{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,6,17]],"date-time":"2024-06-17T13:18:19Z","timestamp":1718630299610},"reference-count":12,"publisher":"Oxford University Press (OUP)","issue":"4","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["The Computer Journal"],"DOI":"10.1093\/comjnl\/bxm090","type":"journal-article","created":{"date-parts":[[2008,1,19]],"date-time":"2008-01-19T01:15:46Z","timestamp":1200705346000},"page":"419-434","source":"Crossref","is-referenced-by-count":8,"title":["Selectively Convertible Authenticated Encryption in the Random Oracle Model"],"prefix":"10.1093","volume":"51","author":[{"given":"H.-Y.","family":"Chien","sequence":"first","affiliation":[]}],"member":"286","published-online":{"date-parts":[[2007,9,5]]},"reference":[{"key":"3_30288129","first-page":"63","volume":"82","year":"1999","journal-title":"IEICE TRANS FUNDAM"},{"key":"4_30288130","doi-asserted-by":"crossref","first-page":"445","DOI":"10.15388\/Informatica.2003.033","volume":"14","year":"2003","journal-title":"INFORMATICA"},{"key":"5_26268139","doi-asserted-by":"crossref","first-page":"1212","DOI":"10.1049\/el:19940856","volume":"30","year":"1994","journal-title":"ELECTRON. LETT."},{"key":"6_30288131","doi-asserted-by":"crossref","first-page":"281","DOI":"10.1049\/el:20030190","volume":"39","year":"2003","journal-title":"ELECTRON. LETT."},{"key":"9_30288132","first-page":"1228","volume":"83","year":"2000","journal-title":"IEICE TRANS FUNDAM ELECTRON COMMUN COMPUT SCI"},{"key":"11_30288133","doi-asserted-by":"crossref","first-page":"1639","DOI":"10.1109\/18.259647","volume":"39","year":"1993","journal-title":"IEEE TRANS INF"},{"key":"13_30288134","doi-asserted-by":"crossref","first-page":"205","DOI":"10.1016\/S0164-1212(01)00143-1","volume":"62","year":"2002","journal-title":"J SYST SOFTW"},{"key":"14_30288135","doi-asserted-by":"crossref","first-page":"81","DOI":"10.1007\/s10623-004-3806-6","volume":"37","year":"2005","journal-title":"DES CODES CRYPTOGR"},{"key":"18_30288136","first-page":"206","volume":"89","year":"2006","journal-title":"IEICE TRANS FUNDAM"},{"key":"19_26151211","doi-asserted-by":"crossref","first-page":"469","DOI":"10.1109\/TIT.1985.1057074","volume":"31","year":"1985","journal-title":"IEEE TRANS INF THEORY"},{"key":"21_30288137","doi-asserted-by":"crossref","first-page":"149","DOI":"10.1049\/ip-cdt:19981862","volume":"145","year":"1998","journal-title":"IEE PROC COMPUT AND DIGIT TECH"},{"key":"23_30288138","first-page":"1093","volume":"88","year":"2005","journal-title":"IEICE TRANS FUNDAM"}],"container-title":["The Computer Journal"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/academic.oup.com\/comjnl\/article-pdf\/51\/4\/419\/1162996\/bxm090.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,4,30]],"date-time":"2020-04-30T22:56:24Z","timestamp":1588287384000},"score":1,"resource":{"primary":{"URL":"https:\/\/academic.oup.com\/comjnl\/article-lookup\/doi\/10.1093\/comjnl\/bxm090"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007,9,5]]},"references-count":12,"journal-issue":{"issue":"4","published-online":{"date-parts":[[2007,9,5]]}},"URL":"https:\/\/doi.org\/10.1093\/comjnl\/bxm090","relation":{},"ISSN":["0010-4620","1460-2067"],"issn-type":[{"value":"0010-4620","type":"print"},{"value":"1460-2067","type":"electronic"}],"subject":[],"published":{"date-parts":[[2007,9,5]]}}}