{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T07:12:32Z","timestamp":1725606752761},"reference-count":8,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,9,26]],"date-time":"2022-09-26T00:00:00Z","timestamp":1664150400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,9,26]],"date-time":"2022-09-26T00:00:00Z","timestamp":1664150400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,9,26]]},"DOI":"10.1109\/acit54803.2022.9913093","type":"proceedings-article","created":{"date-parts":[[2022,10,12]],"date-time":"2022-10-12T19:53:28Z","timestamp":1665604408000},"page":"341-344","source":"Crossref","is-referenced-by-count":0,"title":["Ideal lattices in cryptography"],"prefix":"10.1109","author":[{"given":"Sara","family":"Vyhnalova","sequence":"first","affiliation":[{"name":"Charles University in Prague,Faculty of Mathematics and Physics,Department of Algebra,Prague,Czech Republic"}]}],"member":"263","reference":[{"key":"ref4","first-page":"1","article-title":"Generating hard instances of lattice problems","author":"ajtai","year":"2004","journal-title":"Complexity of computations and proofs volume 13 of Quad Mat"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/11787006_13"},{"key":"ref6","article-title":"Ideal lattices in cryptography","author":"vyhnalov\u00e1","year":"2021","journal-title":"Dept Algebra Charles Univ Prague Czech rep"},{"article-title":"Lattice-based cryptography","year":"2008","author":"micciancio","key":"ref5"},{"article-title":"CSE206A: Lattices Algorithms and Application","year":"2016","author":"micciancio","key":"ref8"},{"article-title":"Identifying Ideal Lattices","year":"2007","author":"ding","key":"ref7"},{"article-title":"NTRU: Algorithm Specification And Supporting Documentation","year":"2019","author":"chen et al","key":"ref2"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.46586\/tches.v2018.i1.238-268"}],"event":{"name":"2022 12th International Conference on Advanced Computer Information Technologies (ACIT)","start":{"date-parts":[[2022,9,26]]},"location":"Ruzomberok, Slovakia","end":{"date-parts":[[2022,9,28]]}},"container-title":["2022 12th International Conference on Advanced Computer Information Technologies (ACIT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9912736\/9912739\/09913093.pdf?arnumber=9913093","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,11,4]],"date-time":"2022-11-04T01:31:02Z","timestamp":1667525462000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9913093\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,9,26]]},"references-count":8,"URL":"https:\/\/doi.org\/10.1109\/acit54803.2022.9913093","relation":{},"subject":[],"published":{"date-parts":[[2022,9,26]]}}}