestamp":1684932015836},"reference-count":17,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2009,3,1]],"date-time":"2009-03-01T00:00:00Z","timestamp":1235865600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Period Math Hung"],"published-print":{"date-parts":[[2009,3]]},"DOI":"10.1007\/s10998-009-9035-8","type":"journal-article","created":{"date-parts":[[2009,3,13]],"date-time":"2009-03-13T01:15:37Z","timestamp":1236906937000},"page":"35-45","source":"Crossref","is-referenced-by-count":0,"title":["An application of index forms in cryptography"],"prefix":"10.1007","volume":"58","author":[{"given":"Attila","family":"B\u00e9rczes","sequence":"first","affiliation":[]},{"given":"Istv\u00e1n","family":"J\u00e1r\u00e1si","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2009,3,14]]},"reference":[{"key":"9035_CR1","doi-asserted-by":"crossref","first-page":"751","DOI":"10.5486\/PMD.2003.2922","volume":"63","author":"A. B\u00e9rczes","year":"2003","unstructured":"A. B\u00e9rczes and J. K\u00f6dm\u00f6n, Methods for the calculation of values of a norm form, Publ. Math. Debrecen, 63 (2003), 751\u2013768.","journal-title":"Publ. Math. Debrecen"},{"key":"9035_CR2","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1023\/B:MAHU.0000040535.45427.38","volume":"49","author":"A. B\u00e9rczes","year":"2004","unstructured":"A. B\u00e9rczes, J. K\u00f6dm\u00f6n and A. Peth\u0151, A one-way function based on norm form equations, Period. Math. Hungar., 49 (2004), 1\u201313.","journal-title":"Period. Math. Hungar."},{"key":"9035_CR3","doi-asserted-by":"crossref","first-page":"85","DOI":"10.4064\/aa115-1-7","volume":"115","author":"Y. Bilu","year":"2004","unstructured":"Y. Bilu, I. Ga\u00e1l and K. Gy\u0151ry, Index form equations in sextic fields: a hard computation, Acta Arith., 115 (2004), 85\u201396.","journal-title":"Acta Arith."},{"key":"9035_CR4","series-title":"Graduate Texts in Mathematics","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-662-02945-9","volume-title":"A course in computational algebraic number theory","author":"H. Cohen","year":"1993","unstructured":"H. Cohen, A course in computational algebraic number theory, Graduate Texts in Mathematics 138, Springer-Verlag, Berlin, 1993."},{"key":"9035_CR5","doi-asserted-by":"crossref","first-page":"1545","DOI":"10.1109\/PROC.1975.10005","volume":"63","author":"H. Feistel","year":"1975","unstructured":"H. Feistel, W. A. Notz and J. L. Smith, Some cryptographic techniques for machine-to-machine data communications, Proceedings of the IEEE, vol. 63, 1975, 1545\u20131554.","journal-title":"Proceedings of the IEEE"},{"key":"9035_CR6","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4612-0085-7","volume-title":"Diophantine equations and power integral bases. New computational methods","author":"I. Ga\u00e1l","year":"2002","unstructured":"I. Ga\u00e1l, Diophantine equations and power integral bases. New computational methods, Birkh\u00e4user Boston Inc., Boston, MA, 2002."},{"key":"9035_CR7","doi-asserted-by":"crossref","first-page":"379","DOI":"10.4064\/aa-89-4-379-396","volume":"89","author":"I. Ga\u00e1l","year":"1999","unstructured":"I. Ga\u00e1l and K. Gy\u0151ry, Index form equations in quintic fields, Acta Arith., 89 (1999), 379\u2013396.","journal-title":"Acta Arith."},{"key":"9035_CR8","doi-asserted-by":"crossref","first-page":"90","DOI":"10.1006\/jnth.1996.0035","volume":"57","author":"I. Ga\u00e1l","year":"1996","unstructured":"I. Ga\u00e1l, A. Peth\u0151 and M. Pohst, Simultaneous representation of integers by a pair of ternary quadratic forms\u2014with an application to index form equations in quartic number fields, J. Number Theory, 57 (1996), 90\u2013104.","journal-title":"J. Number Theory"},{"key":"9035_CR9","doi-asserted-by":"crossref","first-page":"689","DOI":"10.2307\/2008731","volume":"53","author":"I. Ga\u00e1l","year":"1989","unstructured":"I. Ga\u00e1l and N. Schulte, Computing all power integral bases of cubic fields, Math. Comp., 53 (1989), 689\u2013696.","journal-title":"Math. Comp."},{"key":"9035_CR10","volume-title":"Lecture Notes on Cryptography","author":"S. Goldwasser","year":"2001","unstructured":"S. Goldwasser and M. Bellare, Lecture Notes on Cryptography, MIT Press, Boston, 2001."},{"key":"9035_CR11","doi-asserted-by":"crossref","first-page":"270","DOI":"10.1016\/0022-0000(84)90070-9","volume":"28","author":"S. Goldwasser","year":"1984","unstructured":"S. Goldwasser and S. Micali, Probabilistic encryption, J. Comput. System Sci., 28 (1984), 270\u2013299.","journal-title":"J. Comput. System Sci."},{"key":"9035_CR12","doi-asserted-by":"crossref","first-page":"747","DOI":"10.1109\/TC.1979.1675242","volume":"28","author":"J. B. Kam","year":"1979","unstructured":"J. B. Kam and G. I. Davida, Structured design of substitution-permutation encryption networks, IEEE Trans. Comput., 28 (1979), 747\u2013753.","journal-title":"IEEE Trans. Comput."},{"key":"9035_CR13","doi-asserted-by":"crossref","first-page":"819","DOI":"10.2307\/2372655","volume":"76","author":"S. Lang","year":"1954","unstructured":"S. Lang and A. Weil, Number of points of varieties in finite fields, Amer. J. Math., 76 (1954), 819\u2013827.","journal-title":"Amer. J. Math."},{"key":"9035_CR14","volume-title":"Handbook of applied cryptography, CRC Press Series on Discrete Mathematics and its Applications","author":"A. J. Menezes","year":"1997","unstructured":"A. J. Menezes, P. C. Van Oorschot and S. A. Vanstone, Handbook of applied cryptography, CRC Press Series on Discrete Mathematics and its Applications, CRC Press, Boca Raton, FL, 1997."},{"key":"9035_CR15","doi-asserted-by":"crossref","first-page":"199","DOI":"10.4064\/aa-30-2-199-207","volume":"30","author":"M. Pohst","year":"1976","unstructured":"M. Pohst, Invarianten des total reellen K\u00d6rpers siebten Grades mit Minimaldiskriminante, Acta Arith., 30 (1976), 199\u2013207.","journal-title":"Acta Arith."},{"key":"9035_CR16","unstructured":"B. Schneier, Applied cryptography. Protocols, algorithms and source code in C, 2nd ed., John Wiley & Sons, 1996."},{"key":"9035_CR17","doi-asserted-by":"crossref","unstructured":"A. Webster and S. Tavares, On the design of S-boxes, Advances in Cryptology\u2014 CRYPTO\u203285, LNCS 218, 1986, 523\u2013534.","DOI":"10.1007\/3-540-39799-X_41"}],"container-title":["Periodica Mathematica Hungarica"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10998-009-9035-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10998-009-9035-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10998-009-9035-8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,5,24]],"date-time":"2023-05-24T12:20:14Z","timestamp":1684930814000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10998-009-9035-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,3]]},"references-count":17,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2009,3]]}},"alternative-id":["9035"],"URL":"https:\/\/doi.org\/10.1007\/s10998-009-9035-8","relation":{},"ISSN":["0031-5303","1588-2829"],"issn-type":[{"value":"0031-5303","type":"print"},{"value":"1588-2829","type":"electronic"}],"subject":[],"published":{"date-parts":[[2009,3]]}}}