{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,20]],"date-time":"2025-02-20T05:19:48Z","timestamp":1740028788636,"version":"3.37.3"},"reference-count":0,"publisher":"IOS Press","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"abstract":"<jats:p>Since 1996 it is already known that the wide used cryptographic algorithms, with formally proven security, can be broken by inducing errors during encryption process. Therefore, the threat of successful fault analysis is reasonable and some countermeasures have to be taken. One approach for achieving the security against fault analysis is to use error detection and error correction codes.<\/jats:p>","DOI":"10.3233\/978-1-60750-002-5-250","type":"book-chapter","created":{"date-parts":[[2025,2,19]],"date-time":"2025-02-19T19:11:46Z","timestamp":1739992306000},"source":"Crossref","is-referenced-by-count":0,"title":["Linear Codes of Good Error Control Performance"],"prefix":"10.3233","author":[{"family":"Baicheva Tsonka","sequence":"additional","affiliation":[]}],"member":"7437","container-title":["NATO Science for Peace and Security Series - D: Information and Communication Security","Enhancing Cryptographic Primitives with Techniques from Error Correcting Codes"],"original-title":[],"deposited":{"date-parts":[[2025,2,19]],"date-time":"2025-02-19T19:19:18Z","timestamp":1739992758000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.medra.org\/servlet\/aliasResolver?alias=iospressISSNISBN&issn=1874-6268&volume=23&spage=250"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"references-count":0,"URL":"https:\/\/doi.org\/10.3233\/978-1-60750-002-5-250","relation":{},"ISSN":["1874-6268"],"issn-type":[{"value":"1874-6268","type":"print"}],"subject":[],"published":{"date-parts":[[2009]]}}}