{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T05:35:12Z","timestamp":1742967312619,"version":"3.40.3"},"publisher-location":"Cham","reference-count":20,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030750749"},{"type":"electronic","value":"9783030750756"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-75075-6_41","type":"book-chapter","created":{"date-parts":[[2021,4,26]],"date-time":"2021-04-26T07:06:40Z","timestamp":1619420800000},"page":"509-521","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Improvement of the Matrix for Simple Matrix Encryption Scheme"],"prefix":"10.1007","author":[{"given":"Wenchao","family":"Liu","sequence":"first","affiliation":[]},{"given":"Yingnan","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Xu An","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Zhong","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,4,27]]},"reference":[{"issue":"2","key":"41_CR1","doi-asserted-by":"publisher","first-page":"120","DOI":"10.1145\/359340.359342","volume":"21","author":"RL Rivest","year":"1978","unstructured":"Rivest, R.L., Shamir, A., Adleman, L.: A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM 21(2), 120\u2013126 (1978)","journal-title":"Commun. ACM"},{"issue":"5","key":"41_CR2","doi-asserted-by":"publisher","first-page":"1484","DOI":"10.1137\/S0097539795293172","volume":"26","author":"P Shor","year":"1994","unstructured":"Shor, P.: Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer. SIAM J. Comput. 26(5), 1484\u20131509 (1994)","journal-title":"SIAM J. Comput."},{"volume-title":"Post Quantum Cryptography","year":"2009","key":"41_CR3","unstructured":"Bernstein, D.J., Buchmann, J., Dahmen, E. (eds.): Post Quantum Cryptography. Springer, Heidelberg (2009)"},{"key":"41_CR4","doi-asserted-by":"crossref","unstructured":"Barreto, P.S., et al.: A panorama of post-quantum cryptography. In: Open Problems in Mathematics and Computational Science, pp. 387\u2013439. Springer International Publishing (2014)","DOI":"10.1007\/978-3-319-10683-0_16"},{"key":"41_CR5","doi-asserted-by":"crossref","unstructured":"Bogdanov, A., Eisenbarth, T., Rupp, A., Wolf, C.: Time-area optimized publickey engines: MQ-cryptosystems as replacement for elliptic curves? In: Oswald, E., Rohatgi, P. (eds.) CHES 2008, LNCS, vol. 5154, pp. 45\u201361. Springer, Heidelberg (2008)","DOI":"10.1007\/978-3-540-85053-3_4"},{"key":"41_CR6","doi-asserted-by":"crossref","unstructured":"Tao, C., Diene, A., Tang, S., Ding, J.: Simple Matrix Scheme for Encryption. In: Gaborit, P. (ed.) PQCrypto 2013, LNCS, vol. 7932, pp. 231\u2013242. Springer, Heidelberg (2013)","DOI":"10.1007\/978-3-642-38616-9_16"},{"key":"41_CR7","doi-asserted-by":"crossref","unstructured":"Ding, J., Petzoldt, A., Wang, L.C.: The cubic simple matrix encryption scheme. In: Post-Quantum Cryptography, pp. 76\u201387. Springer International Publishing (2014)","DOI":"10.1007\/978-3-319-11659-4_5"},{"key":"41_CR8","doi-asserted-by":"crossref","unstructured":"Kipnis, A., Shamir, A.: Cryptanalysis of the HFE public key cryptosystem. In: Advances in Cryptology \u2013 CRYPTO 1999, pp. 19\u201330. Springer, Heidelberg (1999)","DOI":"10.1007\/3-540-48405-1_2"},{"key":"41_CR9","doi-asserted-by":"crossref","unstructured":"Patarin, J.: Asymmetric cryptography with a hidden monomial. In: Advances in Cryptology-CRYPTO 1996, pp. 45\u201360. Springer, Heidelberg (1996)","DOI":"10.1007\/3-540-68697-5_4"},{"key":"41_CR10","volume-title":"Multivariate Public Key Cryptosystems","author":"J Ding","year":"2006","unstructured":"Ding, J., Gower, J.E., Schmidt, D.S.: Multivariate Public Key Cryptosystems. Springer, Heidelberg (2006)"},{"key":"41_CR11","unstructured":"Ding, D.: Analysis and Improvement of TTS Scheme in Multivariable Public Key Cryptosystem. Xidian University (2013)"},{"key":"41_CR12","doi-asserted-by":"crossref","unstructured":"Goubin, L., Courtois, N.: Cryptanalysis of the TTM cryptosystem. In: Okamoto, T. (ed.) ASIACRYPT 2000, LNCS, vol. 1976, pp. 44\u201357. Springer, Heidelberg (2000)","DOI":"10.1007\/3-540-44448-3_4"},{"key":"41_CR13","doi-asserted-by":"crossref","unstructured":"Coppersmith, D., Stern, J., Vaudenay, S.: Attacks on the birational permutation signature schemes. In: Stinson, D.R. (ed.) CRYPTO 1993, LNCS, vol. 773, pp. 435\u2013443. Springer, Heidelberg (1994)","DOI":"10.1007\/3-540-48329-2_37"},{"key":"41_CR14","doi-asserted-by":"crossref","unstructured":"Ding, J., Schmidt, D.: Rainbow, a new multivariable polynomial signature scheme. In: Applied Cryptography and Network Security, pp. 164\u2013175. Springer, Heidelberg (2005)","DOI":"10.1007\/11496137_12"},{"key":"41_CR15","doi-asserted-by":"crossref","unstructured":"Courtois, N.T., Klimov, A., Patarin, J., Shamir, A.: Efficient algorithms for solving overdefined systems of multivariate polynomial equations. In: Preneel, B. (ed.) EUROCRYPT 2000, LNCS, vol. 1807, pp. 392\u2013407. Springer, Heidelberg (2000)","DOI":"10.1007\/3-540-45539-6_27"},{"key":"41_CR16","doi-asserted-by":"crossref","unstructured":"Faugere, J.C.: A new efficient algorithm for computing Gr\u00f6bner bases without reduction to zero (F5). In: Proceedings of the 2002 International Symposium on Symbolic and Algebraic Computation, pp. 75\u201383. ACM (2002)","DOI":"10.1145\/780506.780516"},{"key":"41_CR17","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1016\/S0022-4049(99)00005-5","volume":"139","author":"JC Faugere","year":"1999","unstructured":"Faugere, J.C.: A new efficient algorithm for computing Gr\u00f6bner bases (F4). J. Pure Appl. Algebra 139, 61\u201388 (1999)","journal-title":"J. Pure Appl. Algebra"},{"key":"41_CR18","unstructured":"Ding, J., Buchmann, J., Mohamed, M.S.E., Mohamed, W.S.A.E., Weinmann, R.-P.: Mutant XL. Talk at the First International Conference on Symbolic Computation and Cryptography (SCC 2008), Beijing (2008)"},{"key":"41_CR19","doi-asserted-by":"crossref","unstructured":"Mohamed, M.S.E., Cabarcas, D., Ding, J., Buchmann, J., Bulygin, S.: MXL3: an efficient algorithm for computing Gr\u00f6bner bases of zero-dimensional ideals. In: Lee, D., Hong, S. (eds.) ICISC 2009, LNCS, vol. 5984, pp. 87\u2013100. Springer, Heidelberg (2010)","DOI":"10.1007\/978-3-642-14423-3_7"},{"issue":"03","key":"41_CR20","first-page":"71","volume":"44","author":"Y Han","year":"2016","unstructured":"Han, Y., Lan, J., Yang, X., Wang, J.: Multivariable encryption scheme combined with low rank error correction coding. J. Huazhong Univ. Sci. Technol. (Nat. Sci. Ed.) 44(03), 71\u201376 (2016)","journal-title":"J. Huazhong Univ. Sci. Technol. (Nat. Sci. Ed.)"}],"container-title":["Lecture Notes in Networks and Systems","Advanced Information Networking and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-75075-6_41","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,26]],"date-time":"2021-04-26T07:35:32Z","timestamp":1619422532000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-75075-6_41"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9783030750749","9783030750756"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-75075-6_41","relation":{},"ISSN":["2367-3370","2367-3389"],"issn-type":[{"type":"print","value":"2367-3370"},{"type":"electronic","value":"2367-3389"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"27 April 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"AINA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Advanced Information Networking and Applications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Toronto, ON","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Canada","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12 May 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14 May 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"35","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"aina2021","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/voyager.ce.fit.ac.jp\/conf\/aina\/2021\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}