{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,2]],"date-time":"2026-01-02T07:50:42Z","timestamp":1767340242848,"version":"3.37.3"},"publisher-location":"Cham","reference-count":40,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319893389"},{"type":"electronic","value":"9783319893396"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-89339-6_14","type":"book-chapter","created":{"date-parts":[[2018,4,4]],"date-time":"2018-04-04T21:32:30Z","timestamp":1522877550000},"page":"252-265","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Two-Face: New Public Key Multivariate Schemes"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-6156-8295","authenticated-orcid":false,"given":"Gilles","family":"Macario-Rat","sequence":"first","affiliation":[]},{"given":"Jacques","family":"Patarin","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,4,6]]},"reference":[{"key":"14_CR1","doi-asserted-by":"crossref","unstructured":"Gilbert, H., Minier, M.: Cryptanalysis of SFLASH. [36], pp. 288\u2013298 (2002)","DOI":"10.1007\/3-540-46035-7_19"},{"key":"14_CR2","doi-asserted-by":"crossref","unstructured":"Fouque, P., Macario-Rat, G., Stern, J.: Key recovery on hidden monomial multivariate schemes. [37], pp. 19\u201330 (2008)","DOI":"10.1007\/978-3-540-78967-3_2"},{"key":"14_CR3","unstructured":"Ding, J., Dubois, V., Yang, B., Chen, C.O., Cheng, C.: Could SFLASH be repaired? IACR Cryptology ePrint Archive 2009, 596 (2009)"},{"key":"14_CR4","unstructured":"Faug\u00e8re, J., Perret, L.: On the security of UOV. IACR Cryptology ePrint Archive 2009, 483 (2009)"},{"key":"14_CR5","doi-asserted-by":"crossref","unstructured":"Hamdi, O., Bouallegue, A., Harari, S.: Hidden field equations cryptosystem performances. In: AICCSA, pp. 308\u2013311. IEEE Computer Society (2006)","DOI":"10.1109\/AICCSA.2006.205106"},{"key":"14_CR6","doi-asserted-by":"crossref","unstructured":"Patarin, J.: Hidden fields equations (HFE) and isomorphisms of polynomials (IP): two new families of asymmetric algorithms. [34], pp. 33\u201348 (1996)","DOI":"10.1007\/3-540-68339-9_4"},{"key":"14_CR7","series-title":"Encyclopedia of Mathematics and its Applications","doi-asserted-by":"crossref","DOI":"10.1017\/CBO9780511525926","volume-title":"Finite Fields","author":"R Lidl","year":"1996","unstructured":"Lidl, R., Niederreiter, H.: Finite Fields. Encyclopedia of Mathematics and its Applications, 2nd edn. Cambridge University Press, Cambridge (1996)","edition":"2"},{"issue":"3","key":"14_CR8","doi-asserted-by":"crossref","first-page":"239","DOI":"10.1007\/BF01111042","volume":"103","author":"P Dembowski","year":"1968","unstructured":"Dembowski, P., Ostrom, T.G.: Planes of order $$n$$n with collineation groups of order $$n^2$$n2. Math. Z. 103(3), 239\u2013258 (1968)","journal-title":"Math. Z."},{"key":"14_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"52","DOI":"10.1007\/978-3-642-38616-9_4","volume-title":"Post-Quantum Cryptography","author":"J Ding","year":"2013","unstructured":"Ding, J., Yang, B.-Y.: Degree of regularity for HFEv and HFEv-. In: Gaborit, P. (ed.) PQCrypto 2013. LNCS, vol. 7932, pp. 52\u201366. Springer, Heidelberg (2013). https:\/\/doi.org\/10.1007\/978-3-642-38616-9_4"},{"issue":"4","key":"14_CR10","doi-asserted-by":"crossref","first-page":"1271","DOI":"10.1109\/18.761283","volume":"45","author":"H Dobbertin","year":"1999","unstructured":"Dobbertin, H.: Almost perfect nonlinear power functions on GF(2$${}^{n}$$n): the Welch case. IEEE Trans. Inf. Theory 45(4), 1271\u20131275 (1999)","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"2","key":"14_CR11","doi-asserted-by":"crossref","first-page":"175","DOI":"10.1023\/A:1008341625464","volume":"20","author":"J Patarin","year":"2000","unstructured":"Patarin, J.: Cryptanalysis of the Matsumoto and Imai public key scheme of eurocrypt\u201998. Des. Codes Crypt. 20(2), 175\u2013209 (2000)","journal-title":"Des. Codes Crypt."},{"key":"14_CR12","doi-asserted-by":"crossref","unstructured":"Fouque, P., Granboulan, L., Stern, J.: Differential cryptanalysis for multivariate schemes. [32], pp. 341\u2013353 (2005)","DOI":"10.1007\/11426639_20"},{"key":"14_CR13","doi-asserted-by":"crossref","unstructured":"Dubois, V., Granboulan, L., Stern, J.: Cryptanalysis of HFE with internal perturbation. [33]. pp. 249\u2013265 (2007)","DOI":"10.1007\/978-3-540-71677-8_17"},{"key":"14_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"667","DOI":"10.1007\/978-3-642-25385-0_36","volume-title":"Advances in Cryptology \u2013 ASIACRYPT 2011","author":"C Bouillaguet","year":"2011","unstructured":"Bouillaguet, C., Fouque, P.-A., Macario-Rat, G.: Practical key-recovery for all possible parameters of SFLASH. In: Lee, D.H., Wang, X. (eds.) ASIACRYPT 2011. LNCS, vol. 7073, pp. 667\u2013685. Springer, Heidelberg (2011). https:\/\/doi.org\/10.1007\/978-3-642-25385-0_36"},{"key":"14_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-540-74143-5_1","volume-title":"Advances in Cryptology - CRYPTO 2007","author":"V Dubois","year":"2007","unstructured":"Dubois, V., Fouque, P.-A., Shamir, A., Stern, J.: Practical cryptanalysis of SFLASH. In: Menezes, A. (ed.) CRYPTO 2007. LNCS, vol. 4622, pp. 1\u201312. Springer, Heidelberg (2007). https:\/\/doi.org\/10.1007\/978-3-540-74143-5_1"},{"key":"14_CR16","series-title":"Elibron Classics Series","volume-title":"Lessons Introductory to the Modern Higher Algebra","author":"G Salmon","year":"1999","unstructured":"Salmon, G.: Lessons Introductory to the Modern Higher Algebra. Elibron Classics Series. Adegi Graphics LLC, Rye Brook (1999)"},{"key":"14_CR17","doi-asserted-by":"crossref","DOI":"10.1007\/b102438","volume-title":"Algorithms for Computer Algebra","author":"KO Geddes","year":"1992","unstructured":"Geddes, K.O., Czapor, S.R., Labahn, G.: Algorithms for Computer Algebra. Kluwer Academic Publishers, Norwell (1992)"},{"issue":"3\u20134","key":"14_CR18","doi-asserted-by":"crossref","first-page":"235","DOI":"10.1006\/jsco.1996.0125","volume":"24","author":"W Bosma","year":"1997","unstructured":"Bosma, W., Cannon, J., Playoust, C.: The Magma algebra system. I: the user language. J. Symb. Comput. 24(3\u20134), 235\u2013265 (1997). Computational algebra and number theory (London, 1993)","journal-title":"J. Symb. Comput."},{"key":"14_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"44","DOI":"10.1007\/978-3-540-45146-4_3","volume-title":"Advances in Cryptology - CRYPTO 2003","author":"J-C Faug\u00e8re","year":"2003","unstructured":"Faug\u00e8re, J.-C., Joux, A.: Algebraic cryptanalysis of hidden field equation (HFE) cryptosystems using Gr\u00f6bner bases. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol. 2729, pp. 44\u201360. Springer, Heidelberg (2003). https:\/\/doi.org\/10.1007\/978-3-540-45146-4_3"},{"key":"14_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"441","DOI":"10.1007\/978-3-642-19379-8_27","volume-title":"Public Key Cryptography \u2013 PKC 2011","author":"L Bettale","year":"2011","unstructured":"Bettale, L., Faug\u00e8re, J.-C., Perret, L.: Cryptanalysis of multivariate and odd-characteristic HFE variants. In: Catalano, D., Fazio, N., Gennaro, R., Nicolosi, A. (eds.) PKC 2011. LNCS, vol. 6571, pp. 441\u2013458. Springer, Heidelberg (2011). https:\/\/doi.org\/10.1007\/978-3-642-19379-8_27"},{"key":"14_CR21","unstructured":"Bettale, L., Faug\u00e8re, J., Perret, L.: Cryptanalysis of HFE, multi-HFE and variants for odd and even characteristic. IACR Cryptology ePrint Archive 2011, 399 (2011)"},{"key":"14_CR22","unstructured":"Billet, O., Patarin, J., Seurin, Y.: Analysis of intermediate field systems. In: First Conference on Symbolic Computation and Cryptography, Beijing, China, 28\u201330 April 2008, pp. 110\u2013117 (2008)"},{"key":"14_CR23","doi-asserted-by":"crossref","unstructured":"Goubin, L., Courtois, N.: Cryptanalysis of the TTM cryptosystem. [24], pp. 44\u201357 (2000)","DOI":"10.1007\/3-540-44448-3_4"},{"key":"14_CR24","doi-asserted-by":"publisher","unstructured":"Okamoto, T. (ed.) Advances in Cryptology - ASIACRYPT 2000. LNCS, vol. 1976. Springer, Heidelberg (2000). https:\/\/doi.org\/10.1007\/3-540-44448-3","DOI":"10.1007\/3-540-44448-3"},{"key":"14_CR25","doi-asserted-by":"crossref","unstructured":"Zhang, W., Tan, C.H.: A new perturbed Matsumoto-Imai signature scheme. [26], pp. 43\u201348 (2014)","DOI":"10.1145\/2600694.2600698"},{"key":"14_CR26","unstructured":"Emura, K., Hanaoka, G., Zhao, Y. (eds.): Proceedings of the 2nd ACM Workshop on ASIA Public-Key Cryptography, ASIAPKC 2014, 3 June, 2014, Kyoto, Japan. ACM (2014)"},{"key":"14_CR27","unstructured":"Zhang, W., Tan, C.H.: MI-T-HFE, a new multivariate signature scheme. Cryptology ePrint Archive, Report 2015\/890 (2015). http:\/\/eprint.iacr.org\/2015\/890"},{"key":"14_CR28","doi-asserted-by":"crossref","unstructured":"Ding, J., Gower, J.E., Schmidt, D., Wolf, C., Yin, Z.: Complexity estimates for the F4 attack on the perturbed Matsumoto-Imai cryptosystem. [29], pp. 262\u2013277 (2005)","DOI":"10.1007\/11586821_18"},{"key":"14_CR29","doi-asserted-by":"publisher","unstructured":"Smart, N.P. (ed.): Cryptography and Coding 2005. LNCS, vol. 3796. Springer, Heidelberg (2005). https:\/\/doi.org\/10.1007\/11586821","DOI":"10.1007\/11586821"},{"key":"14_CR30","doi-asserted-by":"crossref","unstructured":"Ding, J.: A new variant of the Matsumoto-Imai cryptosystem through perturbation. [31], pp. 305\u2013318 (2004)","DOI":"10.1007\/978-3-540-24632-9_22"},{"key":"14_CR31","doi-asserted-by":"publisher","unstructured":"Bao, F., Deng, R.H., Zhou, J. (eds.): Public Key Cryptography-PKC 2004. LNCS, vol. 2947. Springer, Heidelberg (2004). https:\/\/doi.org\/10.1007\/978-3-540-24632-9_22","DOI":"10.1007\/978-3-540-24632-9_22"},{"key":"14_CR32","doi-asserted-by":"publisher","unstructured":"Cramer, R. (ed.): Advances in Cryptology - EUROCRYPT 2005. vol.3494. LNCS, Springer, Heidelberg (2005). https:\/\/doi.org\/10.1007\/11426639_20","DOI":"10.1007\/11426639_20"},{"key":"14_CR33","doi-asserted-by":"publisher","unstructured":"Okamoto, T., Wang, X. (eds.): Public Key Cryptography - PKC 2007. LNCS, vol. 4450. Springer, Heidelberg (2007). https:\/\/doi.org\/10.1007\/978-3-540-71677-8_17","DOI":"10.1007\/978-3-540-71677-8_17"},{"key":"14_CR34","doi-asserted-by":"publisher","unstructured":"Maurer, U.M. (ed.): Advances in Cryptology - EUROCRYPT 1996. LNCS, vol. 1070. Springer, Heidelberg (1996). https:\/\/doi.org\/10.1007\/3-540-68339-9_4","DOI":"10.1007\/3-540-68339-9_4"},{"issue":"1","key":"14_CR35","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1112\/plms\/s1-35.1.3","volume":"s1\u201335","author":"FS MacAulay","year":"1902","unstructured":"MacAulay, F.S.: Some formul\u00e6 in elimination. Proc. Lond. Math. Soc. s1\u201335(1), 3\u201327 (1902)","journal-title":"Proc. Lond. Math. Soc."},{"key":"14_CR36","doi-asserted-by":"publisher","unstructured":"Knudsen, L.R. (ed.): Advances in Cryptology - EUROCRYPT 2002. LNCS, vol. 2332. Springer, Heidelberg (2002). https:\/\/doi.org\/10.1007\/3-540-46035-7","DOI":"10.1007\/3-540-46035-7"},{"key":"14_CR37","doi-asserted-by":"publisher","unstructured":"Smart, N.P. (ed.): Advances in Cryptology - EUROCRYPT 2008. LNCS, vol. 4965. Springer, Heidelberg (2008). https:\/\/doi.org\/10.1007\/978-3-540-78967-3_2","DOI":"10.1007\/978-3-540-78967-3_2"},{"key":"14_CR38","doi-asserted-by":"crossref","unstructured":"Hou, X.d.: Permutation polynomials over finite fields - a survey of recent advances. Finite Fields Appl. 32(C), 82\u2013119 (2015)","DOI":"10.1016\/j.ffa.2014.10.001"},{"key":"14_CR39","doi-asserted-by":"publisher","unstructured":"Blokhuis, A., Coulter, R.S., Henderson, M., O\u2019Keefe, C.M.: Permutations amongst the Dembowski-Ostrom polynomials. In: Jungnickel, D., Niederreiter, H. (eds.) Finite Fields and Applications, pp. 37\u201342. Springer, Heidelberg (2001). https:\/\/doi.org\/10.1007\/978-3-642-56755-1_4","DOI":"10.1007\/978-3-642-56755-1_4"},{"key":"14_CR40","unstructured":"Pl\u00fbt, J., Fouque, P., Macario-Rat, G.: Solving the \u201cisomorphism of polynomials with two secrets\u201d problem for all pairs of quadratic forms. CoRR abs\/1406.3163 (2014)"}],"container-title":["Lecture Notes in Computer Science","Progress in Cryptology \u2013 AFRICACRYPT 2018"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-89339-6_14","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,14]],"date-time":"2019-10-14T00:07:45Z","timestamp":1571011665000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-89339-6_14"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783319893389","9783319893396"],"references-count":40,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-89339-6_14","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2018]]}}}