{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T10:08:14Z","timestamp":1742983694565,"version":"3.40.3"},"publisher-location":"Cham","reference-count":19,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319159423"},{"type":"electronic","value":"9783319159430"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-15943-0_4","type":"book-chapter","created":{"date-parts":[[2015,3,16]],"date-time":"2015-03-16T10:27:17Z","timestamp":1426501637000},"page":"53-66","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Algebraic Cryptanalysis of Yasuda, Takagi and Sakurai\u2019s Signature Scheme"],"prefix":"10.1007","author":[{"given":"Wenbin","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Chik How","family":"Tan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,3,17]]},"reference":[{"key":"4_CR1","doi-asserted-by":"publisher","first-page":"1853","DOI":"10.1002\/j.1538-7305.1967.tb03174.x","volume":"46","author":"ER Berlekamp","year":"1967","unstructured":"Berlekamp, E.R.: Factoring polynomials over finite fields. Bell Syst. Tech. J. 46, 1853\u20131859 (1967)","journal-title":"Bell Syst. Tech. J."},{"key":"4_CR2","doi-asserted-by":"publisher","first-page":"713","DOI":"10.1090\/S0025-5718-1970-0276200-X","volume":"24","author":"ER Berlekamp","year":"1970","unstructured":"Berlekamp, E.R.: Factoring polynomials over large finite fields. Math. Comput. 24, 713\u2013735 (1970)","journal-title":"Math. Comput."},{"key":"4_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"168","DOI":"10.1007\/978-3-642-21031-0_13","volume-title":"Information Security Practice and Experience","author":"W Cao","year":"2011","unstructured":"Cao, W., Hu, L., Ding, J., Yin, Z.: Kipnis-Shamir attack on unbalanced oil-vinegar scheme. In: Bao, F., Weng, J. (eds.) ISPEC 2011. LNCS, vol. 6672, pp. 168\u2013180. Springer, Heidelberg (2011)"},{"key":"4_CR4","unstructured":"Clark, P.L.: Linear algebra: Invariant subspaces. http:\/\/math.uga.edu\/~pete\/invariant_subspaces.pdf"},{"key":"4_CR5","series-title":"Advances in Information Security","volume-title":"Multivariate Public Key Cryptosystems","author":"J Ding","year":"2006","unstructured":"Ding, J., Gower, J.E., Schmidt, D.S.: Multivariate Public Key Cryptosystems. Advances in Information Security, vol. 25. Springer, Heidelberg (2006)"},{"key":"4_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"164","DOI":"10.1007\/11496137_12","volume-title":"Applied Cryptography and Network Security","author":"J Ding","year":"2005","unstructured":"Ding, J., Schmidt, D.: Rainbow, a new multivariable polynomial signature scheme. In: Ioannidis, J., Keromytis, A.D., Yung, M. (eds.) ACNS 2005. LNCS, vol. 3531, pp. 164\u2013175. Springer, Heidelberg (2005)"},{"key":"4_CR7","doi-asserted-by":"publisher","first-page":"193","DOI":"10.1007\/978-3-540-88702-7_6","volume-title":"Post-Quantum Cryptography","author":"J Ding","year":"2009","unstructured":"Ding, J., Yang, B.-Y.: Multivariate public key cryptography. In: Bernstein, D.J., Buchmann, J., Dahmen, E. (eds.) Post-Quantum Cryptography, pp. 193\u2013241. Springer, Heidelberg (2009)"},{"key":"4_CR8","unstructured":"Geiselmann, W., Steinwandt, R.: A short comment on the affine parts of SFLASH$$^{v3}$$. Cryptology ePrint Archive, Report 2003\/220 (2003). http:\/\/eprint.iacr.org\/"},{"key":"4_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"355","DOI":"10.1007\/3-540-45325-3_31","volume-title":"Cryptography and Coding","author":"W Geiselmann","year":"2001","unstructured":"Geiselmann, W., Steinwandt, R., Beth, T.: Attacking the affine parts of SFLASH. In: Honary, B. (ed.) Cryptography and Coding 2001. LNCS, vol. 2260, pp. 355\u2013359. Springer, Heidelberg (2001)"},{"key":"4_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"108","DOI":"10.1007\/978-3-319-11659-4_7","volume-title":"Post-Quantum Cryptography","author":"Y Hashimoto","year":"2014","unstructured":"Hashimoto, Y.: Cryptanalysis of the multivariate signature scheme proposed in PQCrypto 2013. In: Mosca, M. (ed.) PQCrypto 2014. LNCS, vol. 8772, pp. 108\u2013125. Springer, Heidelberg (2014)"},{"key":"4_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"206","DOI":"10.1007\/3-540-48910-X_15","volume-title":"Advances in Cryptology - EUROCRYPT \u201999","author":"A Kipnis","year":"1999","unstructured":"Kipnis, A., Patarin, J., Goubin, L.: Unbalanced oil and vinegar signature schemes. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol. 1592, pp. 206\u2013222. Springer, Heidelberg (1999)"},{"key":"4_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"257","DOI":"10.1007\/BFb0055733","volume-title":"Advances in Cryptology \u2013 CRYPTO \u201998","author":"A Kipnis","year":"1998","unstructured":"Kipnis, A., Shamir, A.: Cryptanalysis of the oil and vinegar signature scheme. In: Krawczyk, H. (ed.) CRYPTO 1998. LNCS, vol. 1462, pp. 257\u2013267. Springer, Heidelberg (1998)"},{"issue":"6","key":"4_CR13","doi-asserted-by":"publisher","first-page":"1767","DOI":"10.1137\/08073408X","volume":"40","author":"KS Kedlay","year":"2011","unstructured":"Kedlay, K.S., Umans, C.: Fast polynomial factorization and modular composition. SIAM J. Comput. 40(6), 1767\u20131802 (2011)","journal-title":"SIAM J. Comput."},{"key":"4_CR14","unstructured":"Patarin, J.: The oil and vinegar signature scheme. Presented at the Dagstuhl Workshop on Cryptography, September 1997"},{"key":"4_CR15","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-69971-9","volume-title":"Quadratic and Hermitian Forms","author":"W Scharlau","year":"1985","unstructured":"Scharlau, W.: Quadratic and Hermitian Forms. Springer, Heidelberg (1985)"},{"key":"4_CR16","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1006\/jsco.1999.1002","volume":"31","author":"J von zur Gathen","year":"2001","unstructured":"von zur Gathen, J., Panario, D.: Factoring polynomials over finite fields: a survey. J. Symbol. Comput. 31, 3\u201317 (2001)","journal-title":"J. Symbol. Comput."},{"key":"4_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1007\/11554868_4","volume-title":"Progress in Cryptology \u2013 Mycrypt 2005","author":"C Wolf","year":"2005","unstructured":"Wolf, C., Preneel, B.: Equivalent keys in HFE, C$$^{*}$$, and variations. In: Dawson, E., Vaudenay, S. (eds.) Mycrypt 2005. LNCS, vol. 3715, pp. 33\u201349. Springer, Heidelberg (2005)"},{"key":"4_CR18","unstructured":"Wolf, C., Preneel, B.: Taxonomy of public key schemes based on the problem of multivariate quadratic equations. Cryptology ePrint Archive, Report 2005\/077 (2005). http:\/\/eprint.iacr.org\/2005\/077\/"},{"key":"4_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"243","DOI":"10.1007\/978-3-642-38616-9_17","volume-title":"Post-Quantum Cryptography","author":"T Yasuda","year":"2013","unstructured":"Yasuda, T., Takagi, T., Sakurai, K.: Multivariate signature scheme using quadratic forms. In: Gaborit, P. (ed.) PQCrypto 2013. LNCS, vol. 7932, pp. 243\u2013258. Springer, Heidelberg (2013)"}],"container-title":["Lecture Notes in Computer Science","Information Security and Cryptology - ICISC 2014"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-15943-0_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,28]],"date-time":"2023-01-28T11:08:24Z","timestamp":1674904104000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-15943-0_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319159423","9783319159430"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-15943-0_4","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]},"assertion":[{"value":"17 March 2015","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}