{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:56:24Z","timestamp":1750308984394,"version":"3.41.0"},"reference-count":4,"publisher":"Association for Computing Machinery (ACM)","issue":"1","license":[{"start":{"date-parts":[[1983,1,1]],"date-time":"1983-01-01T00:00:00Z","timestamp":410227200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["SIGACT News"],"published-print":{"date-parts":[[1983,1]]},"DOI":"10.1145\/1008908.1008915","type":"journal-article","created":{"date-parts":[[2004,10,12]],"date-time":"2004-10-12T15:20:46Z","timestamp":1097594446000},"page":"45-49","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["The solution of a general equation for the public key system"],"prefix":"10.1145","volume":"15","author":[{"given":"Ernst","family":"Henze","sequence":"first","affiliation":[{"name":"Technische Universit\u00e4t Braunschweig, Braunschweig, Fed. Rep. Germany"}]}],"member":"320","published-online":{"date-parts":[[1983,1]]},"reference":[{"key":"e_1_2_1_1_1","unstructured":"Acz\u00e9l J. \"Lectures on Functional Equations and Their Applications \" Academic Press New York 1966  Acz\u00e9l J. \"Lectures on Functional Equations and Their Applications \" Academic Press New York 1966"},{"key":"e_1_2_1_2_1","first-page":"22","author":"Diffie W.","year":"1976","unstructured":"Diffie , W. and Hellmann, M. E. , \" New Directions in Cryptography,\" IEEE Trans. Inform. Theory , vol. I T- 22 , pp. 644--654, 1976 Diffie, W. and Hellmann, M. E., \"New Directions in Cryptography,\" IEEE Trans. Inform. Theory, vol. IT-22, pp. 644--654, 1976","journal-title":"IEEE Trans. Inform. Theory"},{"key":"e_1_2_1_3_1","unstructured":"Henze E. \"Kryptographie und Nachrichten\u00fcber tragung \" Informationsverarbeitung und Kommunikation R. Oldenbourg Verlag M\u00fcnchen 1979  Henze E. \"Kryptographie und Nachrichten\u00fcber tragung \" Informationsverarbeitung und Kommunikation R. Oldenbourg Verlag M\u00fcnchen 1979"},{"key":"e_1_2_1_4_1","first-page":"105","volume":"9","author":"Hossz\u00fa M.","year":"1962","unstructured":"Hossz\u00fa , M. , \"Note on commutable mappings,\" Public. Math. Tom 9 , 1962 , pp. 105 -- 106 Hossz\u00fa, M., \"Note on commutable mappings,\" Public. Math. Tom 9, 1962, pp. 105--106","journal-title":"Public. Math. Tom"}],"container-title":["ACM SIGACT News"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1008908.1008915","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1008908.1008915","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T21:41:08Z","timestamp":1750282868000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1008908.1008915"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1983,1]]},"references-count":4,"journal-issue":{"issue":"1","published-print":{"date-parts":[[1983,1]]}},"alternative-id":["10.1145\/1008908.1008915"],"URL":"https:\/\/doi.org\/10.1145\/1008908.1008915","relation":{},"ISSN":["0163-5700"],"issn-type":[{"type":"print","value":"0163-5700"}],"subject":[],"published":{"date-parts":[[1983,1]]},"assertion":[{"value":"1983-01-01","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}