{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T14:24:31Z","timestamp":1775053471394,"version":"3.50.1"},"reference-count":21,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010,6]]},"DOI":"10.1109\/isit.2010.5513549","type":"proceedings-article","created":{"date-parts":[[2010,8,19]],"date-time":"2010-08-19T15:57:25Z","timestamp":1282233445000},"page":"2463-2467","source":"Crossref","is-referenced-by-count":19,"title":["A Smart approach for GPT cryptosystem based on rank codes"],"prefix":"10.1109","author":[{"given":"Haitham","family":"Rashwan","sequence":"first","affiliation":[]},{"given":"Ernst M.","family":"Gabidulin","sequence":"additional","affiliation":[]},{"given":"Bahram","family":"Honary","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","article-title":"High-weight errors in public-key cryptosystems based on reducible rank codes","author":"kshevetskiy","year":"2005","journal-title":"Proc of ISCTA"},{"key":"ref11","first-page":"563","article-title":"A new structural attack for GPT and variants","volume":"3517","author":"overbeck","year":"2005","journal-title":"Proc Mycrypt"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/11779360_15"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-007-9003-9"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/s10623-007-9160-8"},{"key":"ref15","first-page":"1","article-title":"Theory of Codes with Maximum Rank Distance","volume":"21","author":"gabidulin","year":"1985","journal-title":"Probl Inform Transm"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/BFb0034349"},{"key":"ref17","article-title":"New technique for decoding codes in the rank metric and its cryptography applications","volume":"38","author":"johansson","year":"2002","journal-title":"Problems Inform Transm"},{"key":"ref18","first-page":"280","article-title":"Cryptanalysis of MinRank","volume":"5157","author":"levy-dit-vehell","year":"2008","journal-title":"Advances in Cryptology - CRYPTO 2008 28th Annual International Cryptology Conference Santa Barbara CA USA August 17&#x2013;21 2008 Proceedings Series Lecture Notes in Computer Science Subseries Security and Cryptology"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/IWSDA.2007.4408344"},{"key":"ref4","first-page":"17","article-title":"Public-Key Cryptosystems Based on Linear Codes over Large Alphabets: Efficiency and Weakness","author":"gabidulin","year":"1995","journal-title":"Codes and Ciphers"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-46416-6_41"},{"key":"ref6","first-page":"212","article-title":"The security of the Gabidulin publickey cryptosystem","author":"gibson","year":"1996","journal-title":"Advances in Cryptology-EUROCRYPT'96 LNCS 1070"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/BF01390769"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/S0166-218X(02)00446-8"},{"key":"ref7","first-page":"73","article-title":"Improved GPT Public Key Cryptosystems","author":"gabidulin","year":"2000","journal-title":"Coding Communications and Broadcasting"},{"key":"ref2","first-page":"19","article-title":"Knapsack-Type Cryptosystem and Algebraic Coding Theory","volume":"15","author":"niederreiter","year":"1986","journal-title":"Probl Control and Inform Theory"},{"key":"ref1","first-page":"114","article-title":"A Public Key Cryptosystem Based on Algebraic Coding Theory","author":"mceliece","year":"1978","journal-title":"JPL DSN Progress Rep"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2003.820038"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-12929-2_11"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2009.5206029"}],"event":{"name":"2010 IEEE International Symposium on Information Theory - ISIT","location":"Austin, TX, USA","start":{"date-parts":[[2010,6,13]]},"end":{"date-parts":[[2010,6,18]]}},"container-title":["2010 IEEE International Symposium on Information Theory"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5508195\/5513230\/05513549.pdf?arnumber=5513549","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,18]],"date-time":"2017-03-18T16:21:03Z","timestamp":1489854063000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5513549\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,6]]},"references-count":21,"URL":"https:\/\/doi.org\/10.1109\/isit.2010.5513549","relation":{},"subject":[],"published":{"date-parts":[[2010,6]]}}}