{"@context":{"@vocab":"https://cir.nii.ac.jp/schema/1.0/","rdfs":"http://www.w3.org/2000/01/rdf-schema#","dc":"http://purl.org/dc/elements/1.1/","dcterms":"http://purl.org/dc/terms/","foaf":"http://xmlns.com/foaf/0.1/","prism":"http://prismstandard.org/namespaces/basic/2.0/","cinii":"http://ci.nii.ac.jp/ns/1.0/","datacite":"https://schema.datacite.org/meta/kernel-4/","ndl":"http://ndl.go.jp/dcndl/terms/","jpcoar":"https://github.com/JPCOAR/schema/blob/master/2.0/"},"@id":"https://cir.nii.ac.jp/crid/1520009410308338560.json","@type":"Article","productIdentifier":[{"identifier":{"@type":"NDL_BIB_ID","@value":"4874492"}},{"identifier":{"@type":"URI","@value":"http://id.ndl.go.jp/bib/4874492"}},{"identifier":{"@type":"URI","@value":"https://ndlsearch.ndl.go.jp/books/R000000004-I4874492"}},{"identifier":{"@type":"NAID","@value":"110003298747"}},{"identifier":{"@type":"NAID","@value":"10022263390"}}],"dc:title":[{"@value":"新しい公開鍵暗号の実現法"},{"@language":"ja-Kana","@value":"アタラシイ コウカイ カギ アンゴウ ノ ジツゲンホウ"}],"dcterms:alternative":[{"@value":"新しい公開鍵暗号の実現法"}],"dc:language":"ja","creator":[{"@id":"https://cir.nii.ac.jp/crid/1580291225702491136","@type":"Researcher","foaf:name":[{"@value":"笠原 正雄"}]},{"@id":"https://cir.nii.ac.jp/crid/1580009752432808833","@type":"Researcher","personIdentifier":[{"@type":"NRID","@value":"9000001651624"}],"foaf:name":[{"@value":"村上 恭通"}]}],"publication":{"publicationIdentifier":[{"@type":"NDL_BIB_ID","@value":"000000050569"},{"@type":"ISSN","@value":"09135685"},{"@type":"LISSN","@value":"09135685"},{"@type":"NCID","@value":"AA1123312X"}],"prism:publicationName":[{"@value":"電子情報通信学会技術研究報告 = IEICE technical report : 信学技報"}],"dc:publisher":[{"@value":"東京 : 電子情報通信学会"}],"prism:publicationDate":"1999-09-24","prism:volume":"99","prism:number":"329","prism:startingPage":"53","prism:endingPage":"60"},"url":[{"@id":"http://id.ndl.go.jp/bib/4874492"},{"@id":"https://ndlsearch.ndl.go.jp/books/R000000004-I4874492"}],"relatedProduct":[{"@id":"https://cir.nii.ac.jp/crid/1520009410270301440","@type":"Article","relationType":["isCitedBy"],"jpcoar:relatedTitle":[{"@value":"SHP-2暗号のソフトウェアによる実装とその考察"},{"@language":"ja-Kana","@value":"SHP 2 アンゴウ ノ ソフトウェア ニ ヨル ジッソウ ト ソノ コウサツ"}]},{"@id":"https://cir.nii.ac.jp/crid/1520009410307036672","@type":"Article","relationType":["isCitedBy"],"jpcoar:relatedTitle":[{"@value":"公開鍵暗号とその応用"},{"@language":"ja-Kana","@value":"コウカイ カギ アンゴウ ト ソノ オウヨウ"}]},{"@id":"https://cir.nii.ac.jp/crid/1520290885277964800","@type":"Article","relationType":["isCitedBy"],"jpcoar:relatedTitle":[{"@value":"笠原-村上暗号の安全性について"},{"@language":"ja-Kana","@value":"カサハラ ムラカミ アンゴウ ノ アンゼンセイ ニ ツイテ"}]},{"@id":"https://cir.nii.ac.jp/crid/1520290885281144448","@type":"Article","relationType":["isCitedBy"],"jpcoar:relatedTitle":[{"@value":"公開鍵暗号の一手法とその応用"},{"@language":"ja-Kana","@value":"コウカイ カギ アンゴウ ノ イチシュホウ ト ソノ オウヨウ"}]},{"@id":"https://cir.nii.ac.jp/crid/1520572357227901568","@type":"Article","relationType":["isCitedBy"],"jpcoar:relatedTitle":[{"@value":"ナップザック暗号に対するLagarias-Odlyzko法における格子の構成に関する検討"},{"@language":"ja-Kana","@value":"ナップザック アンゴウ ニ タイスル Lagarias Odlyzkoホウ ニ オケル コウシ ノ コウセイ ニ カンスル ケントウ"}]},{"@id":"https://cir.nii.ac.jp/crid/1520572360264033920","@type":"Article","relationType":["cites"],"jpcoar:relatedTitle":[{"@value":"公開鍵暗号の二,三の構成法"},{"@language":"ja-Kana","@value":"コウカイ カギ アンゴウ ノ 2 3 ノ コウセイホウ"}]},{"@id":"https://cir.nii.ac.jp/crid/1520853835200532096","@type":"Article","relationType":["isCitedBy","cites"],"jpcoar:relatedTitle":[{"@value":"積和型公開鍵暗号に関する二,三の考察"},{"@language":"ja-Kana","@value":"セキワガタ コウカイ カギ アンゴウ ニ カンスル ニ サン ノ コウサツ"}]},{"@id":"https://cir.nii.ac.jp/crid/1520853835202763008","@type":"Article","relationType":["isCitedBy"],"jpcoar:relatedTitle":[{"@value":"中国人の剰余定理を用いた積和型暗号に関する考察"},{"@language":"ja-Kana","@value":"チュウゴクジン ノ ジョウヨ テイリ オ モチイタ セキ ワガタ アンゴウ ニ カンスル コウサツ"}]},{"@id":"https://cir.nii.ac.jp/crid/1570009752432808832","@type":"Article","relationType":["cites"],"jpcoar:relatedTitle":[{"@language":"ja","@value":"公開鍵暗号の二, 三の方式"},{"@language":"en","@value":"New Public-key Cryptosystems"}]},{"@id":"https://cir.nii.ac.jp/crid/1572261550539462144","@type":"Article","relationType":["cites"],"jpcoar:relatedTitle":[{"@language":"en","@value":"Factoring polynomials with integer coeffcients"}]},{"@id":"https://cir.nii.ac.jp/crid/1572543025516174080","@type":"Article","relationType":["cites"],"jpcoar:relatedTitle":[{"@language":"en","@value":"The security of the improved knapsack cryptosystem"}]},{"@id":"https://cir.nii.ac.jp/crid/1573105975469592832","@type":"Article","relationType":["cites"],"jpcoar:relatedTitle":[{"@value":"積和型公開鍵暗号の二, 三の方式"}]}],"dataSourceIdentifier":[{"@type":"NDL_SEARCH","@value":"oai:ndlsearch.ndl.go.jp:R000000004-I4874492"},{"@type":"CIA","@value":"10022263390"},{"@type":"CIA","@value":"110003298747"}]}