{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,9]],"date-time":"2026-01-09T20:15:07Z","timestamp":1767989707717,"version":"3.49.0"},"reference-count":31,"publisher":"Informa UK Limited","issue":"2","content-domain":{"domain":["www.tandfonline.com"],"crossmark-restriction":true},"short-container-title":["Cryptologia"],"published-print":{"date-parts":[[2022,3,4]]},"DOI":"10.1080\/01611194.2020.1829181","type":"journal-article","created":{"date-parts":[[2020,10,28]],"date-time":"2020-10-28T09:48:35Z","timestamp":1603878515000},"page":"167-182","update-policy":"https:\/\/doi.org\/10.1080\/tandf_crossmark_01","source":"Crossref","is-referenced-by-count":2,"title":["On the failure of the smart approach of the GPT cryptosystem"],"prefix":"10.1080","volume":"46","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-2590-4159","authenticated-orcid":false,"given":"Herv\u00e9 Tal\u00e9","family":"Kalachi","sequence":"first","affiliation":[]}],"member":"301","published-online":{"date-parts":[[2020,10,28]]},"reference":[{"key":"CIT0001","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-64837-4_17"},{"key":"CIT0002","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1978.1055873"},{"key":"CIT0003","doi-asserted-by":"crossref","unstructured":"Bernstein, D. J., T. Lange, and C. Peters. 2008. Attacking and defending the McEliece cryptosystem. In Post-Quantum Cryptography 2008, Volume 5299 of Lecture Notes in Comput. Sci. 31\u201346.","DOI":"10.1007\/978-3-540-88403-3_3"},{"key":"CIT0004","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45682-1_10"},{"key":"CIT0005","first-page":"21","volume-title":"International Conference on Information Society (i-Society 2013), Number","volume":"8","author":"Gabidulin E.","year":"2013"},{"key":"CIT0006","doi-asserted-by":"publisher","DOI":"10.20533\/ijisr.2042.4639.2014.0050"},{"key":"CIT0007","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2009.5206029"},{"issue":"1","key":"CIT0008","first-page":"3","volume":"21","author":"Gabidulin \u00c8. M.","year":"1985","journal-title":"Problemy Peredachi Informatsii"},{"key":"CIT0009","doi-asserted-by":"publisher","DOI":"10.1007\/s10623-007-9160-8"},{"key":"CIT0010","doi-asserted-by":"publisher","DOI":"10.1016\/S1571-0653(04)00168-4"},{"key":"CIT0011","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2003.820038"},{"key":"CIT0012","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-46416-6_41"},{"key":"CIT0013","doi-asserted-by":"publisher","DOI":"10.1007\/BF01390769"},{"key":"CIT0014","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-68339-9_19"},{"key":"CIT0015","doi-asserted-by":"publisher","DOI":"10.1007\/s10623-017-0343-7"},{"key":"CIT0016","volume-title":"Rank metric and cryptography. Accreditation to supervise research","author":"Loidreau P.","year":"2007"},{"key":"CIT0017","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-12929-2_11"},{"key":"CIT0018","unstructured":"McEliece, R. J. 1978. A public-key system based on algebraic coding theory. Jet Propulsion Lab. DSN Progress Report, 114\u20136. 44."},{"issue":"2","key":"CIT0019","first-page":"159","volume":"15","author":"Niederreiter H.","year":"1986","journal-title":"Problems of Control and Information Theory"},{"key":"CIT0020","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-18681-8_14"},{"key":"CIT0021","doi-asserted-by":"publisher","DOI":"10.1007\/s10623-017-0434-5"},{"key":"CIT0022","doi-asserted-by":"publisher","DOI":"10.1007\/11779360_15"},{"key":"CIT0023","doi-asserted-by":"publisher","DOI":"10.1007\/11554868_5"},{"key":"CIT0024","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-007-9003-9"},{"key":"CIT0025","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1962.1057777"},{"key":"CIT0026","doi-asserted-by":"publisher","DOI":"10.1002\/sec.228"},{"key":"CIT0027","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2010.5513549"},{"key":"CIT0028","unstructured":"Sendrier, N. 2002. Cryptosyst\u00e8mes \u00e0 cl\u00e9 publique bas\u00e9s sur les codes correcteurs d\u2019erreurs. In M\u00e9moire d\u2019habilitation \u00e0 diriger des recherches, Universit\u00e9 Paris 6."},{"issue":"4","key":"CIT0029","first-page":"439","volume":"1","author":"Sidelnikov V. M.","year":"1992","journal-title":"Discrete Mathematics and Applications"},{"key":"CIT0030","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2009.5205272"},{"key":"CIT0031","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2013.2274653"}],"container-title":["Cryptologia"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.tandfonline.com\/doi\/pdf\/10.1080\/01611194.2020.1829181","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,3,10]],"date-time":"2022-03-10T18:40:01Z","timestamp":1646937601000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.tandfonline.com\/doi\/full\/10.1080\/01611194.2020.1829181"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,10,28]]},"references-count":31,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2022,3,4]]}},"alternative-id":["10.1080\/01611194.2020.1829181"],"URL":"https:\/\/doi.org\/10.1080\/01611194.2020.1829181","relation":{},"ISSN":["0161-1194","1558-1586"],"issn-type":[{"value":"0161-1194","type":"print"},{"value":"1558-1586","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,10,28]]},"assertion":[{"value":"The publishing and review policy for this title is described in its Aims & Scope.","order":1,"name":"peerreview_statement","label":"Peer Review Statement"},{"value":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=ucry20","URL":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=ucry20","order":2,"name":"aims_and_scope_url","label":"Aim & Scope"},{"value":"2020-10-28","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}