{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,3,28]],"date-time":"2022-03-28T23:52:06Z","timestamp":1648511526809},"reference-count":16,"publisher":"Informa UK Limited","issue":"7","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["International Journal of Computer Mathematics"],"published-print":{"date-parts":[[2002,1]]},"DOI":"10.1080\/00207160211298","type":"journal-article","created":{"date-parts":[[2003,9,18]],"date-time":"2003-09-18T22:37:50Z","timestamp":1063924670000},"page":"797-806","source":"Crossref","is-referenced-by-count":0,"title":["Application of Parallel Virtual Machine Framework to the Strong Prime Problem"],"prefix":"10.1080","volume":"79","author":[{"given":"Der-Chuyan","family":"Lou","sequence":"first","affiliation":[]},{"given":"Chia-Long","family":"Wu","sequence":"additional","affiliation":[]},{"given":"Rong-yi","family":"Ou","sequence":"additional","affiliation":[]}],"member":"301","reference":[{"key":"CIT0001","doi-asserted-by":"publisher","DOI":"10.1016\/0167-8191(94)90027-2"},{"key":"CIT0002","doi-asserted-by":"publisher","DOI":"10.1016\/S0167-8191(96)00100-7"},{"key":"CIT0003","series-title":"Technical Report ORNL\/TM-12187","volume-title":"\u201cPVM 3 user's guide and reference manual\u201d","author":"Geist G. A.","year":"1993"},{"key":"CIT0004","doi-asserted-by":"publisher","DOI":"10.1002\/cpe.4330040403"},{"key":"CIT0005","doi-asserted-by":"publisher","DOI":"10.1145\/359340.359342"},{"key":"CIT0006","unstructured":"Denning. 1999.Cryptography And Data Security, Second Edition, 104\u2013110. Addison Wesley."},{"key":"CIT0007","unstructured":"Stallings, W. 1999.Cryptography And Network Security: Principles And Practice, Second Edition, 173\u2013175. Prentice Hall."},{"key":"CIT0008","volume-title":"\u201cEfficient DES key search,\" Lecture Notes in Computer Science","author":"Wiener M.","year":"1993"},{"key":"CIT0009","volume-title":"Report in the Development of the Advanced Encryption Standard","author":"Nechvatal J.","year":"2000"},{"key":"CIT0010","doi-asserted-by":"crossref","unstructured":"Kranakis, E. 1985.Primality and Cryptography, 39\u201379. John Wiley & Sons Press.","DOI":"10.1007\/978-3-322-96647-6_2"},{"key":"CIT0012","series-title":"Lecture Notes in Computer Science","first-page":"443","volume-title":"Advances in Cryptology-CRYPTO '86","author":"Beauchemin P.","year":"1986"},{"key":"CIT0013","doi-asserted-by":"publisher","DOI":"10.1016\/S0022-0000(76)80043-8"},{"key":"CIT0014","doi-asserted-by":"publisher","DOI":"10.1017\/S0305004100049252"},{"key":"CIT0015","doi-asserted-by":"publisher","DOI":"10.1145\/28395.28445"},{"key":"CIT0016","doi-asserted-by":"publisher","DOI":"10.1049\/el:19840357"},{"key":"CIT0017","unstructured":"Laih, C.S., Ham, L. and Chang, C.C. 1995.Contemporary Cryptography and its Applications, 155\u2013164. Unalis Corp."}],"container-title":["International Journal of Computer Mathematics"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/www.tandfonline.com\/doi\/pdf\/10.1080\/00207160211298","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,3,25]],"date-time":"2020-03-25T17:19:29Z","timestamp":1585156769000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.tandfonline.com\/doi\/abs\/10.1080\/00207160211298"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2002,1]]},"references-count":16,"journal-issue":{"issue":"7","published-print":{"date-parts":[[2002,1]]}},"alternative-id":["10.1080\/00207160211298"],"URL":"https:\/\/doi.org\/10.1080\/00207160211298","relation":{},"ISSN":["0020-7160","1029-0265"],"issn-type":[{"value":"0020-7160","type":"print"},{"value":"1029-0265","type":"electronic"}],"subject":[],"published":{"date-parts":[[2002,1]]}}}