{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T22:52:07Z","timestamp":1725663127007},"publisher-location":"Berlin, Heidelberg","reference-count":23,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540167761"},{"type":"electronic","value":"9783540398554"}],"license":[{"start":{"date-parts":[[1986,1,1]],"date-time":"1986-01-01T00:00:00Z","timestamp":504921600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1986]]},"DOI":"10.1007\/3-540-16776-5_704","type":"book-chapter","created":{"date-parts":[[2012,2,25]],"date-time":"2012-02-25T18:56:24Z","timestamp":1330196184000},"page":"2-16","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["On the arithmetics of Galoisfields and the like"],"prefix":"10.1007","author":[{"given":"Thomas","family":"Beth","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2005,6,4]]},"reference":[{"key":"2_CR1","volume-title":"Verfahren der schnellen Fourier-Transformation","author":"T. Beth","year":"1984","unstructured":"Beth, T.: Verfahren der schnellen Fourier-Transformation, Teubner, Stuttgart, 1984"},{"key":"2_CR2","volume-title":"Advances in Cryptology, Proc. Crypto '82","author":"E. Brickell","year":"1983","unstructured":"Brickell, E.: A Fast Modular Multiplication Algorithm with Applications TO Two-Key-Cryptography, in: Advances in Cryptology, Proc. Crypto '82, Plenum Press, New York (1983)"},{"key":"2_CR3","volume-title":"A Tabulation of Some Information Concerning Finite Fields","author":"J.H. Conway","year":"1968","unstructured":"Conway, J.H.: A Tabulation of Some Information Concerning Finite Fields in: Churchhouse\/Herz (eds.): Computers in Mathematical Research, North Holland (1968)"},{"key":"2_CR4","volume-title":"Algebra, HTB","author":"B.L. Waerden v.d.","year":"1968","unstructured":"v.d. Waerden, B.L.: Algebra, HTB, Springer, Heidelberg (1968)"},{"key":"2_CR5","volume-title":"Basic Algebra II","author":"N. Jacobson","year":"1980","unstructured":"Jacobson, N.: Basic Algebra II, Freeman, San Francisco (1980)"},{"key":"2_CR6","volume-title":"EUROCAL '85, LNCS 203","author":"T. Beth","year":"1985","unstructured":"Beth, T.: Algebraic and Symbolic Computation in Digital Signal Processing, Coding and Cryptography, in: EUROCAL '85, LNCS 203, Springer, Heidelberg (1985)"},{"key":"2_CR7","volume-title":"Algebraic Coding Theory","author":"E.R. Berlekamp","year":"1968","unstructured":"Berlekamp, E.R.: Algebraic Coding Theory, McGraw-Hill, New York (1968)"},{"key":"2_CR8","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-662-00551-4","volume-title":"Fast Fourier Transform and Convolution Algorithms","author":"H.J. Nussbaumer","year":"1981","unstructured":"Nussbaumer, H.J.: Fast Fourier Transform and Convolution Algorithms, Springer, Heidelberg (1981)"},{"key":"2_CR9","volume-title":"Vorlesungen \u00fcber Algebra","author":"H. L\u00fcneburg","year":"1981","unstructured":"L\u00fcneburg, H.: Vorlesungen \u00fcber Algebra, Manuskript, Kaiserslautern 1981\u20131984"},{"key":"2_CR10","unstructured":"Massey, J.L., Omura, J.K.: Computational Method and Apparatus for Finite Field Arithmetic, US patent application (1981)"},{"issue":"8","key":"2_CR11","doi-asserted-by":"crossref","first-page":"709","DOI":"10.1109\/TC.1985.1676616","volume":"C-34","author":"C.C. Wang","year":"1985","unstructured":"Wang, C.C. et al.: VLSI Architectures for Computing Multiplications and Inverses in GF(2m), IEEE Transactions on Computers, C-34, No.8, 709\u2013717, August 1985","journal-title":"IEEE Transactions on Computers"},{"key":"2_CR12","doi-asserted-by":"crossref","first-page":"238","DOI":"10.1007\/BF01192776","volume":"40","author":"T. Beth","year":"1983","unstructured":"Beth, T., Fumy, W., M\u00fchlfeld, R.: Zur Algebraischen Diskreten Fourier-Transformation, Arch. Math. 40, 238\u2013244 (1983)","journal-title":"Arch. Math."},{"key":"2_CR13","unstructured":"Berlekamp, E.R.: Bit-Serial Reed-Soloman-Encoders, preprint, Cyclotomics Inc. 1983"},{"key":"2_CR14","volume-title":"Finite Fields","author":"H. Niederreiter","year":"1983","unstructured":"Niederreiter, H.; Lidl, R.: Finite Fields, Addison-Wesley, Reading, Mass. (1983)"},{"key":"2_CR15","volume-title":"\u00dcber orthogonale Transformationen und fehler-korrigierende Codes","author":"W. Fumy","year":"1985","unstructured":"Fumy, W.: \u00dcber orthogonale Transformationen und fehler-korrigierende Codes, Dissertation, Erlangen 1985"},{"key":"2_CR16","unstructured":"MacWilliams, F.J.; Sloane, N.J.H.: The Theory of Error-Correcting Codes, North-Holland (1977)"},{"key":"2_CR17","doi-asserted-by":"crossref","first-page":"95","DOI":"10.1016\/0012-365X(85)90016-0","volume":"56","author":"T. Beth","year":"1985","unstructured":"Beth, T.: Generalising the Discrete Fourier-Transform, Discrete Math. 56, 95\u2013100 (1985)","journal-title":"Discrete Math."},{"key":"2_CR18","unstructured":"Gollmann, D.: Dual-Basis Representations, manuscript, Karlsruhe 1985"},{"key":"2_CR19","volume-title":"Seminumerical Algorithms","author":"D.E. Knuth","year":"1981","unstructured":"Knuth, D.E.: Seminumerical Algorithms, Addison-Wesley, Reading, Mass. (1981)"},{"key":"2_CR20","doi-asserted-by":"crossref","first-page":"644","DOI":"10.1109\/TIT.1976.1055638","volume":"IT-22","author":"W. Diffie","year":"1976","unstructured":"Diffie, W.; Hellmann, M.E.: New Directions in Cryptography, IEEE Trans.Inf. Theory, IT-22 644\u2013654 (1976)","journal-title":"IEEE Trans.Inf. Theory"},{"key":"2_CR21","unstructured":"Beth, T.; Cook, B.M.; Gollmann, D.: Fast Exponentiators in VLSI, manuscript, Karlsruhe 1985"},{"key":"2_CR22","unstructured":"Catt, I.: Wafer-scale Integration, Wireless World, 57\u201359, July 1981"},{"key":"2_CR23","unstructured":"L\u00fcneburg, H.: Galoisfelder, Kreisteilungsk\u00f6rper und Schiebe-registerfolgen, Bibl. Institut, Mannheim (1979)"}],"container-title":["Lecture Notes in Computer Science","Algebraic Algorithms and Error-Correcting Codes"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-16776-5_704","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,1,9]],"date-time":"2020-01-09T02:20:17Z","timestamp":1578536417000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-16776-5_704"}},"subtitle":["Algebraic questions arising in the design of secure communication systems"],"short-title":[],"issued":{"date-parts":[[1986]]},"ISBN":["9783540167761","9783540398554"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/3-540-16776-5_704","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[1986]]},"assertion":[{"value":"4 June 2005","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}