{"@context":["https://w3id.org/fdo/context/v1",{"schema":"https://schema.org/","prov":"http://www.w3.org/ns/prov#","fdo":"https://w3id.org/fdo/vocabulary/"}],"@id":"https://fdo.portal.mardi4nfdi.de/fdo/Q4590397","@type":"DigitalObject","kernel":{"@id":"https://fdo.portal.mardi4nfdi.de/fdo/Q4590397","digitalObjectType":"https://schema.org/ScholarlyArticle","primaryIdentifier":"mardi:Q4590397","kernelVersion":"v1","immutable":true,"modified":"2024-07-30T09:39:35Z"},"profile":{"@context":"https://schema.org","@type":"ScholarlyArticle","@id":"https://portal.mardi4nfdi.de/entity/Q4590397","name":"Security of public-key cryptosystems based on Chebyshev polynomials","headline":"Security of public-key cryptosystems based on Chebyshev polynomials","description":"scientific article; zbMATH DE number 6809925","url":"https://portal.mardi4nfdi.de/entity/Q4590397","datePublished":"2017-11-20","author":[{"@id":"https://portal.mardi4nfdi.de/entity/Q4590396"},{"@id":"https://portal.mardi4nfdi.de/entity/Q517014"},{"@id":"https://portal.mardi4nfdi.de/entity/Q240098"},{"@id":"https://portal.mardi4nfdi.de/entity/Q213510"}],"publisher":[{"@id":"https://portal.mardi4nfdi.de/entity/Q4590152"}],"identifier":{"@type":"PropertyValue","propertyID":"doi","value":"10.1109/TCSI.2005.851701","url":"https://doi.org/10.1109/TCSI.2005.851701"},"sameAs":["https://doi.org/10.1109/TCSI.2005.851701"]},"provenance":{"prov:generatedAtTime":"2024-07-30T09:39:35Z","prov:wasAttributedTo":"MaRDI Knowledge Graph"}}