{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,11]],"date-time":"2026-02-11T14:04:13Z","timestamp":1770818653384,"version":"3.50.1"},"reference-count":18,"publisher":"Society for Industrial & Applied Mathematics (SIAM)","issue":"4","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["SIAM J. Comput."],"published-print":{"date-parts":[[2006,1]]},"DOI":"10.1137\/s0097539705446950","type":"journal-article","created":{"date-parts":[[2007,2,21]],"date-time":"2007-02-21T14:53:39Z","timestamp":1172069619000},"page":"845-888","source":"Crossref","is-referenced-by-count":136,"title":["Cryptography in $NC^0$"],"prefix":"10.1137","volume":"36","author":[{"given":"Benny","family":"Applebaum","sequence":"first","affiliation":[]},{"given":"Yuval","family":"Ishai","sequence":"additional","affiliation":[]},{"given":"Eyal","family":"Kushilevitz","sequence":"additional","affiliation":[]}],"member":"351","reference":[{"key":"R1","doi-asserted-by":"publisher","DOI":"10.1006\/jcss.1998.1583"},{"key":"R9","doi-asserted-by":"publisher","DOI":"10.1145\/1008908.1008911"},{"key":"R11","doi-asserted-by":"publisher","DOI":"10.1137\/0213053"},{"key":"R14","doi-asserted-by":"publisher","DOI":"10.1137\/0217015"},{"key":"R18","doi-asserted-by":"publisher","DOI":"10.1007\/s001459900026"},{"key":"R19","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1985.1057074"},{"key":"R22","volume":"7","author":"Goldreich O.","year":"2000","journal-title":"Electronic Colloquium on Computational Complexity (ECCC)"},{"key":"R25","volume":"96","author":"Goldreich O.","year":"1996","journal-title":"Electronic Colloquium on Computational Complexity"},{"key":"R26","doi-asserted-by":"publisher","DOI":"10.1007\/s001459900010"},{"key":"R27","doi-asserted-by":"publisher","DOI":"10.1137\/0222069"},{"key":"R29","doi-asserted-by":"publisher","DOI":"10.1016\/0022-0000(84)90070-9"},{"key":"R32","doi-asserted-by":"publisher","DOI":"10.1016\/0020-0190(87)90053-6"},{"key":"R33","doi-asserted-by":"publisher","DOI":"10.1137\/S0097539793244708"},{"key":"R36","doi-asserted-by":"publisher","DOI":"10.1007\/s001459900012"},{"key":"R42","doi-asserted-by":"publisher","DOI":"10.1145\/174130.174138"},{"key":"R44","doi-asserted-by":"publisher","DOI":"10.1145\/972639.972643"},{"key":"R45","doi-asserted-by":"publisher","DOI":"10.1007\/BF01305237"},{"key":"R49","doi-asserted-by":"publisher","DOI":"10.1145\/359340.359342"}],"container-title":["SIAM Journal on Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/epubs.siam.org\/doi\/pdf\/10.1137\/S0097539705446950","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,1,29]],"date-time":"2017-01-29T12:00:47Z","timestamp":1485691247000},"score":1,"resource":{"primary":{"URL":"http:\/\/epubs.siam.org\/doi\/10.1137\/S0097539705446950"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006,1]]},"references-count":18,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2006,1]]}},"alternative-id":["10.1137\/S0097539705446950"],"URL":"https:\/\/doi.org\/10.1137\/s0097539705446950","relation":{},"ISSN":["0097-5397","1095-7111"],"issn-type":[{"value":"0097-5397","type":"print"},{"value":"1095-7111","type":"electronic"}],"subject":[],"published":{"date-parts":[[2006,1]]}}}