{"doi":"10.1007/s10623-018-0461-x","language":[{"iso":"eng"}],"publication_identifier":{"issn":["0925-1022","1573-7586"]},"_id":"9606","citation":{"ieee":"J. Liu, T. Jager, S. Kakvi, and B. Warinschi, “How to build time-lock encryption,” Designs, Codes and Cryptography, pp. 2549–2586, 2018.","mla":"Liu, Jia, et al. “How to Build Time-Lock Encryption.” Designs, Codes and Cryptography, 2018, pp. 2549–86, doi:10.1007/s10623-018-0461-x.","apa":"Liu, J., Jager, T., Kakvi, S., & Warinschi, B. (2018). How to build time-lock encryption. Designs, Codes and Cryptography, 2549–2586. https://doi.org/10.1007/s10623-018-0461-x","bibtex":"@article{Liu_Jager_Kakvi_Warinschi_2018, title={How to build time-lock encryption}, DOI={10.1007/s10623-018-0461-x}, journal={Designs, Codes and Cryptography}, author={Liu, Jia and Jager, Tibor and Kakvi, Saqib and Warinschi, Bogdan}, year={2018}, pages={2549–2586} }","short":"J. Liu, T. Jager, S. Kakvi, B. Warinschi, Designs, Codes and Cryptography (2018) 2549–2586.","chicago":"Liu, Jia, Tibor Jager, Saqib Kakvi, and Bogdan Warinschi. “How to Build Time-Lock Encryption.” Designs, Codes and Cryptography, 2018, 2549–86. https://doi.org/10.1007/s10623-018-0461-x.","ama":"Liu J, Jager T, Kakvi S, Warinschi B. How to build time-lock encryption. Designs, Codes and Cryptography. 2018:2549-2586. doi:10.1007/s10623-018-0461-x"},"author":[{"first_name":"Jia","full_name":"Liu, Jia","last_name":"Liu"},{"first_name":"Tibor","last_name":"Jager","full_name":"Jager, Tibor","id":"64669"},{"id":"66268","full_name":"Kakvi, Saqib","last_name":"Kakvi","first_name":"Saqib"},{"last_name":"Warinschi","full_name":"Warinschi, Bogdan","first_name":"Bogdan"}],"year":"2018","department":[{"_id":"558"}],"title":"How to build time-lock encryption","publication":"Designs, Codes and Cryptography","date_updated":"2022-01-06T07:04:16Z","date_created":"2019-05-03T12:42:01Z","status":"public","page":"2549-2586","user_id":"66268","type":"journal_article","publication_status":"published"}