{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T07:06:26Z","timestamp":1742972786822,"version":"3.40.3"},"publisher-location":"Cham","reference-count":35,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031844591"},{"type":"electronic","value":"9783031844607"}],"license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-3-031-84460-7_44","type":"book-chapter","created":{"date-parts":[[2025,3,6]],"date-time":"2025-03-06T04:03:15Z","timestamp":1741233795000},"page":"688-699","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["On the Postquantum Protocol-Based Short Digital Signatures with Multivariate Maps Over Arithmetical Rings"],"prefix":"10.1007","author":[{"given":"Vasyl","family":"Ustimenko","sequence":"first","affiliation":[]},{"given":"Oleksandr","family":"Pustovit","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,3,7]]},"reference":[{"key":"44_CR1","doi-asserted-by":"crossref","unstructured":"Beullens,W.: Improved cryptanalysis of UOV and rainbow. In: Eurocryp, pp. 348-373, Part 1 (2021)","DOI":"10.1007\/978-3-030-77870-5_13"},{"key":"44_CR2","unstructured":"Canteaut A., Standaert, F.-X., (eds.) Eurocrypt 2021, LNCS 12696, 40th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, October 17\u201321, 2021, Proceedings, Part I, p. 839, Springer (2021)"},{"key":"44_CR3","doi-asserted-by":"crossref","unstructured":"Myasnikov, A., Shpilrain, V., Ushakov, A.: Noncommutative cryptography and complexity of group-theoretic problems, American mathematical society. In: Noether, M., Cremona, L., (eds.) Mathematische Annalen, vol. 59, no. 1904, pp. 1\u201319 (2011)","DOI":"10.1090\/surv\/177"},{"key":"44_CR4","doi-asserted-by":"crossref","unstructured":"Ding, J., Deaton, J., Vishakha, Yang, B.Y.: The nested subset differential attack, a practical direct attack against LUOV which forges a signature within 210 minutes. In: Eurocryp, Part 1, pp. 329\u2013347 (2021)","DOI":"10.1007\/978-3-030-77870-5_12"},{"key":"44_CR5","unstructured":"Ustimenko, V.: On extremal algebraic graphs and multivariate cryptosystems. IACR e-print archive, 2022\/1537"},{"issue":"4","key":"44_CR6","doi-asserted-by":"publisher","first-page":"28","DOI":"10.1109\/MSP.2017.3151328","volume":"15","author":"J Ding","year":"2017","unstructured":"Ding, J., Petzoldt, A.: Current state of multivariate cryptography. IEEE Secur. Priv. 15(4), 28\u201336 (2017). https:\/\/doi.org\/10.1109\/MSP.2017.3151328","journal-title":"IEEE Secur. Priv."},{"key":"44_CR7","doi-asserted-by":"crossref","unstructured":"Smith-Tone, D.: 2F - a new method for constructing efficient multivariate encryption schemes. In: Proceedings of PQCrypto 2022: The Thirteenth International Conference on Post-Quantum Cryptography, Virtual, DC, US (2022)","DOI":"10.1007\/978-3-031-17234-2_10"},{"key":"44_CR8","doi-asserted-by":"crossref","unstructured":"Smith-Tone, D.: New practical multivariate signatures from a nonlinear modifier. IACR e-print archive, 2021\/419","DOI":"10.1007\/978-3-030-81293-5_5"},{"key":"44_CR9","unstructured":"Smith-Tone, D., Tone, C.: A nonlinear multivariate cryptosystem based on a random linear code. https:\/\/eprint.iacr.org\/2019\/1355.pdf"},{"key":"44_CR10","doi-asserted-by":"publisher","unstructured":"Dey, J., Dutta, R.: Progress in multivariate cryptography: systematic review, challenges, and research directions. ACM Comput. Surv. 55(12), 1\u201334. https:\/\/doi.org\/10.1145\/3571071, no. 246","DOI":"10.1145\/3571071"},{"key":"44_CR11","doi-asserted-by":"publisher","unstructured":"Ikematsu, Y., Perlner, R., Smith-Tone, D., Takagi, T., Vates, J.: HFERP -- a new multivariate encryption scheme. In: PQCrypto 2018: The Ninth International Conference on Post-Quantum Cryptography, Fort Lauderdale, FL, US (2018). https:\/\/doi.org\/10.1007\/978-3-319-79063-3_19, https:\/\/tsapps.nist.gov\/publication\/get_pdf.cfm?pub_id=925152","DOI":"10.1007\/978-3-319-79063-3_19"},{"key":"44_CR12","doi-asserted-by":"crossref","unstructured":"Cabarcas, F., Cabarcas, D., Baena, J.: Efficient public-key operation in multivariate schemes. Adv. Math. Commun. 13(2), 343 (2019)","DOI":"10.3934\/amc.2019023"},{"key":"44_CR13","doi-asserted-by":"crossref","unstructured":"Cartor, R., Smith-Tone, D.: EFLASH: a new multivariate encryption scheme. In Proceedings of the International Conference on Selected Areas in Cryptography, pp. 281\u2013299. Springer (2018)","DOI":"10.1007\/978-3-030-10970-7_13"},{"key":"44_CR14","unstructured":"Casanova, A., Jean-Charles, F., Gilles, M.-R., Patarin, J., Perret, L., Ryckeghem, J.: Gemss: A great multivariate short signature. In: Submission to NIST, pp. 209\u2013229. Springer, Singapore (2017)"},{"key":"44_CR15","doi-asserted-by":"crossref","unstructured":"Chen, J., Ning, J., Ling, J., Lau, T.S.C., Wang, Y.: A new encryption scheme for multivariate quadratic systems. Theor. Comput. Sci. 809(2020), 372\u2013383 (2020)","DOI":"10.1016\/j.tcs.2019.12.032"},{"key":"44_CR16","doi-asserted-by":"crossref","unstructured":"Chen, M.-S., H\u00fclsing, A., Rijneveld, J., Samardjiska, S., Schwabe, P.: SOFIA: MQ-based signatures in the QROM. In: Proceedings of the IACR Inter-national Workshop on Public Key Cryptography, pp. 3\u201333. Springer (2018)","DOI":"10.1007\/978-3-319-76581-5_1"},{"key":"44_CR17","doi-asserted-by":"crossref","unstructured":"Ding, J., Perlner, R., Petzoldt, A., Smith-Tone, D.: Improved cryptanalysis of hfev-via projection. In: Proceedings of the International Conference on Post-Quantum Cryptography, pp. 375\u2013395. Springer (2018)","DOI":"10.1007\/978-3-319-79063-3_18"},{"key":"44_CR18","doi-asserted-by":"crossref","unstructured":"Ding, J., Petzoldt, A., Schmidt, D.S.: Multivariate Public Key Cryptosystems, Second Edition. Advances in Information Security. Springer (2020)","DOI":"10.1007\/978-1-0716-0987-3"},{"key":"44_CR19","unstructured":"Ding, J., Zhang, Z., Deaton, J., Schmidt, K., Vishakha, F.: New at-tacks on lifted unbalanced oil vinegar. In: Proceedings of the 2nd NIST PQC Standardization Conference (2019)"},{"key":"44_CR20","doi-asserted-by":"crossref","unstructured":"Ding, J., Zhang, Z., Deaton, J., Wang, L.-C.: A complete cryptanalysis of the post-quantum multivariate signature scheme Himq-3. In: Proceedings of the International Conference on Information and Communications Security (2020)","DOI":"10.1007\/978-3-030-61078-4_24"},{"key":"44_CR21","doi-asserted-by":"crossref","unstructured":"Dung, H.D., Ha, T.N.T., Susilo, W., Van Luyen, L.: An efficient multi-variate threshold ring signature scheme. Comput. Stand. Interfaces 74 (2021)","DOI":"10.1016\/j.csi.2020.103489"},{"key":"44_CR22","unstructured":"Faug\u00e8re, J.C., Patarin, J., Perret, L.: A new perturbation for multivariate public key schemes such as HFE and UOV. Cryptology ePrint Archive (2022)"},{"key":"44_CR23","doi-asserted-by":"crossref","unstructured":"Ustimenko, V., Chojecki, T., Klisowski, M.: On the implementations of new graph based cubic multivariate public keys. In: Proceedings of the 18th Conference on Computer Science and Intelligence Systems, ACSIS, vol. 35, pp. 1179\u20131184","DOI":"10.15439\/2023F7763"},{"key":"44_CR24","doi-asserted-by":"crossref","unstructured":"Ustymenko, V., Wr\u00f3blewska, A.: Extremal algebraic graphs, quadratic multivariate public keys and temporal rules. In: FedCSI, pp. 1173\u20131178 (2023)","DOI":"10.15439\/2023F1191"},{"key":"44_CR25","unstructured":"Ustimenko, V.: On new multivariate cryptosystems based on hidden Eulerian equations over finite fields. IACR e-print archive.2017\/093(PDF)"},{"key":"44_CR26","unstructured":"Ustimenko, V.A.: On new multivariate cryptosystems based on hidden Eulerian equations. Dopovidi of National Academy of Science of Ukraine N5 (2017)"},{"key":"44_CR27","doi-asserted-by":"publisher","first-page":"93","DOI":"10.1007\/s40879-023-00685-2","volume":"9","author":"V Ustimenko","year":"2023","unstructured":"Ustimenko, V.: On Eulerian semigroups of multivariate transformations and their cryptographic applications. Eur. J. Math. 9, 93 (2023)","journal-title":"Eur. J. Math."},{"key":"44_CR28","doi-asserted-by":"crossref","unstructured":"Myasnikov, A., Roman\u2019kov, V.: A linear decomposition attack. Groups, Complex., Cryptol. 7, 81\u201394 (2015)","DOI":"10.1515\/gcc-2015-0007"},{"key":"44_CR29","doi-asserted-by":"crossref","unstructured":"Roman\u2019kov, V.A.: A nonlinear decomposition attack. Groups, Complex., Cryptol. 8(2), 197\u2013207 (2017)","DOI":"10.1515\/gcc-2016-0017"},{"key":"44_CR30","doi-asserted-by":"crossref","unstructured":"Roman\u2019kov, V.: Two general schemes of algebraic cryptography. Groups, Complex., Cryptol. 10(2), 83\u201398 (2018)","DOI":"10.1515\/gcc-2018-0009"},{"key":"44_CR31","doi-asserted-by":"crossref","unstructured":"Roman\u2019kov, V.: An improved version of the AAG cryptographic protocol. Groups, Complexity, Cryptology. 11(1), 12 (2019)","DOI":"10.1515\/gcc-2019-2003"},{"issue":"3","key":"44_CR32","doi-asserted-by":"publisher","first-page":"601","DOI":"10.1007\/s00145-013-9170-9","volume":"28","author":"B Tsaban","year":"2015","unstructured":"Tsaban, B.: Polynomial time solutions of computational problems in noncommutative algebraic cryptography. J. Cryptol. 28(3), 601\u2013622 (2015)","journal-title":"J. Cryptol."},{"key":"44_CR33","doi-asserted-by":"crossref","unstructured":"Ben-Zvi, A., Kalka, A., Tsaban, B.: Cryptanalysis via algebraic spans. In: Shachan, H., Boldyreva, A. (eds.) Advances in Cryptology \u2013 CRYPTO 2018, p. 1\u201320. Springer, Berlin. (LNCS; vol. 109991) (2018)","DOI":"10.1007\/978-3-319-96884-1_9"},{"key":"44_CR34","unstructured":"Ustimenko, V.: On historical multivariate cryptosystems and their restorations as instruments of post-quantum cryptography. IACR e-print Archive 2024\/091"},{"key":"44_CR35","unstructured":"Ustimenko, V.: On short digital signatures with Eulerian transformations. IACR e-print Archive 2024\/001"}],"container-title":["Lecture Notes in Networks and Systems","Advances in Information and Communication"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-84460-7_44","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,6]],"date-time":"2025-03-06T04:03:34Z","timestamp":1741233814000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-84460-7_44"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"ISBN":["9783031844591","9783031844607"],"references-count":35,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-84460-7_44","relation":{},"ISSN":["2367-3370","2367-3389"],"issn-type":[{"type":"print","value":"2367-3370"},{"type":"electronic","value":"2367-3389"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"7 March 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"FICC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Future of Information and Communication Conference","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Berlin","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Germany","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"27 April 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"28 April 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ficc2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/saiconference.com\/FICC","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}