{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T06:23:11Z","timestamp":1729664591535,"version":"3.28.0"},"reference-count":33,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012,9]]},"DOI":"10.1109\/itw.2012.6404767","type":"proceedings-article","created":{"date-parts":[[2013,1,17]],"date-time":"2013-01-17T15:30:12Z","timestamp":1358436612000},"page":"75-79","source":"Crossref","is-referenced-by-count":6,"title":["The arithmetic codex"],"prefix":"10.1109","author":[{"given":"Ignacio","family":"Cascudo","sequence":"first","affiliation":[]},{"given":"Ronald","family":"Cramer","sequence":"additional","affiliation":[]},{"given":"Chaoping","family":"Xing","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1007\/BF01884295"},{"key":"17","first-page":"445","article-title":"Perfectly secure multiparty computation and the computational overhead of cryptography","volume":"6110","author":"damgaard","year":"2010","journal-title":"Proc of 19th Annual IACR EUROCRYPT"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1145\/129712.129780"},{"key":"33","doi-asserted-by":"crossref","first-page":"53","DOI":"10.1007\/BF01083182","article-title":"Number of points of an algebraic curve","volume":"17","author":"vla?dut?","year":"1983","journal-title":"Funct Anal Appl"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2008.921692"},{"key":"16","article-title":"On the amortized complexity of zero knowledge protocols for multiplicative relations","author":"cramer","year":"2012","journal-title":"Proc 6th ICITS"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.84.7.1739"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45539-6_22"},{"key":"11","first-page":"451","article-title":"Strongly multiplicative ramp schemes from high degree rational points on curves","volume":"4965","author":"chen","year":"2008","journal-title":"Proc of 27th Annual IACR EUROCRYPT"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-72540-4_17"},{"key":"21","first-page":"170","article-title":"Codes on algebraic curves","volume":"24","author":"goppa","year":"1981","journal-title":"Soviet Math Dokl"},{"journal-title":"Towers of Function Fields Over Non-prime Finite Fields","year":"2012","author":"garcia","key":"20"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-78524-8_22"},{"key":"23","first-page":"721","article-title":"Some remarks on the number of rational points of algebraic curves over finite fields","volume":"28","author":"ihara","year":"1981","journal-title":"J Fac Sci Tokyo"},{"key":"24","first-page":"667","article-title":"Constant-rate OT from noisy channels","volume":"6842","author":"ishai","year":"2011","journal-title":"Proc of 29th Annual IACR CRYPTO"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1109\/FOCS.2009.56"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.1145\/1250790.1250794"},{"key":"27","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-85174-5_32"},{"journal-title":"Bilinear Complexity of Algebras and the Chudnovsky-Chudnovsky Interpolation Method","year":"2011","author":"randriambololona","key":"28"},{"key":"29","doi-asserted-by":"publisher","DOI":"10.1145\/359168.359176"},{"key":"3","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-662-03338-8","volume":"315","author":"bu?rgisser","year":"1997","journal-title":"Algebraic Complexity Theory"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1145\/62212.62213"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1007\/11818175_31"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1007\/s00200-004-0155-7"},{"key":"30","doi-asserted-by":"crossref","first-page":"145","DOI":"10.1007\/BFb0087999","article-title":"Curves with many points and multiplication in finite fields","volume":"1518","author":"shparlinski","year":"1992","journal-title":"Lecture Notes in Math"},{"journal-title":"Bounds on the Threshold Gap in Secret Sharing Over Small Fields","year":"2012","author":"cascudo","key":"7"},{"journal-title":"Torsion Limits and Riemann-Roch Systems for Function Fields and Applications","year":"2012","author":"cascudo","key":"6"},{"key":"32","doi-asserted-by":"publisher","DOI":"10.1002\/mana.19821090103"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-22792-9_39"},{"journal-title":"Algebraic Function Fields and Codes","year":"1993","author":"stichtenoth","key":"31"},{"key":"4","first-page":"466","article-title":"Asymptotically good ideal linear secret sharing with strong multiplication over any finite field","volume":"5677","author":"cascudo","year":"2009","journal-title":"Proc of 29th Annual IACR CRYPTO"},{"key":"9","first-page":"11","article-title":"Multi-party unconditionally secure protocols","author":"chaum","year":"1988","journal-title":"Proc of STOC 1988"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2011.2180696"}],"event":{"name":"2012 IEEE Information Theory Workshop (ITW 2012)","start":{"date-parts":[[2012,9,3]]},"location":"Lausanne, Switzerland","end":{"date-parts":[[2012,9,7]]}},"container-title":["2012 IEEE Information Theory Workshop"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6389798\/6404631\/06404767.pdf?arnumber=6404767","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,21]],"date-time":"2017-06-21T01:50:54Z","timestamp":1498009854000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6404767\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,9]]},"references-count":33,"URL":"https:\/\/doi.org\/10.1109\/itw.2012.6404767","relation":{},"subject":[],"published":{"date-parts":[[2012,9]]}}}