{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,3,28]],"date-time":"2022-03-28T23:25:25Z","timestamp":1648509925786},"reference-count":6,"publisher":"Elsevier BV","issue":"2","license":[{"start":{"date-parts":[[1988,3,1]],"date-time":"1988-03-01T00:00:00Z","timestamp":573177600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Information Sciences"],"published-print":{"date-parts":[[1988,3]]},"DOI":"10.1016\/0020-0255(88)90033-3","type":"journal-article","created":{"date-parts":[[2003,6,30]],"date-time":"2003-06-30T13:28:37Z","timestamp":1056979717000},"page":"79-86","source":"Crossref","is-referenced-by-count":0,"title":["Shannon's random-cipher result and the R-norm information"],"prefix":"10.1016","volume":"44","author":[{"given":"Gur","family":"Dial","sequence":"first","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/0020-0255(88)90033-3_BIB1","doi-asserted-by":"crossref","first-page":"181","DOI":"10.1016\/S0019-9958(71)90065-9","article-title":"Information theoretical considerations on estimation problems","volume":"19","author":"Arimoto","year":"1971","journal-title":"Inform. and Control"},{"key":"10.1016\/0020-0255(88)90033-3_BIB2","doi-asserted-by":"crossref","first-page":"136","DOI":"10.1016\/S0019-9958(80)90292-2","article-title":"The R-norm information measure","volume":"45","author":"Boekee","year":"1980","journal-title":"Inform. and Control"},{"key":"10.1016\/0020-0255(88)90033-3_BIB3","doi-asserted-by":"crossref","first-page":"289","DOI":"10.1109\/TIT.1977.1055709","article-title":"An extension of the Shannon entropy approach to cryptography","volume":"23","author":"Hellman","year":"1977","journal-title":"IEEE Trans. Inform. Theory"},{"key":"10.1016\/0020-0255(88)90033-3_BIB4","doi-asserted-by":"crossref","first-page":"475","DOI":"10.1109\/TIT.1979.1056061","article-title":"The existence of good cryptosystems for key rates greater than message redundancy","volume":"25","author":"Liu","year":"1979","journal-title":"IEEE Trans. Inform. Theory"},{"issue":"4","key":"10.1016\/0020-0255(88)90033-3_BIB5","first-page":"263","article-title":"Renyi's entropy of order \u03b1 and Shannon's random cipher result","volume":"8","author":"Sahoo","year":"1983","journal-title":"J. Combin. Inform. System Sci."},{"key":"10.1016\/0020-0255(88)90033-3_BIB6","doi-asserted-by":"crossref","first-page":"656","DOI":"10.1002\/j.1538-7305.1949.tb00928.x","article-title":"Communication theory of secrecy systems","volume":"28","author":"Shannon","year":"1949","journal-title":"Bell System Tech. J."}],"container-title":["Information Sciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:0020025588900333?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:0020025588900333?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2019,3,18]],"date-time":"2019-03-18T09:20:23Z","timestamp":1552900823000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/0020025588900333"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1988,3]]},"references-count":6,"journal-issue":{"issue":"2","published-print":{"date-parts":[[1988,3]]}},"alternative-id":["0020025588900333"],"URL":"https:\/\/doi.org\/10.1016\/0020-0255(88)90033-3","relation":{},"ISSN":["0020-0255"],"issn-type":[{"value":"0020-0255","type":"print"}],"subject":[],"published":{"date-parts":[[1988,3]]}}}