{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,8,6]],"date-time":"2024-08-06T09:46:20Z","timestamp":1722937580646},"publisher-location":"New York, New York, USA","reference-count":0,"publisher":"ACM Press","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1996]]},"DOI":"10.1145\/238168.238208","type":"proceedings-article","created":{"date-parts":[[2004,2,3]],"date-time":"2004-02-03T15:21:59Z","timestamp":1075821719000},"page":"153-156","source":"Crossref","is-referenced-by-count":2,"title":["Cryptanalysis of private-key encryption schemes based on burst-error-correcting codes"],"prefix":"10.1145","author":[{"given":"Hung-Min","family":"Sun","sequence":"first","affiliation":[]},{"given":"Shiuh-Pyng","family":"Shieh","sequence":"additional","affiliation":[]}],"member":"320","event":{"number":"3","sponsor":["SIGSAC, ACM Special Interest Group on Security, Audit, and Control"],"acronym":"CCS '96","name":"the 3rd ACM conference","start":{"date-parts":[[1996,3,14]]},"location":"New Delhi, India","end":{"date-parts":[[1996,3,15]]}},"container-title":["Proceedings of the 3rd ACM conference on Computer and communications security - CCS '96"],"original-title":[],"link":[{"URL":"http:\/\/dl.acm.org\/ft_gateway.cfm?id=238208&ftid=18254&dwn=1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2016,12,15]],"date-time":"2016-12-15T21:40:11Z","timestamp":1481838011000},"score":1,"resource":{"primary":{"URL":"http:\/\/portal.acm.org\/citation.cfm?doid=238168.238208"}},"subtitle":[],"proceedings-subject":"Computer and communications security","short-title":[],"issued":{"date-parts":[[1996]]},"references-count":0,"URL":"https:\/\/doi.org\/10.1145\/238168.238208","relation":{},"subject":[],"published":{"date-parts":[[1996]]}}}