{"@context":["https://w3id.org/fdo/context/v1",{"schema":"https://schema.org/","prov":"http://www.w3.org/ns/prov#","fdo":"https://w3id.org/fdo/vocabulary/"}],"@id":"https://fdo.portal.mardi4nfdi.de/fdo/Q2938680","@type":"DigitalObject","kernel":{"@id":"https://fdo.portal.mardi4nfdi.de/fdo/Q2938680","digitalObjectType":"https://schema.org/ScholarlyArticle","primaryIdentifier":"mardi:Q2938680","kernelVersion":"v1","immutable":true,"modified":"2026-01-21T02:22:59Z"},"profile":{"@context":"https://schema.org","@type":"ScholarlyArticle","@id":"https://portal.mardi4nfdi.de/entity/Q2938680","name":"Attacking code-based cryptosystems with information set decoding using special-purpose hardware","headline":"Attacking code-based cryptosystems with information set decoding using special-purpose hardware","description":"scientific article; zbMATH DE number 6386738","url":"https://portal.mardi4nfdi.de/entity/Q2938680","datePublished":"2015-01-14","author":[{"@id":"https://portal.mardi4nfdi.de/entity/Q2851420"},{"@id":"https://portal.mardi4nfdi.de/entity/Q455871"},{"@id":"https://portal.mardi4nfdi.de/entity/Q204358"}],"publisher":[{"@id":"https://portal.mardi4nfdi.de/entity/Q2802597"}],"identifier":{"@type":"PropertyValue","propertyID":"doi","value":"10.1007/978-3-319-11659-4_8","url":"https://doi.org/10.1007/978-3-319-11659-4_8"},"sameAs":["https://doi.org/10.1007/978-3-319-11659-4_8"]},"provenance":{"prov:generatedAtTime":"2026-01-21T02:22:59Z","prov:wasAttributedTo":"MaRDI Knowledge Graph"}}