{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,1,14]],"date-time":"2023-01-14T02:51:29Z","timestamp":1673664689810},"reference-count":62,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"9","license":[{"start":{"date-parts":[[2011,9,1]],"date-time":"2011-09-01T00:00:00Z","timestamp":1314835200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Inform. Theory"],"published-print":{"date-parts":[[2011,9]]},"DOI":"10.1109\/tit.2011.2161960","type":"journal-article","created":{"date-parts":[[2011,9,12]],"date-time":"2011-09-12T19:28:06Z","timestamp":1315855686000},"page":"6285-6303","source":"Crossref","is-referenced-by-count":9,"title":["Authentication of Digital Streams"],"prefix":"10.1109","volume":"57","author":[{"given":"Christophe","family":"Tartary","sequence":"first","affiliation":[]},{"given":"Huaxiong","family":"Wang","sequence":"additional","affiliation":[]},{"given":"San","family":"Ling","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","author":"zanotti","year":"0","journal-title":"Le Code Correcteur C I R C"},{"key":"ref38","doi-asserted-by":"crossref","DOI":"10.1201\/9781439821916","author":"menezes","year":"1996","journal-title":"Handbook of Applied Cryptography"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-004-0314-9"},{"key":"ref32","author":"cohen","year":"2006","journal-title":"Handbook of Elliptic and Hyperelliptic Curve Cryptography"},{"key":"ref31","doi-asserted-by":"crossref","first-page":"275","DOI":"10.1007\/978-3-540-30574-3_19","article-title":"Accumulators from bilinear pairings and applications","volume":"3376","author":"nguyen","year":"2005","journal-title":"Topics in Cryptology ? CT-RSA 2005"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1504\/IJSN.2007.013172"},{"key":"ref37","author":"stinson","year":"2006","journal-title":"Cryptography Theory and Practice"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511546891"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/18.782097"},{"key":"ref34","author":"mceliece","year":"2003","journal-title":"The Guruswami-Sudan Decoding Algorithm for ReedSolomon Codes"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1137\/S0895480198344540"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-00468-1_6"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1007\/s10623-007-9055-8"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2007.4290317"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/90.793005"},{"key":"ref29","author":"tartary","year":"2007","journal-title":"Authentication for Multicast Communication"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2004.5342292"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.17487\/rfc0768"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-73458-1_22"},{"key":"ref22","article-title":"Distillation codes and applications to dos resistant multicast authentication","author":"karlof","year":"2004","journal-title":"11th Network and Distributed Systems Security Symp"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-75670-5_2"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/0-387-34805-0_21"},{"key":"ref23","first-page":"274","article-title":"One-way accumulators: A decentralized alternative to digital signatures","volume":"765","author":"benaloh","year":"1993","journal-title":"Proc Advances in Cryptology?EUROCRYPT 93"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/SNPD.2007.176"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/SECURECOMM.2005.15"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1006\/jcom.1997.0439"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2010.2053901"},{"key":"ref59","year":"2009","journal-title":"Post-Quantum Cryptography"},{"key":"ref58","first-page":"978","article-title":"Directions in polynomial reconstruction based cryptography","volume":"e87 a","author":"kiayias","year":"2004","journal-title":"IEICE Trans"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2008.921876"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1137\/S0097539704383633"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1145\/301250.301312"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/18.490540"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1049\/iet-com:20060057"},{"key":"ref52","first-page":"109","article-title":"Implementing the interpolation step in the Guruswami-Sudan algorithm","author":"trifonov","year":"2009","journal-title":"Proc XII Int Symp Problems of Redundancy in Information and Control Systems"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/11967668_21"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ISCC.2002.1021720"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2004.833807"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.2002.1004374"},{"key":"ref13","first-page":"799","article-title":"The eSAIDA stream authentication scheme","volume":"3046","author":"park","year":"2004","journal-title":"Comput Sci Appl"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.2004.1301327"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/1698750.1698757"},{"key":"ref16","author":"macwilliams","year":"1977","journal-title":"The Theory of Error-Correcting Codes"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/11604938_9"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/11935070_7"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/11908739_10"},{"key":"ref4","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4615-0229-6","author":"perrig","year":"2003","journal-title":"Secure Broadcast Communication In Wired and Wireless Networks"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.2000.848446"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.2001.924301"},{"key":"ref5","first-page":"13","article-title":"Authenticating streamed data in the presence of random packet loss","author":"golle","year":"2001","journal-title":"Proc 8th Annu Symp Network and Distributed System Security"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.1999.749301"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/90.779192"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-39200-9_14"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-47734-9_24"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1016\/S0024-3795(01)00509-2"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1002\/0471739219"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1983.1056650"},{"key":"ref47","first-page":"53","article-title":"Noisy polynomial interpolation and noisy Chinese remaindering","volume":"1807","author":"bleichenbacher","year":"2000","journal-title":"Proc Advances in CryptologyEuroCrypto"},{"key":"ref42","first-page":"90","volume":"48","author":"wozencraft","year":"1958","journal-title":"Quarterly Progr Rep"},{"key":"ref41","first-page":"94","article-title":"List decoding for noisy channels","author":"elias","year":"1957","journal-title":"Proc IRE Wescon Conf Record (Part2)"},{"key":"ref44","author":"guruswami","year":"2004","journal-title":"List decoding of error-correcting codes"},{"key":"ref43","doi-asserted-by":"crossref","DOI":"10.1561\/9781601980052","volume":"2","author":"guruswami","year":"2006","journal-title":"Algorithmic Results in List Decoding"}],"container-title":["IEEE Transactions on Information Theory"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/18\/6006569\/06006616.pdf?arnumber=6006616","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,10,10]],"date-time":"2021-10-10T23:47:38Z","timestamp":1633909658000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6006616\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,9]]},"references-count":62,"journal-issue":{"issue":"9"},"URL":"https:\/\/doi.org\/10.1109\/tit.2011.2161960","relation":{},"ISSN":["0018-9448","1557-9654"],"issn-type":[{"value":"0018-9448","type":"print"},{"value":"1557-9654","type":"electronic"}],"subject":[],"published":{"date-parts":[[2011,9]]}}}