{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T17:29:10Z","timestamp":1725470950828},"publisher-location":"Berlin, Heidelberg","reference-count":16,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540383413"},{"type":"electronic","value":"9783540383437"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1007\/11836810_12","type":"book-chapter","created":{"date-parts":[[2006,10,3]],"date-time":"2006-10-03T10:36:57Z","timestamp":1159871817000},"page":"161-170","source":"Crossref","is-referenced-by-count":2,"title":["Cryptanalysis of Variants of UOV"],"prefix":"10.1007","author":[{"given":"Yuh-Hua","family":"Hu","sequence":"first","affiliation":[]},{"given":"Chun-Yen","family":"Chou","sequence":"additional","affiliation":[]},{"given":"Lih-Chung","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Feipei","family":"Lai","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"12_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"338","DOI":"10.1007\/978-3-540-30539-2_24","volume-title":"Advances in Cryptology - ASIACRYPT 2004","author":"G. Ars","year":"2004","unstructured":"Ars, G., Faug\u00e8re, J.-C., Imai, H., Kawazoe, M., Sugita, M.: Comparison Between XL and Gr\u00f6bner Basis Algorithms. In: Lee, P.J. (ed.) ASIACRYPT 2004. LNCS, vol.\u00a03329, pp. 338\u2013353. Springer, Heidelberg (2004)"},{"key":"12_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1007\/978-3-540-30574-3_4","volume-title":"Topics in Cryptology \u2013 CT-RSA 2005","author":"A. Braeken","year":"2005","unstructured":"Braeken, A., Wolf, C., Preneel, B.: A Study of the Security of Unbalanced Oil and Vinegar Signature Schemes. In: Menezes, A. (ed.) CT-RSA 2005. LNCS, vol.\u00a03376, pp. 29\u201343. Springer, Heidelberg (2005), extended version: \n                    \n                      http:\/\/eprint.iacr.org\/2004\/222\/"},{"key":"12_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"337","DOI":"10.1007\/3-540-36288-6_25","volume-title":"Public Key Cryptography - PKC 2003","author":"N. Courtois","year":"2002","unstructured":"Courtois, N., Daum, M., Felke, P.: On the security of HFE, hFEv- and quartz. In: Desmedt, Y.G. (ed.) PKC 2003. LNCS, vol.\u00a02567, pp. 337\u2013350. Springer, Heidelberg (2002)"},{"key":"12_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"392","DOI":"10.1007\/3-540-45539-6_27","volume-title":"Advances in Cryptology - EUROCRYPT 2000","author":"N.T. Courtois","year":"2000","unstructured":"Courtois, N.T., Klimov, A.B., Patarin, J., Shamir, A.: Efficient Algorithms for Solving Overdefined Systems of Multivariate Polynomial Equations. In: Preneel, B. (ed.) EUROCRYPT 2000. LNCS, vol.\u00a01807, pp. 392\u2013407. Springer, Heidelberg (2000)"},{"key":"12_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"164","DOI":"10.1007\/11496137_12","volume-title":"Applied Cryptography and Network Security","author":"J. Ding","year":"2005","unstructured":"Ding, J., Schmidt, D.: Rainbow, a New Multivariable Polynomial Signature Scheme. In: Ioannidis, J., Keromytis, A.D., Yung, M. (eds.) ACNS 2005. LNCS, vol.\u00a03531, pp. 164\u2013175. Springer, Heidelberg (2005)"},{"key":"12_CR6","first-page":"251","volume-title":"Computers and Intractability, A Guide to the Theory of NP-completeness","author":"M.R. Garay","year":"1979","unstructured":"Garay, M.R., Johnson, D.S.: Computers and Intractability, A Guide to the Theory of NP-completeness, p. 251. W.H. Freeman and Company, New York (1979)"},{"key":"12_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"211","DOI":"10.1007\/11599371_18","volume-title":"Cryptology and Network Security","author":"H. Yuh-Hua","year":"2005","unstructured":"Yuh-Hua, H., Lih-Chung, W., Chun-Yen, C., Feipei, L.: Similar Keys of Multivariate Quadratic Public Key Cryptosystems. In: Desmedt, Y.G., Wang, H., Mu, Y., Li, Y. (eds.) CANS 2005. LNCS, vol.\u00a03810, pp. 211\u2013222. Springer, Heidelberg (2005)"},{"key":"12_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"257","DOI":"10.1007\/BFb0055733","volume-title":"Advances in Cryptology - CRYPTO \u201998","author":"A. Kipnis","year":"1998","unstructured":"Kipnis, A., Shamir, A.: Cryptanalysis of the Oil & Vinegar Signature Scheme. In: Krawczyk, H. (ed.) CRYPTO 1998. LNCS, vol.\u00a01462, pp. 257\u2013267. Springer, Heidelberg (1998)"},{"key":"12_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"206","DOI":"10.1007\/3-540-48910-X_15","volume-title":"Advances in Cryptology - EUROCRYPT \u201999","author":"A. Kipnis","year":"1999","unstructured":"Kipnis, A., Patarin, J., Goubin, L.: Unbalanced Oil and Vinegar Signature Schemes. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol.\u00a01592, pp. 206\u2013222. Springer, Heidelberg (1999)"},{"key":"12_CR10","unstructured":"Patarin, J.: The Oil and Vinegar Algorithm for Signatures. In: Dagstuhl Workshop on Cryptography (September 1997)"},{"key":"12_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"294","DOI":"10.1007\/978-3-540-30598-9_21","volume-title":"Security in Communication Networks","author":"C. Wolf","year":"2005","unstructured":"Wolf, C., Braeken, A., Preneel, B.: Efficient Cryptanalysis of RSE(2)PKC and RSSE(2)PKC. In: Blundo, C., Cimato, S. (eds.) SCN 2004. LNCS, vol.\u00a03352, pp. 294\u2013309. Springer, Heidelberg (2005), \n                    \n                      http:\/\/eprint.iacr.org\/2004\/237\/"},{"key":"12_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"275","DOI":"10.1007\/978-3-540-30580-4_19","volume-title":"Public Key Cryptography - PKC 2005","author":"C. Wolf","year":"2005","unstructured":"Wolf, C., Preneel, B.: Large Superfluous Keys in \n                    \n                      \n                    \n                    $\\mathcal{M}$\n                  ultivariate \n                    \n                      \n                    \n                    $\\mathcal{Q}$\n                  uadratic Asymmetric Systems. In: Vaudenay, S. (ed.) PKC 2005. LNCS, vol.\u00a03386, pp. 275\u2013287. Springer, Heidelberg (2005),(extended version): \n                    \n                      http:\/\/eprint.iacr.org\/2004\/361\/"},{"key":"12_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"244","DOI":"10.1007\/978-3-540-30580-4_17","volume-title":"Public Key Cryptography - PKC 2005","author":"W. Lih-Chung","year":"2005","unstructured":"Lih-Chung, W., Yuh-Hua, H., Feipei, L., Chun-Yen, C., Bo-Yin, Y.: Tractable Rational Map Signature. In: Vaudenay, S. (ed.) PKC 2005. LNCS, vol.\u00a03386, pp. 244\u2013257. Springer, Heidelberg (2005)"},{"key":"12_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"132","DOI":"10.1007\/11605805_9","volume-title":"Topics in Cryptology \u2013 CT-RSA 2006","author":"W. Lih-Chung","year":"2006","unstructured":"Lih-Chung, W., Bo-Yin, Y., Yuh-Hua, H., Feipei, L.: A \u201cMedium-Field\u201d Multivariate Public-Key Encryption Scheme. In: Pointcheval, D. (ed.) CT-RSA 2006. LNCS, vol.\u00a03860, pp. 132\u2013149. Springer, Heidelberg (2006)"},{"key":"12_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"67","DOI":"10.1007\/11496618_7","volume-title":"Information Security and Cryptology \u2013 ICISC 2004","author":"Y. Bo-Yin","year":"2005","unstructured":"Bo-Yin, Y., Jiun-Ming, C.: All in the XL family: Theory and practice. In: Park, C.-s., Chee, S. (eds.) ICISC 2004. LNCS, vol.\u00a03506, pp. 67\u201386. Springer, Heidelberg (2005)"},{"key":"12_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"518","DOI":"10.1007\/11506157_43","volume-title":"Information Security and Privacy","author":"Y. Bo-Yin","year":"2005","unstructured":"Bo-Yin, Y., Jiun-Ming, C.: Building Secure Tame-like Multivariate Public-Key Cryptosystems: The New TTS. In: Boyd, C., Gonz\u00e1lez Nieto, J.M. (eds.) ACISP 2005. LNCS, vol.\u00a03574, pp. 518\u2013531. Springer, Heidelberg (2005)"}],"container-title":["Lecture Notes in Computer Science","Information Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11836810_12.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T07:14:41Z","timestamp":1619507681000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11836810_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"ISBN":["9783540383413","9783540383437"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/11836810_12","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2006]]}}}