{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,10]],"date-time":"2025-11-10T13:30:26Z","timestamp":1762781426645},"publisher-location":"Berlin, Heidelberg","reference-count":13,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540663478"},{"type":"electronic","value":"9783540484059"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1999]]},"DOI":"10.1007\/3-540-48405-1_20","type":"book-chapter","created":{"date-parts":[[2007,5,1]],"date-time":"2007-05-01T06:24:36Z","timestamp":1178000676000},"page":"315-325","source":"Crossref","is-referenced-by-count":16,"title":["Cryptanalysis of \u201c2R\u201d Schemes"],"prefix":"10.1007","author":[{"given":"Ye","family":"Ding-Feng","sequence":"first","affiliation":[]},{"given":"Lam","family":"Kwok-Yan","sequence":"additional","affiliation":[]},{"given":"Dai","family":"Zong-Duo","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[1999,12,16]]},"reference":[{"key":"20_CR1","series-title":"TR89-1023","volume-title":"The Functional Decomposition of Polynomials","author":"M. Dickerson","year":"1989","unstructured":"M. Dickerson, The Functional Decomposition of Polynomials, Ph.D Thesis, TR89-1023, Dept. of Computer Science, Cornell University, Ithaca, NY, July 1989."},{"issue":"6","key":"20_CR2","doi-asserted-by":"publisher","first-page":"644","DOI":"10.1109\/TIT.1976.1055638","volume":"IT-22","author":"W. Diffe","year":"1976","unstructured":"W. Diffe and M. E. Hellman, New directions in cryptography, IEEE Trans. Inform. Theory, IT-22(6) 644\u2013654, 1976.","journal-title":"IEEE Trans. Inform. Theory"},{"key":"20_CR3","doi-asserted-by":"publisher","first-page":"469","DOI":"10.1109\/TIT.1985.1057074","volume":"IT-31","author":"T. Elgamal","year":"1985","unstructured":"T. Elgamal, A Public Key Cryptosystem and a Signature Schemes Based on Discrete Logarithms, IEEE Trans. Inform. Theory, Vol. IT-31(1985), 469\u2013472.","journal-title":"IEEE Trans. Inform. Theory"},{"key":"20_CR4","unstructured":"T. Matsumoto and H. Imai, Algebraic Methods for Constructing Asymmetric Cryptosystems, AAECC-3, Grenoble, 1985."},{"key":"20_CR5","doi-asserted-by":"crossref","unstructured":"T. Matsumoto and H. Imai, Public Quadratic Polynomial-Tuples for Efficient Signature-Verification and Message-Encryption, Advances in Cryptology, Proceedings of EUROCRYPT\u2019 88, Springer Verlag, pp 419\u2013453","DOI":"10.1007\/3-540-45961-8_39"},{"key":"20_CR6","unstructured":"W.B. Muller, Polynomial Functions in Modern Cryptology, Contributions to General Algebra 3: Proceedings of the Vienna Conference, Vienna: Verlag Holder-Picher-Tempsky, 1985, pp. 7\u201332."},{"key":"20_CR7","doi-asserted-by":"crossref","unstructured":"J. Patarin, Cryptanalysis of the Matsumoto and Imai Public Key Scheme of Eurocrypto\u2019 88, Advances in Cryptology, Proceedings of CRYPTO\u2019 95, Springer Verlag, pp 248\u2013261","DOI":"10.1007\/3-540-44750-4_20"},{"key":"20_CR8","doi-asserted-by":"crossref","unstructured":"J. Patarin, Asymmetric Cryptography with a Hidden Monomial, Advances in Cryptology, Proceedings of CRYPTO\u2019 96, Springer Verlag, pp 45\u201360","DOI":"10.1007\/3-540-68697-5_4"},{"key":"20_CR9","doi-asserted-by":"crossref","unstructured":"J. Patarin, Hidden Fields Equations and Isomorphisms of Polynomials: Two New Families of Asymmetric Algorithms, Advances in Cryptology, Proceedings of EUROCRYPT\u2019 96, Springer Verlag, pp 33\u201348","DOI":"10.1007\/3-540-68339-9_4"},{"key":"20_CR10","series-title":"Lect Notes Comput Sci","volume-title":"Proceedings of ICICS\u2019 97","author":"J. Patarin","year":"1997","unstructured":"J. Patarin and L. Goubin, Trapdoor one-way permutations and multivariate polynomials, Proceedings of ICICS\u2019 97, Lecture Notes in Computer Science, Vol. 1334, Springer, 1997."},{"key":"20_CR11","series-title":"Lect Notes Comput Sci","volume-title":"Proceedings of ICICS\u2019 97","author":"J. Patarin","year":"1997","unstructured":"J. Patarin and L. Goubin, Asymmetric cryptography with S-boxes, Proceedings of ICICS\u2019 97, Lecture Notes in Computer Science, Vol. 1334, Springer, 1997."},{"key":"20_CR12","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1007\/3-540-49649-1_4","volume-title":"Advances in Cryptology","author":"J. Patarin","year":"1998","unstructured":"J. Patarin and L. Goubin, C \u2212 * + and HM: Variations Around Two Schemes of T.Matsumoto and H. Imai, Advances in Cryptology, Proceedings of ASI-ACRYPT\u2019 98, Lecture Notes in Computer Science 1514, Springer Verlag, pp 35\u201349."},{"issue":"n.2","key":"20_CR13","doi-asserted-by":"publisher","first-page":"120","DOI":"10.1145\/359340.359342","volume":"21","author":"R.L. Rivest","year":"1978","unstructured":"R.L. Rivest, A. Shamir, L.M. Adleman, A Method for Obtaining Digital Signatures and Public-Key Cryptosystems, Communications of ACM, v.21, n.2, 1978, pp.120\u2013126.","journal-title":"Communications of ACM"}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2014 CRYPTO\u2019 99"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-48405-1_20","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,4,27]],"date-time":"2019-04-27T12:35:47Z","timestamp":1556368547000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-48405-1_20"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1999]]},"ISBN":["9783540663478","9783540484059"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/3-540-48405-1_20","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[1999]]}}}