{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,14]],"date-time":"2026-01-14T19:13:07Z","timestamp":1768417987063,"version":"3.49.0"},"reference-count":9,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2023,3,27]],"date-time":"2023-03-27T00:00:00Z","timestamp":1679875200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,3,27]],"date-time":"2023-03-27T00:00:00Z","timestamp":1679875200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Comput Virol Hack Tech"],"DOI":"10.1007\/s11416-023-00467-0","type":"journal-article","created":{"date-parts":[[2023,3,27]],"date-time":"2023-03-27T10:03:44Z","timestamp":1679911424000},"page":"237-248","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["A new Shamir\u2019s three pass random matrix ciphering mechanism"],"prefix":"10.1007","volume":"20","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-5346-1263","authenticated-orcid":false,"given":"Fran\u00e7ois","family":"Dupont","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,3,27]]},"reference":[{"key":"467_CR1","unstructured":"Hasdiana, H., Sembiring, R. W.: Hill Cipher On Shamir's three pass protocol. In: The 3rd international conference on multidisciplinary research (ICMR) 2014 (Medan, Indonesia)"},{"issue":"5","key":"467_CR2","doi-asserted-by":"publisher","first-page":"4449ff","DOI":"10.11591\/ijece.v11i5.pp4449-4457","volume":"11","author":"LS Mezher","year":"2021","unstructured":"Mezher, L.S., Abbass, A.M.: Mixed Hill Cipher methods with triple pass protocol methods. Int. J. Electr. Comput. Eng. (IJECE) 11(5), 4449ff (2021)","journal-title":"Int. J. Electr. Comput. Eng. (IJECE)"},{"issue":"3","key":"467_CR3","doi-asserted-by":"publisher","first-page":"2386","DOI":"10.1364\/OE.20.002386","volume":"20","author":"J Lang","year":"2012","unstructured":"Lang, J.: A no-key-exchange secure image sharing scheme based on Shamir\u2019s three-pass cryptography protocol and the multiple-parameter fractional Fourier transform. Opt. Express 20(3), 2386 (2012)","journal-title":"Opt. Express"},{"key":"467_CR4","unstructured":"http:\/\/fvirtman.free.fr\/recueil\/01_08_04_02_randshake.c.php"},{"key":"467_CR5","unstructured":": General Security Repository National Agency for the Security of Information Systems: https:\/\/www.ssi.gouv.fr\/"},{"key":"467_CR6","unstructured":"Horn, R. A., and Johnson, C. R.: Matrix Analysis. Cambridge University Press, 2nd edition 2013 section 0.9.5 (1991)"},{"key":"467_CR7","unstructured":"Angot, A.: Compl\u00e9ments de math\u00e9matiques; les Editions d\u2019optique, pp. 174 (1961)"},{"key":"467_CR8","unstructured":"Horn, R. A., and Johnson, C. R.: Op cite section 0.9.6 (1991)"},{"key":"467_CR9","unstructured":"Przemieniecki, J.S.: Theory of matrix structural analysis. Mac Graw Hill, pp. 413 (1968)"}],"container-title":["Journal of Computer Virology and Hacking Techniques"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11416-023-00467-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11416-023-00467-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11416-023-00467-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,4,18]],"date-time":"2024-04-18T18:11:41Z","timestamp":1713463901000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11416-023-00467-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,3,27]]},"references-count":9,"journal-issue":{"issue":"2","published-online":{"date-parts":[[2024,6]]}},"alternative-id":["467"],"URL":"https:\/\/doi.org\/10.1007\/s11416-023-00467-0","relation":{},"ISSN":["2263-8733"],"issn-type":[{"value":"2263-8733","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,3,27]]},"assertion":[{"value":"22 September 2021","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"31 January 2023","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"27 March 2023","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors have no competing interests to declare that are relevant to the content of this article.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}