iBet uBet web content aggregator. Adding the entire web to your favor.
iBet uBet web content aggregator. Adding the entire web to your favor.



Link to original content: https://api.crossref.org/works/10.1145/3387902.3392630
{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T21:11:46Z","timestamp":1730322706549,"version":"3.28.0"},"publisher-location":"New York, NY, USA","reference-count":17,"publisher":"ACM","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,5,11]]},"DOI":"10.1145\/3387902.3392630","type":"proceedings-article","created":{"date-parts":[[2020,5,25]],"date-time":"2020-05-25T22:41:17Z","timestamp":1590446477000},"page":"132-141","update-policy":"http:\/\/dx.doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["Constant weight strings in constant time"],"prefix":"10.1145","author":[{"given":"Alessandro","family":"Barenghi","sequence":"first","affiliation":[{"name":"Politecnico di Milano, Milano, Italy"}]},{"given":"Gerardo","family":"Pelosi","sequence":"additional","affiliation":[{"name":"Politecnico di Milano, Milano, Italy"}]}],"member":"320","published-online":{"date-parts":[[2020,5,23]]},"reference":[{"volume-title":"Quantum-Safe Cryptography (QSC). (March","year":"2017","author":"European Telecommunications Standards Institute (ETSI). 2017.","key":"e_1_3_2_1_1_1"},{"volume":"10786","volume-title":"PQCrypto 2018, Fort Lauderdale, FL, USA, April 9-11, 2018, Proceedings (Lecture Notes in Computer Science)","year":"2018","author":"Baldi Marco","key":"e_1_3_2_1_2_1"},{"volume-title":"CBC 2019","year":"2019","author":"Baldi Marco","key":"e_1_3_2_1_3_1"},{"volume-title":"LEDACrypt Specification v2.0. https:\/\/www.ledacrypt.org\/documents\/LEDAcrypt_spec_latest.pdf, last accessed","year":"2019","author":"Baldi Marco","key":"e_1_3_2_1_4_1"},{"volume-title":"Evaluating the Trade-offs in the Hardware Design of the LEDAcrypt Encryption Functions. In 26th IEEE International Conference on Electronics, Circuits and Systems, ICECS 2019","year":"2019","author":"Barenghi Alessandro","key":"e_1_3_2_1_5_1"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.5281\/zenodo.3747545"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1015047.1015050"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-20951-3_13"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1966.1053907"},{"key":"e_1_3_2_1_10_1","first-page":"45","article-title":"Generating All Combinations and Partitions","volume":"4","author":"Knuth Donald Erwin","year":"1887","journal-title":"The Art of Computer Programming"},{"volume":"1992","volume-title":"PKC 2001 (LNCS)","year":"2001","author":"Kobara Kazukuni","key":"e_1_3_2_1_11_1"},{"volume-title":"DSN PR 42-44","year":"1978","author":"McEliece R. J.","key":"e_1_3_2_1_12_1"},{"volume-title":"Post-Quantum Crypto Project. (Nov","year":"2017","author":"National Institute of Standards and Technology. 2017.","key":"e_1_3_2_1_13_1"},{"key":"e_1_3_2_1_14_1","first-page":"159","article-title":"Knapsack-type cryptosystems and algebraic coding theory","volume":"15","author":"Niederreiter H.","year":"1986","journal-title":"Probl. Contr. and Inform. Theory"},{"volume-title":"Sopra una formola numerica. Giornale di matematiche 25, 1","year":"1887","author":"Pascal Ernesto","key":"e_1_3_2_1_15_1"},{"volume-title":"DATE","year":"2017","author":"Reparaz Oscar","key":"e_1_3_2_1_16_1"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2005.1523371"}],"event":{"name":"CF '20: Computing Frontiers Conference","sponsor":["SIGMICRO ACM Special Interest Group on Microarchitectural Research and Processing"],"location":"Catania Sicily Italy","acronym":"CF '20"},"container-title":["Proceedings of the 17th ACM International Conference on Computing Frontiers"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3387902.3392630","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,6]],"date-time":"2023-01-06T14:45:23Z","timestamp":1673016323000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3387902.3392630"}},"subtitle":["a building block for code-based post-quantum cryptosystems"],"short-title":[],"issued":{"date-parts":[[2020,5,11]]},"references-count":17,"alternative-id":["10.1145\/3387902.3392630","10.1145\/3387902"],"URL":"https:\/\/doi.org\/10.1145\/3387902.3392630","relation":{},"subject":[],"published":{"date-parts":[[2020,5,11]]},"assertion":[{"value":"2020-05-23","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}