{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T00:37:17Z","timestamp":1730248637758,"version":"3.28.0"},"reference-count":16,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,12]]},"DOI":"10.1109\/icitst.2013.6750255","type":"proceedings-article","created":{"date-parts":[[2014,3,27]],"date-time":"2014-03-27T11:20:46Z","timestamp":1395919246000},"page":"524-527","source":"Crossref","is-referenced-by-count":0,"title":["A new encryption scheme based on hybrid Problems"],"prefix":"10.1109","author":[{"given":"Hemlal","family":"Sahu","sequence":"first","affiliation":[]},{"given":"B. K.","family":"Sharma","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"15","article-title":"The arithmetic of elliptic curves","volume":"106","author":"silverman","year":"1986","journal-title":"Graduate Texts in Mathematics"},{"year":"1997","journal-title":"The Elliptic Curve Cryptosystem Remarks-On the Security of the Elliptic Curve Cryptosystem Published","key":"16"},{"doi-asserted-by":"publisher","key":"13","DOI":"10.1109\/ICICIP.2013.6568041"},{"doi-asserted-by":"publisher","key":"14","DOI":"10.1049\/ip-cdt:19981773"},{"doi-asserted-by":"publisher","key":"11","DOI":"10.1007\/3-540-39799-X_31"},{"doi-asserted-by":"publisher","key":"12","DOI":"10.1145\/359340.359342"},{"doi-asserted-by":"publisher","key":"3","DOI":"10.1109\/TIT.1985.1057074"},{"doi-asserted-by":"publisher","key":"2","DOI":"10.1109\/TIT.1976.1055638"},{"doi-asserted-by":"publisher","key":"1","DOI":"10.1049\/ip-com:20045278"},{"doi-asserted-by":"publisher","key":"10","DOI":"10.1109\/18.259647"},{"key":"7","first-page":"5573","article-title":"A new secure and efficient elliptic curve cryptosystems","volume":"6","author":"ismail","year":"2012","journal-title":"Applied Mathematical Sciences"},{"doi-asserted-by":"publisher","key":"6","DOI":"10.1109\/ITSIM.2008.4631561"},{"year":"0","author":"jeffrey","journal-title":"An Introduction to Mathematical Cryptography","key":"5"},{"doi-asserted-by":"publisher","key":"4","DOI":"10.1049\/ip-cdt:19941040"},{"doi-asserted-by":"publisher","key":"9","DOI":"10.1007\/BF02351718"},{"doi-asserted-by":"publisher","key":"8","DOI":"10.1090\/S0025-5718-1987-0866109-5"}],"event":{"name":"2013 8th International Conference for Internet Technology and Secured Transactions (ICITST)","start":{"date-parts":[[2013,12,9]]},"location":"London, United Kingdom","end":{"date-parts":[[2013,12,12]]}},"container-title":["8th International Conference for Internet Technology and Secured Transactions (ICITST-2013)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6745432\/6750143\/06750255.pdf?arnumber=6750255","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,23]],"date-time":"2017-03-23T18:37:40Z","timestamp":1490294260000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6750255\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,12]]},"references-count":16,"URL":"https:\/\/doi.org\/10.1109\/icitst.2013.6750255","relation":{},"subject":[],"published":{"date-parts":[[2013,12]]}}}