{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,5]],"date-time":"2022-04-05T04:02:32Z","timestamp":1649131352693},"reference-count":24,"publisher":"Informa UK Limited","issue":"2","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["International Journal of Computer Mathematics"],"published-print":{"date-parts":[[2000,1]]},"DOI":"10.1080\/00207160008804932","type":"journal-article","created":{"date-parts":[[2007,6,25]],"date-time":"2007-06-25T20:24:20Z","timestamp":1182803060000},"page":"167-184","source":"Crossref","is-referenced-by-count":5,"title":["Public key cryptosystems based on boolean permutations and their applications"],"prefix":"10.1080","volume":"74","author":[{"given":"Vijay","family":"Varadharajan","sequence":"first","affiliation":[]},{"given":"Chuan-Kun","family":"Wu","sequence":"additional","affiliation":[]}],"member":"301","reference":[{"key":"CIT0001","doi-asserted-by":"publisher","DOI":"10.1007\/BF00203967"},{"key":"CIT0002","unstructured":"Bellare, M. and Goldwasser, S. Verifiable partial key escrow. Proceedings of the Fourth ACM Conference on Computer and Communications Security, ACM. April. Also available at [http:\/\/ww-cse.ucsd.edu\/users\/mihir\/papers\/crypto-papers.html]"},{"key":"CIT0003","unstructured":"Caelli, W. Cryptography:Policy and Algorithms. Proceedings, Lecture Notes in Computer Science 1029. pp.40\u201364. Springer-Verlag."},{"key":"CIT0004","doi-asserted-by":"publisher","DOI":"10.1109\/35.312844"},{"key":"CIT0005","doi-asserted-by":"publisher","DOI":"10.1145\/227234.227239"},{"key":"CIT0006","first-page":"3","volume-title":"Advances in Cryptology - Auscrypt'92","author":"Desmedt Y.","year":"1993"},{"key":"CIT0007","doi-asserted-by":"crossref","first-page":"147","DOI":"10.1007\/3-540-49264-X_12","volume-title":"Advances in Cryptology-Eurocrypt'95","author":"Desmedt Y.","year":"1995"},{"key":"CIT0008","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1976.1055638"},{"key":"CIT0009","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-44750-4_18"},{"key":"CIT0010","volume":"39","author":"Ganesan R.","year":"1996","journal-title":"Communications of the ACM"},{"key":"CIT0011","volume-title":"Computers and Intractability: A guide to the Theory of NP-Completeness","author":"Garey M.R.","year":"1978"},{"key":"CIT0012","doi-asserted-by":"crossref","unstructured":"He, J. and Dawson, E. 1996.A New Key Escrow Cryptosystem, Cryptography: Policy and Algorithms, 105\u2013114. Springer-Verlag.","DOI":"10.1007\/BFb0032350"},{"key":"CIT0013","volume-title":"Finite Orthogonal Series in the Design of Digital Devices","author":"Karpovsky M.G.","year":"1976"},{"key":"CIT0014","volume-title":"The Theory of Error-Correcting Codes","author":"Mac Williams F.J.","year":"1977"},{"key":"CIT0015","doi-asserted-by":"publisher","DOI":"10.1145\/227234.227241"},{"key":"CIT0016","unstructured":"Mceliece, R.L. 1978.A public-key cryptosystem based on algebraic coding theory, Vol. 42-44, 114\u2013116. Pasadena: Jet Propulsion Labs. Deep Space Network Progress Report"},{"key":"CIT0017","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-44750-4_15"},{"key":"CIT0018","volume-title":"Escrowed Encryption Standard (EES)","volume":"185","year":"1994"},{"key":"CIT0019","doi-asserted-by":"crossref","first-page":"378","DOI":"10.1007\/3-540-46416-6_32","volume-title":"Advances in Cryptology, Proc. Eurocrypt'91","author":"Nyberg K.","year":"1991"},{"key":"CIT0020","first-page":"325","volume":"135","author":"Pieprzyk J.","year":"1988","journal-title":"IEE Proceedings, Part E"},{"key":"CIT0021","doi-asserted-by":"publisher","DOI":"10.1145\/359340.359342"},{"key":"CIT0022","unstructured":"Shamir, A. Partial key escrow: A new approach to software key escrow. Presented at Key Escrow Conference. September, Washington. D.C."},{"key":"CIT0023","doi-asserted-by":"publisher","DOI":"10.1145\/227234.227240"},{"key":"CIT0024","volume-title":"Boolean functions in cryptology","author":"Wu C.K.","year":"1993"}],"container-title":["International Journal of Computer Mathematics"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/www.tandfonline.com\/doi\/pdf\/10.1080\/00207160008804932","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,4,29]],"date-time":"2019-04-29T15:53:21Z","timestamp":1556553201000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.tandfonline.com\/doi\/abs\/10.1080\/00207160008804932"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2000,1]]},"references-count":24,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2000,1]]}},"alternative-id":["10.1080\/00207160008804932"],"URL":"https:\/\/doi.org\/10.1080\/00207160008804932","relation":{},"ISSN":["0020-7160","1029-0265"],"issn-type":[{"value":"0020-7160","type":"print"},{"value":"1029-0265","type":"electronic"}],"subject":[],"published":{"date-parts":[[2000,1]]}}}