{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,6,20]],"date-time":"2024-06-20T22:35:58Z","timestamp":1718922958979},"reference-count":21,"publisher":"Society for Industrial & Applied Mathematics (SIAM)","issue":"7","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["SIAM J. Comput."],"published-print":{"date-parts":[[2010,1]]},"DOI":"10.1137\/080722771","type":"journal-article","created":{"date-parts":[[2010,5,5]],"date-time":"2010-05-05T18:08:16Z","timestamp":1273082896000},"page":"2761-2822","source":"Crossref","is-referenced-by-count":20,"title":["On the Implementation of Huge Random Objects"],"prefix":"10.1137","volume":"39","author":[{"given":"Oded","family":"Goldreich","sequence":"first","affiliation":[]},{"given":"Shafi","family":"Goldwasser","sequence":"additional","affiliation":[]},{"given":"Asaf","family":"Nussboim","sequence":"additional","affiliation":[]}],"member":"351","reference":[{"key":"R2","doi-asserted-by":"publisher","DOI":"10.1016\/0196-6774(86)90019-2"},{"key":"R5","doi-asserted-by":"publisher","DOI":"10.1016\/0022-0000(92)90019-F"},{"key":"R6","doi-asserted-by":"publisher","DOI":"10.1137\/0213053"},{"key":"R10","doi-asserted-by":"publisher","DOI":"10.1016\/0022-314X(83)90002-1"},{"key":"R11","doi-asserted-by":"publisher","DOI":"10.1016\/0885-064X(89)90015-0"},{"key":"R13","first-page":"251","volume":"12","author":"Erd\u00f6s P.","year":"1963","journal-title":"Wiss. Z. Martin-Luther-Univ. Halle\u2013Wittenberg, Math.-Natur. Reihe"},{"key":"R17","doi-asserted-by":"publisher","DOI":"10.1016\/0020-0190(90)90010-U"},{"key":"R20","doi-asserted-by":"publisher","DOI":"10.1145\/6490.6503"},{"key":"R21","doi-asserted-by":"publisher","DOI":"10.1002\/rsa.3240030206"},{"key":"R22","doi-asserted-by":"publisher","DOI":"10.1007\/s00453-001-0078-7"},{"key":"R24","doi-asserted-by":"publisher","DOI":"10.1016\/0022-0000(84)90070-9"},{"key":"R25","doi-asserted-by":"publisher","DOI":"10.1137\/S0097539793244708"},{"key":"R27","doi-asserted-by":"publisher","DOI":"10.1007\/BF02579157"},{"key":"R28","doi-asserted-by":"publisher","DOI":"10.1017\/S0963548300001012"},{"key":"R30","doi-asserted-by":"publisher","DOI":"10.1016\/0166-218X(94)00058-L"},{"key":"R31","doi-asserted-by":"publisher","DOI":"10.1137\/0215020"},{"key":"R33","doi-asserted-by":"publisher","DOI":"10.1007\/BF02126799"},{"key":"R34","doi-asserted-by":"publisher","DOI":"10.1137\/0217022"},{"key":"R35","doi-asserted-by":"publisher","DOI":"10.1007\/BF02579283"},{"key":"R38","doi-asserted-by":"crossref","first-page":"97","DOI":"10.1007\/s00145-001-0008-5","volume":"15","author":"Naor M.","year":"2002","journal-title":"J. Cryptology","ISSN":"http:\/\/id.crossref.org\/issn\/0933-2790","issn-type":"print"},{"key":"R39","doi-asserted-by":"publisher","DOI":"10.1016\/S0196-6774(03)00017-8"}],"container-title":["SIAM Journal on Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/epubs.siam.org\/doi\/pdf\/10.1137\/080722771","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,19]],"date-time":"2017-06-19T03:51:44Z","timestamp":1497844304000},"score":1,"resource":{"primary":{"URL":"http:\/\/epubs.siam.org\/doi\/10.1137\/080722771"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,1]]},"references-count":21,"journal-issue":{"issue":"7","published-print":{"date-parts":[[2010,1]]}},"alternative-id":["10.1137\/080722771"],"URL":"https:\/\/doi.org\/10.1137\/080722771","relation":{},"ISSN":["0097-5397","1095-7111"],"issn-type":[{"value":"0097-5397","type":"print"},{"value":"1095-7111","type":"electronic"}],"subject":[],"published":{"date-parts":[[2010,1]]}}}