{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,28]],"date-time":"2025-08-28T12:34:41Z","timestamp":1756384481072,"version":"3.37.3"},"reference-count":25,"publisher":"Oxford University Press (OUP)","issue":"8","license":[{"start":{"date-parts":[[2018,6,11]],"date-time":"2018-06-11T00:00:00Z","timestamp":1528675200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/academic.oup.com\/journals\/pages\/about_us\/legal\/notices"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,8,1]]},"DOI":"10.1093\/comjnl\/bxy060","type":"journal-article","created":{"date-parts":[[2018,5,18]],"date-time":"2018-05-18T15:13:37Z","timestamp":1526656417000},"page":"1228-1239","source":"Crossref","is-referenced-by-count":8,"title":["Klepto for Ring-LWE Encryption"],"prefix":"10.1093","volume":"61","author":[{"given":"Dianyan","family":"Xiao","sequence":"first","affiliation":[{"name":"Institute for Advanced Study, Tsinghua University, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0120-0648","authenticated-orcid":false,"given":"Yang","family":"Yu","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Technology, Tsinghua University, Beijing, China"}]}],"member":"286","published-online":{"date-parts":[[2018,6,11]]},"reference":[{"year":"1996","author":"Young","key":"key\n\t\t\t\t20180724123908_bxy060C1"},{"year":"1996","author":"Young","key":"key\n\t\t\t\t20180724123908_bxy060C2"},{"year":"1997","author":"Young","key":"key\n\t\t\t\t20180724123908_bxy060C3"},{"volume-title":"Malicious Cryptography: Exposing Cryptovirology","year":"2004","author":"Young","key":"key\n\t\t\t\t20180724123908_bxy060C4"},{"year":"1998","author":"Hoffstein","key":"key\n\t\t\t\t20180724123908_bxy060C5"},{"year":"2011","author":"Stehl\u00e9","key":"key\n\t\t\t\t20180724123908_bxy060C6"},{"year":"2017","author":"Yu","key":"key\n\t\t\t\t20180724123908_bxy060C7"},{"year":"2017","author":"Yu","key":"key\n\t\t\t\t20180724123908_bxy060C8"},{"year":"2005","author":"Regev","key":"key\n\t\t\t\t20180724123908_bxy060C9"},{"year":"2010","author":"Lyubashevsky","key":"key\n\t\t\t\t20180724123908_bxy060C10"},{"year":"2011","author":"Chen","key":"key\n\t\t\t\t20180724123908_bxy060C11"},{"year":"1997","author":"Coppersmith","key":"key\n\t\t\t\t20180724123908_bxy060C12"},{"year":"2007","author":"Howgrave-Graham","key":"key\n\t\t\t\t20180724123908_bxy060C13"},{"year":"2015","author":"Kirchner","key":"key\n\t\t\t\t20180724123908_bxy060C14"},{"year":"2016","author":"Alkim","key":"key\n\t\t\t\t20180724123908_bxy060C15"},{"year":"2017","author":"Kwant","key":"key\n\t\t\t\t20180724123908_bxy060C16"},{"key":"key\n\t\t\t\t20180724123908_bxy060C17","doi-asserted-by":"crossref","first-page":"267","DOI":"10.1137\/S0097539705447360","article-title":"Worst-case to average-case reductions based on Gaussian measures","volume":"37","author":"Micciancio","year":"2007","journal-title":"SIAM J. Comput."},{"key":"key\n\t\t\t\t20180724123908_bxy060C18","doi-asserted-by":"crossref","first-page":"625","DOI":"10.1007\/BF01445125","article-title":"New bounds in some transference theorems in the geometry of numbers","volume":"296","author":"Banaszczyk","year":"1993","journal-title":"Math. Ann."},{"key":"key\n\t\t\t\t20180724123908_bxy060C19","doi-asserted-by":"crossref","first-page":"565","DOI":"10.1007\/s10623-014-9938-4","article-title":"Worst-case to average-case reductions for module lattices","volume":"75","author":"Langlois","year":"2015","journal-title":"Designs Codes Cryptogr."},{"year":"2013","author":"Lyubashevsky","key":"key\n\t\t\t\t20180724123908_bxy060C20"},{"year":"2015","author":"Liu","key":"key\n\t\t\t\t20180724123908_bxy060C21"},{"year":"2012","author":"Asharov","key":"key\n\t\t\t\t20180724123908_bxy060C22"},{"year":"2016","author":"Ducas","key":"key\n\t\t\t\t20180724123908_bxy060C23"},{"key":"key\n\t\t\t\t20180724123908_bxy060C24"},{"year":"2015","author":"Bos","key":"key\n\t\t\t\t20180724123908_bxy060C25"}],"container-title":["The Computer Journal"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/academic.oup.com\/comjnl\/article-pdf\/61\/8\/1228\/25209186\/bxy060.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,18]],"date-time":"2019-10-18T02:35:20Z","timestamp":1571366120000},"score":1,"resource":{"primary":{"URL":"https:\/\/academic.oup.com\/comjnl\/article\/61\/8\/1228\/5035449"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,6,11]]},"references-count":25,"journal-issue":{"issue":"8","published-online":{"date-parts":[[2018,6,11]]},"published-print":{"date-parts":[[2018,8,1]]}},"URL":"https:\/\/doi.org\/10.1093\/comjnl\/bxy060","relation":{},"ISSN":["0010-4620","1460-2067"],"issn-type":[{"type":"print","value":"0010-4620"},{"type":"electronic","value":"1460-2067"}],"subject":[],"published-other":{"date-parts":[[2018,8]]},"published":{"date-parts":[[2018,6,11]]}}}