{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,22]],"date-time":"2026-04-22T03:36:14Z","timestamp":1776828974506,"version":"3.51.2"},"reference-count":4,"publisher":"Elsevier BV","issue":"1","license":[{"start":{"date-parts":[[1987,8,1]],"date-time":"1987-08-01T00:00:00Z","timestamp":554774400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2013,7,17]],"date-time":"2013-07-17T00:00:00Z","timestamp":1374019200000},"content-version":"vor","delay-in-days":9482,"URL":"https:\/\/www.elsevier.com\/open-access\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Journal of Symbolic Computation"],"published-print":{"date-parts":[[1987,8]]},"DOI":"10.1016\/s0747-7171(87)80061-5","type":"journal-article","created":{"date-parts":[[2008,4,9]],"date-time":"2008-04-09T10:00:48Z","timestamp":1207735248000},"page":"123-127","source":"Crossref","is-referenced-by-count":64,"title":["A modification of the LLL reduction algorithm"],"prefix":"10.1016","volume":"4","author":[{"given":"M.","family":"Pohst","sequence":"first","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/S0747-7171(87)80061-5_bib1","article-title":"Computation of independent units in number fields by Dirichlet's method","author":"Buchmann","year":"1987","journal-title":"Math. Comp."},{"key":"10.1016\/S0747-7171(87)80061-5_bib2","doi-asserted-by":"crossref","DOI":"10.1007\/3-540-16078-7_69","article-title":"Polynomial time algorithms for finding integer relations among real numbers","author":"Hastad","year":"1986","journal-title":"Lecture Notes in Computer Science"},{"key":"10.1016\/S0747-7171(87)80061-5_bib3","first-page":"513","article-title":"Factoring polynomials with rational coefficients","volume":"26","author":"Lenstra","year":"1982","journal-title":"Math. Ann."},{"key":"10.1016\/S0747-7171(87)80061-5_bib4","doi-asserted-by":"crossref","first-page":"594","DOI":"10.1109\/TIT.1984.1056942","article-title":"Cryptoanalytic attacks on the multiplicative knapsack cryptosystem and on Shamir's fast signature system","volume":"IT-30","author":"Odlyzko","year":"1984","journal-title":"IEEE Trans. Inform. Theory"}],"container-title":["Journal of Symbolic Computation"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0747717187800615?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0747717187800615?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2018,12,30]],"date-time":"2018-12-30T07:29:27Z","timestamp":1546154967000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0747717187800615"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1987,8]]},"references-count":4,"journal-issue":{"issue":"1","published-print":{"date-parts":[[1987,8]]}},"alternative-id":["S0747717187800615"],"URL":"https:\/\/doi.org\/10.1016\/s0747-7171(87)80061-5","relation":{},"ISSN":["0747-7171"],"issn-type":[{"value":"0747-7171","type":"print"}],"subject":[],"published":{"date-parts":[[1987,8]]}}}