{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T11:58:53Z","timestamp":1725883133919},"publisher-location":"Cham","reference-count":60,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319565484"},{"type":"electronic","value":"9783319565491"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-56549-1_22","type":"book-chapter","created":{"date-parts":[[2017,3,29]],"date-time":"2017-03-29T09:39:05Z","timestamp":1490780345000},"page":"258-266","source":"Crossref","is-referenced-by-count":0,"title":["The Quantum-Safe Revolution"],"prefix":"10.1007","author":[{"given":"Jean-Charles","family":"Faug\u00e8re","sequence":"first","affiliation":[]},{"given":"Ludovic","family":"Perret","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,3,30]]},"reference":[{"key":"22_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"179","DOI":"10.1007\/978-3-642-25385-0_10","volume-title":"Advances in Cryptology \u2013 ASIACRYPT 2011","author":"MR Albrecht","year":"2011","unstructured":"Albrecht, M.R., Farshim, P., Faug\u00e8re, J.-C., Perret, L.: Polly cracker, revisited. In: Lee, D.H., Wang, X. (eds.) ASIACRYPT 2011. LNCS, vol. 7073, pp. 179\u2013196. Springer, Heidelberg (2011). doi: 10.1007\/978-3-642-25385-0_10"},{"issue":"6","key":"22_CR2","doi-asserted-by":"crossref","first-page":"497","DOI":"10.1006\/jsco.1994.1061","volume":"18","author":"B Barkee","year":"1994","unstructured":"Barkee, B., Can, D.C., Ecks, J., Moriarty, T., Ree, R.F.: Why you cannot even hope to use Gr\u00f6bner bases in public key cryptography: an open letter to a scientist who failed and a challenge to those who have not yet failed. J. Symbolic Comput. 18(6), 497\u2013501 (1994)","journal-title":"J. Symbolic Comput."},{"issue":"5","key":"22_CR3","doi-asserted-by":"crossref","first-page":"1510","DOI":"10.1137\/S0097539796300933","volume":"26","author":"CH Bennett","year":"1997","unstructured":"Bennett, C.H., Bernstein, E., Brassard, G., Vazirani, U.V.: Strengths and weaknesses of quantum computing. SIAM J. Comput. 26(5), 1510\u20131523 (1997)","journal-title":"SIAM J. Comput."},{"key":"22_CR4","doi-asserted-by":"crossref","first-page":"7","DOI":"10.1016\/j.tcs.2014.05.025","volume":"560","author":"CH Bennett","year":"2014","unstructured":"Bennett, C.H., Brassard, G.: Quantum cryptography: public key distribution and coin tossing. Theor. Comput. Sci. 560, 7\u201311 (2014)","journal-title":"Theor. Comput. Sci."},{"key":"22_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"109","DOI":"10.1007\/11761679_8","volume-title":"Advances in Cryptology - EUROCRYPT 2006","author":"C Berbain","year":"2006","unstructured":"Berbain, C., Gilbert, H., Patarin, J.: QUAD: a practical stream cipher with provable security. In: Vaudenay, S. (ed.) EUROCRYPT 2006. LNCS, vol. 4004, pp. 109\u2013128. Springer, Heidelberg (2006). doi: 10.1007\/11761679_8"},{"issue":"12","key":"22_CR6","doi-asserted-by":"crossref","first-page":"1703","DOI":"10.1016\/j.jsc.2008.10.004","volume":"44","author":"C Berbain","year":"2009","unstructured":"Berbain, C., Gilbert, H., Patarin, J.: QUAD: a multivariate stream cipher with provable security. J. Symb. Comput. 44(12), 1703\u20131723 (2009)","journal-title":"J. Symb. Comput."},{"key":"22_CR7","series-title":"Mathematics and Statistics Springer-11649; ZDB-2-SMA","volume-title":"Post-Quantum Cryptography","year":"2009","unstructured":"Bernstein, D.J., Buchmann, J., Dahmen, E. (eds.): Post-Quantum Cryptography. Mathematics and Statistics Springer-11649; ZDB-2-SMA. Springer, Heidelberg (2009)"},{"issue":"3","key":"22_CR8","first-page":"177","volume":"3","author":"L Bettale","year":"2010","unstructured":"Bettale, L., Faug\u00e8re, J.-C., Perret, L.: Hybrid approach for solving multivariate systems over finite fields. J. Math. Crypt. 3(3), 177\u2013197 (2010)","journal-title":"J. Math. Crypt."},{"issue":"1","key":"22_CR9","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s10623-012-9617-2","volume":"69","author":"L Bettale","year":"2013","unstructured":"Bettale, L., Faug\u00e8re, J.-C., Perret, L.: Cryptanalysis of HFE, Multi-HFE and variants for odd and even characteristic. Des. Codes Crypt. 69(1), 1\u201352 (2013)","journal-title":"Des. Codes Crypt."},{"key":"22_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"82","DOI":"10.1007\/978-3-540-73458-1_7","volume-title":"Information Security and Privacy","author":"O Billet","year":"2007","unstructured":"Billet, O., Robshaw, M.J.B., Peyrin, T.: On building hash functions from multivariate quadratic equations. In: Pieprzyk, J., Ghodosi, H., Dawson, E. (eds.) ACISP 2007. LNCS, vol. 4586, pp. 82\u201395. Springer, Heidelberg (2007). doi: 10.1007\/978-3-540-73458-1_7"},{"issue":"3\u20134","key":"22_CR11","doi-asserted-by":"crossref","first-page":"235","DOI":"10.1006\/jsco.1996.0125","volume":"24","author":"W Bosma","year":"1997","unstructured":"Bosma, W., Cannon, J.J., Playoust, C.: The Magma algebra system I: the user language. J. Symbolic Comput. 24(3\u20134), 235\u2013265 (1997)","journal-title":"J. Symbolic Comput."},{"issue":"3\u20134","key":"22_CR12","first-page":"247","volume":"5","author":"C Bouillaguet","year":"2012","unstructured":"Bouillaguet, C., Fouque, P.-A., Joux, A., Treger, J.: A family of weak keys in HFE and the corresponding practical key-recovery. J. Math. Crypt. 5(3\u20134), 247\u2013275 (2012)","journal-title":"J. Math. Crypt."},{"key":"22_CR13","doi-asserted-by":"crossref","first-page":"35","DOI":"10.1007\/978-3-540-88702-7_3","volume-title":"Post-Quantum Cryptography","author":"J Buchmann","year":"2009","unstructured":"Buchmann, J., Dahmen, E., Szydlo, M.: Hash-based digital signature schemes. In: Bernstein, D.J., Buchmann, J., Dahmen, E. (eds.) Post-Quantum Cryptography, pp. 35\u201393. Springer, Heidelberg (2009)"},{"key":"22_CR14","unstructured":"Chen, L., Jordan, S., Liu, Y.-K., Moody, D., Peralta, R., Perlner, R., Smith-Tone, D.: Report on post-quantum cryptography. Reasearch report NISTIR 8105, NIST (2003)"},{"key":"22_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"337","DOI":"10.1007\/3-540-36288-6_25","volume-title":"Public Key Cryptography \u2014 PKC 2003","author":"NT Courtois","year":"2003","unstructured":"Courtois, N.T., Daum, M., Felke, P.: On the security of HFE, HFEv- and Quartz. In: Desmedt, Y.G. (ed.) PKC 2003. LNCS, vol. 2567, pp. 337\u2013350. Springer, Heidelberg (2003). doi: 10.1007\/3-540-36288-6_25"},{"key":"22_CR16","unstructured":"Courtois, N.T., Goubin, L., Patarin, J.: SFLASHv3, a fast asymmetric signature scheme. Cryptology ePrint Archive, Report 2003\/211 (2003). http:\/\/eprint.iacr.org\/2003\/211"},{"key":"22_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"59","DOI":"10.1007\/978-3-319-11659-4_4","volume-title":"Post-Quantum Cryptography","author":"T Daniels","year":"2014","unstructured":"Daniels, T., Smith-Tone, D.: Differential properties of the HFE cryptosystem. In: Mosca, M. (ed.) PQCrypto 2014. LNCS, vol. 8772, pp. 59\u201375. Springer, Cham (2014). doi: 10.1007\/978-3-319-11659-4_4"},{"key":"22_CR18","doi-asserted-by":"crossref","unstructured":"Ding, J., Hodges, T.J.: Inverting HFE systems is quasi-polynomial for all fields. In: Rogaway [53], pp. 724\u2013742 (2011)","DOI":"10.1007\/978-3-642-22792-9_41"},{"key":"22_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"164","DOI":"10.1007\/11496137_12","volume-title":"Applied Cryptography and Network Security","author":"J Ding","year":"2005","unstructured":"Ding, J., Schmidt, D.: Rainbow, a new multivariable polynomial signature scheme. In: Ioannidis, J., Keromytis, A., Yung, M. (eds.) ACNS 2005. LNCS, vol. 3531, pp. 164\u2013175. Springer, Heidelberg (2005). doi: 10.1007\/11496137_12"},{"key":"22_CR20","doi-asserted-by":"crossref","first-page":"193","DOI":"10.1007\/978-3-540-88702-7_6","volume-title":"Post-Quantum Cryptography","author":"J Ding","year":"2009","unstructured":"Ding, J., Yang, B.-Y.: Multivariate public key cryptography. In: Bernstein, D.J., Buchmann, J., Dahmen, E. (eds.) Post-Quantum Cryptography, pp. 193\u2013241. Springer, Heidelberg (2009)"},{"key":"22_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-540-74143-5_1","volume-title":"Advances in Cryptology - CRYPTO 2007","author":"V Dubois","year":"2007","unstructured":"Dubois, V., Fouque, P.-A., Shamir, A., Stern, J.: Practical cryptanalysis of SFLASH. In: Menezes, A. (ed.) CRYPTO 2007. LNCS, vol. 4622, pp. 1\u201312. Springer, Heidelberg (2007). doi: 10.1007\/978-3-540-74143-5_1"},{"key":"22_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"557","DOI":"10.1007\/978-3-642-17373-8_32","volume-title":"Advances in Cryptology - ASIACRYPT 2010","author":"V Dubois","year":"2010","unstructured":"Dubois, V., Gama, N.: The degree of regularity of HFE systems. In: Abe, M. (ed.) ASIACRYPT 2010. LNCS, vol. 6477, pp. 557\u2013576. Springer, Heidelberg (2010). doi: 10.1007\/978-3-642-17373-8_32"},{"key":"22_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"156","DOI":"10.1007\/11787006_14","volume-title":"Automata, Languages and Programming","author":"V Dubois","year":"2006","unstructured":"Dubois, V., Granboulan, L., Stern, J.: An efficient provable distinguisher for HFE. In: Bugliesi, M., Preneel, B., Sassone, V., Wegener, I. (eds.) ICALP 2006. LNCS, vol. 4052, pp. 156\u2013167. Springer, Heidelberg (2006). doi: 10.1007\/11787006_14"},{"key":"22_CR24","unstructured":"ETSI ISG QSC. Quantum-Safe Cryptography (QSC); Quantum-safe algorithmic framework. http:\/\/www.etsi.org\/deliver\/etsi_gr\/QSC\/001_099\/001\/01.01.01_60\/gr_QSC001v010101p.pdf"},{"key":"22_CR25","unstructured":"Faug\u00e8re, J.-C.: Algebraic cryptanalysis of HFE using Gr\u00f6bner bases. Reasearch report RR-4738, INRIA (2003)"},{"key":"22_CR26","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"44","DOI":"10.1007\/978-3-540-45146-4_3","volume-title":"Advances in Cryptology - CRYPTO 2003","author":"J-C Faug\u00e8re","year":"2003","unstructured":"Faug\u00e8re, J.-C., Joux, A.: Algebraic cryptanalysis of Hidden Field Equation (HFE) cryptosystems using Gr\u00f6bner Bases. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol. 2729, pp. 44\u201360. Springer, Heidelberg (2003). doi: 10.1007\/978-3-540-45146-4_3"},{"key":"22_CR27","doi-asserted-by":"crossref","unstructured":"Fellows, M., Koblitz, N.: Combinatorial cryptosystems galore! In: Mullen, G.L., Shiue, P.J.-S. (eds.) Finite Fields: Theory, Applications, and Algorithms, vol. 168. Contemporary Mathematics, pp. 51\u201361. AMS (1994)","DOI":"10.1090\/conm\/168\/01688"},{"issue":"3","key":"22_CR28","doi-asserted-by":"crossref","first-page":"209","DOI":"10.1515\/jmc-2012-0015","volume":"8","author":"L Feo De","year":"2014","unstructured":"De Feo, L., Jao, D., Pl\u00fbt, J.: Towards quantum-resistant cryptosystems from supersingular elliptic curve isogenies. J. Math. Crypt. 8(3), 209\u2013247 (2014)","journal-title":"J. Math. Crypt."},{"key":"22_CR29","series-title":"Lecture Notes in Computer Science","volume-title":"Public Key Cryptography \u2013 PKC 2012","year":"2012","unstructured":"Fischlin, M., Buchmann, J., Manulis, M. (eds.): PKC 2012. LNCS, vol. 7293. Springer, Heidelberg (2012)"},{"key":"22_CR30","unstructured":"Garey, M.R., Johnson, D.S.: Computers and Intractability: A Guide to the Theory of NP-Completeness. W.H. Freeman (1979)"},{"key":"22_CR31","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"44","DOI":"10.1007\/3-540-44448-3_4","volume-title":"Advances in Cryptology \u2014 ASIACRYPT 2000","author":"L Goubin","year":"2000","unstructured":"Goubin, L., Courtois, N.T.: Cryptanalysis of the TTM cryptosystem. In: Okamoto, T. (ed.) ASIACRYPT 2000. LNCS, vol. 1976, pp. 44\u201357. Springer, Heidelberg (2000). doi: 10.1007\/3-540-44448-3_4"},{"key":"22_CR32","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/11958239_1","volume-title":"Progress in Cryptology - VIETCRYPT 2006","author":"A Gouget","year":"2006","unstructured":"Gouget, A., Patarin, J.: Probabilistic multivariate cryptography. In: Nguyen, P.Q. (ed.) VIETCRYPT 2006. LNCS, vol. 4341, pp. 1\u201318. Springer, Heidelberg (2006). doi: 10.1007\/11958239_1"},{"key":"22_CR33","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"345","DOI":"10.1007\/11818175_20","volume-title":"Advances in Cryptology - CRYPTO 2006","author":"L Granboulan","year":"2006","unstructured":"Granboulan, L., Joux, A., Stern, J.: Inverting HFE is quasipolynomial. In: Dwork, C. (ed.) CRYPTO 2006. LNCS, vol. 4117, pp. 345\u2013356. Springer, Heidelberg (2006). doi: 10.1007\/11818175_20"},{"key":"22_CR34","unstructured":"H\u00fclsing, A.: Practical forward secure signatures using minimal security assumptions. PhD thesis, Darmstadt University of Technology 2013, pp. 1\u2013101 (2013)"},{"key":"22_CR35","unstructured":"H\u00fclsing, A., Rijneveld, J., Samardjiska, S., Schwabe, P.: From 5-pass MQ -based identification to MQ-based signatures. IACR Cryptology ePrint Archive 2016:708 (2016)"},{"key":"22_CR36","doi-asserted-by":"crossref","unstructured":"Jao, D., De Feo, L.: Towards quantum-resistant cryptosystems from supersingular elliptic curve isogenies. In: Yang [59], pp. 19\u201334 (2011)","DOI":"10.1007\/978-3-642-25405-5_2"},{"key":"22_CR37","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"206","DOI":"10.1007\/3-540-48910-X_15","volume-title":"Advances in Cryptology \u2014 EUROCRYPT 1999","author":"A Kipnis","year":"1999","unstructured":"Kipnis, A., Patarin, J., Goubin, L.: Unbalanced oil and vinegar signature schemes. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol. 1592, pp. 206\u2013222. Springer, Heidelberg (1999). doi: 10.1007\/3-540-48910-X_15"},{"issue":"5","key":"22_CR38","doi-asserted-by":"crossref","first-page":"42","DOI":"10.1109\/MITP.2016.77","volume":"18","author":"LO Mailloux","year":"2016","unstructured":"Mailloux, L.O., Lewis, C.D., Riggs, C., Grimaila, M.R.: Post-quantum cryptography: what advancements in quantum computing mean for it professionals. IT Prof. 18(5), 42\u201347 (2016)","journal-title":"IT Prof."},{"key":"22_CR39","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"419","DOI":"10.1007\/3-540-45961-8_39","volume-title":"Advances in Cryptology \u2014 EUROCRYPT 1988","author":"T Matsumoto","year":"1988","unstructured":"Matsumoto, T., Imai, H.: Public quadratic polynomial-tuples for efficient signature-verification and message-encryption. In: Barstow, D., Brauer, W., Brinch Hansen, P., Gries, D., Luckham, D., Moler, C., Pnueli, A., Seegm\u00fcller, G., Stoer, J., Wirth, N., G\u00fcnther, C.G. (eds.) EUROCRYPT 1988. LNCS, vol. 330, pp. 419\u2013453. Springer, Heidelberg (1988). doi: 10.1007\/3-540-45961-8_39"},{"key":"22_CR40","doi-asserted-by":"crossref","first-page":"147","DOI":"10.1007\/978-3-540-88702-7_5","volume-title":"Post-Quantum Cryptography","author":"D Micciancio","year":"2009","unstructured":"Micciancio, D., Regev, O.: Lattice-based cryptography. In: Bernstein, D.J., Buchmann, J., Dahmen, E. (eds.) Post-Quantum Cryptography, pp. 147\u2013191. Springer, Heidelberg (2009)"},{"issue":"5","key":"22_CR41","doi-asserted-by":"crossref","first-page":"2207","DOI":"10.1080\/00927879908826559","volume":"27","author":"T-T Moh","year":"1999","unstructured":"Moh, T.-T.: A public key system with signature and master key functions. Commun. Algebra 27(5), 2207\u20132222 (1999)","journal-title":"Commun. Algebra"},{"key":"22_CR42","unstructured":"Mosca, M.: Cybersecurity in an era with quantum computers: will we be ready? Cryptology ePrint Archive, Report 2015\/1075 (2015). http:\/\/eprint.iacr.org\/2015\/1075"},{"key":"22_CR43","unstructured":"Nachef, V., Patarin, J., Volte, E.: Zero-knowledge for multivariate polynomials. Cryptology ePrint Archive, Report 2012\/239 (2012). http:\/\/eprint.iacr.org\/2012\/239"},{"key":"22_CR44","unstructured":"NESSIE. New european schemes for signatures, integrity, and encryption (2003). https:\/\/www.cosic.esat.kuleuven.be\/nessie\/ , Accessed Sept 2014"},{"key":"22_CR45","unstructured":"NIST. Proposed submission requirements and evaluation criteria for the post-quantum cryptography standardization process (DRAFT). http:\/\/csrc.nist.gov\/groups\/ST\/post-quantum-crypto\/documents\/call-for-proposals-draft-aug-2016.pdf"},{"key":"22_CR46","doi-asserted-by":"crossref","first-page":"95","DOI":"10.1007\/978-3-540-88702-7_4","volume-title":"Post-Quantum Cryptography","author":"R Overbeck","year":"2009","unstructured":"Overbeck, R., Sendrier, N.: Code-based cryptography. In: Bernstein, D.J., Buchmann, J., Dahmen, E. (eds.) Post-Quantum Cryptography, pp. 95\u2013145. Springer, Heidelberg (2009)"},{"key":"22_CR47","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"248","DOI":"10.1007\/3-540-44750-4_20","volume-title":"Advances in Cryptology \u2014 CRYPT0 1995","author":"J Patarin","year":"1995","unstructured":"Patarin, J.: Cryptanalysis of the Matsumoto and Imai public key scheme of Eurocrypt 1988. In: Coppersmith, D. (ed.) CRYPTO 1995. LNCS, vol. 963, pp. 248\u2013261. Springer, Heidelberg (1995). doi: 10.1007\/3-540-44750-4_20"},{"key":"22_CR48","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1007\/3-540-68339-9_4","volume-title":"Advances in Cryptology \u2014 EUROCRYPT 1996","author":"J Patarin","year":"1996","unstructured":"Patarin, J.: Hidden Fields Equations (HFE) and Isomorphisms of Polynomials (IP): two new families of asymmetric algorithms. In: Maurer, U. (ed.) EUROCRYPT 1996. LNCS, vol. 1070, pp. 33\u201348. Springer, Heidelberg (1996). doi: 10.1007\/3-540-68339-9_4"},{"key":"22_CR49","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"282","DOI":"10.1007\/3-540-45353-9_21","volume-title":"Topics in Cryptology \u2014 CT-RSA 2001","author":"J Patarin","year":"2001","unstructured":"Patarin, J., Courtois, N., Goubin, L.: QUARTZ, 128-bit long digital signatures. In: Naccache, D. (ed.) CT-RSA 2001. LNCS, vol. 2020, pp. 282\u2013297. Springer, Heidelberg (2001). doi: 10.1007\/3-540-45353-9_21"},{"issue":"3\u20134","key":"22_CR50","doi-asserted-by":"crossref","first-page":"255","DOI":"10.1007\/s00200-013-0190-3","volume":"24","author":"A Petzoldt","year":"2013","unstructured":"Petzoldt, A., Bulygin, S., Buchmann, J.A.: A multivariate based threshold ring signature scheme. Appl. Algebra Eng. Commun. Comput. 24(3\u20134), 255\u2013275 (2013)","journal-title":"Appl. Algebra Eng. Commun. Comput."},{"key":"22_CR51","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"311","DOI":"10.1007\/978-3-662-48797-6_14","volume-title":"Advances in Cryptology \u2013 ASIACRYPT 2015","author":"A Petzoldt","year":"2015","unstructured":"Petzoldt, A., Chen, M.-S., Yang, B.-Y., Tao, C., Ding, J.: Design principles for HFEv- based multivariate signature schemes. In: Iwata, T., Cheon, J.H. (eds.) ASIACRYPT 2015. LNCS, vol. 9452, pp. 311\u2013334. Springer, Heidelberg (2015). doi: 10.1007\/978-3-662-48797-6_14"},{"key":"22_CR52","series-title":"Lecture Notes in Computer Science","volume-title":"Advances in Cryptology \u2013 CRYPTO 2011","year":"2011","unstructured":"Rogaway, P. (ed.): CRYPTO 2011. LNCS, vol. 6841. Springer, Heidelberg (2011)"},{"key":"22_CR53","doi-asserted-by":"crossref","unstructured":"Sakumoto, K.: Public-key identification schemes based on multivariate cubic polynomials. In: Fischlin et al. [29], pp. 172\u2013189 (2012)","DOI":"10.1007\/978-3-642-30057-8_11"},{"key":"22_CR54","doi-asserted-by":"crossref","unstructured":"Sakumoto, K., Shirai, T., Hiwatari, H.: Public-key identification schemes based on multivariate quadratic polynomials. In: Rogaway [53], pp. 706\u2013723 (2011)","DOI":"10.1007\/978-3-642-22792-9_40"},{"issue":"5","key":"22_CR55","doi-asserted-by":"crossref","first-page":"1484","DOI":"10.1137\/S0097539795293172","volume":"26","author":"PW Shor","year":"1997","unstructured":"Shor, P.W.: Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer. SIAM J. Comput. 26(5), 1484\u20131509 (1997)","journal-title":"SIAM J. Comput."},{"key":"22_CR56","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"188","DOI":"10.1007\/978-3-642-31410-0_12","volume-title":"Progress in Cryptology - AFRICACRYPT 2012","author":"E Thomae","year":"2012","unstructured":"Thomae, E., Wolf, C.: Cryptanalysis of enhanced TTS, STS and all its variants, or: why cross-terms are important. In: Mitrokotsa, A., Vaudenay, S. (eds.) AFRICACRYPT 2012. LNCS, vol. 7374, pp. 188\u2013202. Springer, Heidelberg (2012). doi: 10.1007\/978-3-642-31410-0_12"},{"key":"22_CR57","doi-asserted-by":"crossref","DOI":"10.1017\/CBO9781139856065","volume-title":"Modern Computer Algebra","author":"J Gathen von zur","year":"2013","unstructured":"von zur Gathen, J., Gerhard, J.: Modern Computer Algebra, 3rd edn. Cambridge University Press, Cambridge (2013)","edition":"3"},{"key":"22_CR58","series-title":"Lecture Notes in Computer Science","volume-title":"Post-Quantum Cryptography","year":"2011","unstructured":"Yang, B.-Y. (ed.): PQCrypto 2011. LNCS, vol. 7071. Springer, Heidelberg (2011)"},{"key":"22_CR59","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"371","DOI":"10.1007\/978-3-540-28632-5_27","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2004","author":"B-Y Yang","year":"2004","unstructured":"Yang, B.-Y., Chen, J.-M., Chen, Y.-H.: TTS: high-speed signatures on a low-cost smart card. In: Joye, M., Quisquater, J.-J. (eds.) CHES 2004. LNCS, vol. 3156, pp. 371\u2013385. Springer, Heidelberg (2004). doi: 10.1007\/978-3-540-28632-5_27"},{"key":"22_CR60","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"181","DOI":"10.1007\/978-3-642-21031-0_14","volume-title":"Information Security Practice and Experience","author":"G Yang","year":"2011","unstructured":"Yang, G., Tang, S., Yang, L.: A novel group signature scheme based on MPKC. In: Bao, F., Weng, J. (eds.) ISPEC 2011. LNCS, vol. 6672, pp. 181\u2013195. Springer, Heidelberg (2011). doi: 10.1007\/978-3-642-21031-0_14"}],"container-title":["Lecture Notes in Computer Science","Information Security Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-56549-1_22","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,8,22]],"date-time":"2023-08-22T22:21:56Z","timestamp":1692742916000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-56549-1_22"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319565484","9783319565491"],"references-count":60,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-56549-1_22","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]}}}