{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,17]],"date-time":"2026-01-17T05:14:41Z","timestamp":1768626881559,"version":"3.49.0"},"reference-count":33,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"12","license":[{"start":{"date-parts":[[2015,12,1]],"date-time":"2015-12-01T00:00:00Z","timestamp":1448928000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"funder":[{"DOI":"10.13039\/100000181","name":"Department of Defense under Air Force Opinions, interpretations, recommendations, and conclusions are those of the authors and are not necessarily endorsed by the United States Government","doi-asserted-by":"publisher","award":["FA8721-05-C-0002"],"award-info":[{"award-number":["FA8721-05-C-0002"]}],"id":[{"id":"10.13039\/100000181","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Information Systems of ASD(R&E)"},{"name":"Netapp faculty fellowship"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Inform. Theory"],"published-print":{"date-parts":[[2015,12]]},"DOI":"10.1109\/tit.2015.2482972","type":"journal-article","created":{"date-parts":[[2015,10,6]],"date-time":"2015-10-06T14:46:41Z","timestamp":1444142801000},"page":"6876-6886","source":"Crossref","is-referenced-by-count":27,"title":["Multi-User Guesswork and Brute Force Security"],"prefix":"10.1109","volume":"61","author":[{"given":"Mark M.","family":"Christiansen","sequence":"first","affiliation":[]},{"given":"Ken R.","family":"Duffy","sequence":"additional","affiliation":[]},{"given":"Flavio","family":"du Pin Calmon","sequence":"additional","affiliation":[]},{"given":"Muriel","family":"Medard","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref33","article-title":"A hybrid sequential and algebraic decoding scheme","author":"falconer","year":"1966"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1963.1057827"},{"key":"ref31","article-title":"Sequential decoding for reliable communication","author":"wozencraft","year":"1957"},{"key":"ref30","author":"lin","year":"2004","journal-title":"Error Control Coding Fundamentals and Applications"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2012.2219036"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2012.2217331"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/Allerton.2012.6483380"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/18.782106"},{"key":"ref14","first-page":"67","article-title":"On the incomparability of entropy and marginal guesswork in brute-force attacks","author":"pliam","year":"2000","journal-title":"Proc 1st Int Conf INDOCRYPT"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2011.2110870"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2002.1023480"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/18.669158"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2006.887466"},{"key":"ref19","first-page":"1","article-title":"On guessing the realization of an arbitrarily varying source","author":"sundaresan","year":"2006","journal-title":"Proc Nat Conf Commun"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1214\/aoms\/1177728487"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/18.481781"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2014.2329490"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.1994.394764"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2004.836665"},{"key":"ref29","author":"denuit","year":"2006","journal-title":"Actuarial Theory for Dependent Risks Measures Orders and Models"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2004.824921"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1070\/RM1995v050n02ABEH002056"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2010.2090221"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2013.6620428"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4612-5320-4"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/2187836.2187878"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2015.7282958"},{"key":"ref22","first-page":"12","article-title":"Guessing subject to distortion and reliability criteria","volume":"21","author":"haroutunian","year":"2000","journal-title":"Mathematical Problems of Computer Science"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2008.921707"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2007.4557309"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TELFOR.2012.6419265"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/ACSSC.2013.6810228"},{"key":"ref25","article-title":"Guessing and compression subject to distortion","author":"hanawal","year":"2010"}],"container-title":["IEEE Transactions on Information Theory"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/18\/7331248\/07293174.pdf?arnumber=7293174","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,12]],"date-time":"2022-01-12T11:45:26Z","timestamp":1641987926000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7293174\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,12]]},"references-count":33,"journal-issue":{"issue":"12"},"URL":"https:\/\/doi.org\/10.1109\/tit.2015.2482972","relation":{},"ISSN":["0018-9448","1557-9654"],"issn-type":[{"value":"0018-9448","type":"print"},{"value":"1557-9654","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015,12]]}}}