{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T07:54:17Z","timestamp":1730274857486,"version":"3.28.0"},"reference-count":23,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2007,6]]},"DOI":"10.1109\/isit.2007.4557224","type":"proceedings-article","created":{"date-parts":[[2008,7,9]],"date-time":"2008-07-09T04:17:12Z","timestamp":1215577032000},"page":"186-190","source":"Crossref","is-referenced-by-count":26,"title":["SYND: a Fast Code-Based Stream Cipher with a Security Reduction"],"prefix":"10.1109","author":[{"given":"Philippe","family":"Gaborit","sequence":"first","affiliation":[]},{"given":"Cedric","family":"Lauradoux","sequence":"additional","affiliation":[]},{"given":"Nicolas","family":"Sendrier","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1973.1054929"},{"key":"ref11","first-page":"245","article-title":"An efficient pseudo-ra, dom generator provably as secure as syndrome decoding","author":"fischer","year":"1996","journal-title":"In EUROCRYPT 1996"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/0022-0000(91)90007-R"},{"key":"ref13","first-page":"25","article-title":"Hard core predicate for any one-way functi on","author":"goldreich","year":"0","journal-title":"Proc STOC'89"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2006.261851"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1137\/S0097539793244708"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/s001459900012"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1137\/0215020"},{"key":"ref18","first-page":"114","article-title":"A public-key cryptosystem based on algebraic coding theory","author":"mceliece","year":"1978","journal-title":"JPT DSN Progress Report 42&#x2013;44"},{"journal-title":"The theory of errorcorrecting codes","year":"1977","author":"macwilliams","key":"ref19"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1978.1055873"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/11761679_8"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1137\/0213053"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1137\/0215025"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/S0019-9958(69)90497-5"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/18.651067"},{"key":"ref2","first-page":"649","article-title":"Complexity issues in coding theory","volume":"1","author":"barg","year":"1998","journal-title":"Handbook of Coding Theory"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/11554868_6"},{"key":"ref9","article-title":"Cryptanalysis of a provably secure cryptographic hash function","author":"coron","year":"2004","journal-title":"Cryptology ePrint Archive"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1967.1054053"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2005.1523371"},{"key":"ref21","article-title":"Cryptosystemes &#x00E0; cl&#x00E9; publique bas&#x00E9;s sur les codes correcteursd'erreurs","author":"sendrier","year":"2002","journal-title":"M&#x00E9;moire d'habilitation Inria"},{"key":"ref23","first-page":"288","article-title":"A generalized birthday problem","author":"wagner","year":"2002","journal-title":"CRYPTO'02 number 2442 in LNCS"}],"event":{"name":"2007 IEEE International Symposium on Information Theory","start":{"date-parts":[[2007,6,24]]},"location":"Nice","end":{"date-parts":[[2007,6,29]]}},"container-title":["2007 IEEE International Symposium on Information Theory"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4497218\/4557062\/04557224.pdf?arnumber=4557224","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,16]],"date-time":"2017-03-16T16:38:48Z","timestamp":1489682328000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/4557224\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007,6]]},"references-count":23,"URL":"https:\/\/doi.org\/10.1109\/isit.2007.4557224","relation":{},"subject":[],"published":{"date-parts":[[2007,6]]}}}