{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T23:12:14Z","timestamp":1742944334802,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":12,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540727378"},{"type":"electronic","value":"9783540727385"}],"license":[{"start":{"date-parts":[[2007,1,1]],"date-time":"2007-01-01T00:00:00Z","timestamp":1167609600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2007]]},"DOI":"10.1007\/978-3-540-72738-5_7","type":"book-chapter","created":{"date-parts":[[2007,6,22]],"date-time":"2007-06-22T20:36:01Z","timestamp":1182544561000},"page":"104-115","source":"Crossref","is-referenced-by-count":1,"title":["Cryptanalysis of the TRMC-4 Public Key Cryptosystem"],"prefix":"10.1007","author":[{"given":"Xuyun","family":"Nie","sequence":"first","affiliation":[]},{"given":"Lei","family":"Hu","sequence":"additional","affiliation":[]},{"given":"Jintai","family":"Ding","sequence":"additional","affiliation":[]},{"given":"Jianyu","family":"Li","sequence":"additional","affiliation":[]},{"given":"John","family":"Wagner","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"unstructured":"Ding, J., Hodges, T.: Cryptanalysis of an Implementation Scheme of TTM. J. Algebra Appl., 273\u2013282 (2004), \n                    \n                      http:\/\/eprint.iacr.org\/2003\/084","key":"7_CR1"},{"unstructured":"Ding, J., Schmidt, D.: The new TTM implementation is not secure. In: Niederreiter, H., Feng, K.Q., Xing, C.P. (eds.) Proceedings of International Workshop on Coding, Cryptography and Combinatorics (CCC 2003), pp. 106\u2013121 (2003)","key":"7_CR2"},{"key":"7_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"44","DOI":"10.1007\/3-540-44448-3_4","volume-title":"Advances in Cryptology - ASIACRYPT 2000","author":"L. Goubin","year":"2000","unstructured":"Goubin, L., Courtois, N.: Cryptanalysis of the TTM cryptosystem. In: Okamoto, T. (ed.) ASIACRYPT 2000. LNCS, vol.\u00a01976, pp. 44\u201357. Springer, Heidelberg (2000)"},{"key":"7_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"258","DOI":"10.1007\/978-3-540-30580-4_18","volume-title":"Public Key Cryptography - PKC 2005","author":"A. Joux","year":"2005","unstructured":"Joux, A., Kunz-Jacques, S., Muller, F., Ricordel, P.-M.: Cryptanalysis of the Tractable Rational Map Cryptosystem. In: Vaudenay, S. (ed.) PKC 2005. LNCS, vol.\u00a03386, pp. 258\u2013274. Springer, Heidelberg (2005)"},{"key":"7_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"419","DOI":"10.1007\/3-540-45961-8_39","volume-title":"Advances in Cryptology - EUROCRYPT \u201988","author":"T. Matsumoto","year":"1988","unstructured":"Matsumoto, T., Imai, H.: Public quadratic polynomial-tuples for efficient signature-verification and message-encryption. In: G\u00fcnther, C.G. (ed.) EUROCRYPT 1988. LNCS, vol.\u00a0330, pp. 419\u2013453. Springer, Heidelberg (1988)"},{"doi-asserted-by":"crossref","unstructured":"Moh, T.: A fast public key system with signature and master key functions. Lecture Notes at EE department of Stanford University (May 1999), \n                    \n                      http:\/\/www.usdsi.com\/ttm.html","key":"7_CR6","DOI":"10.1080\/00927879908826559"},{"key":"7_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"210","DOI":"10.1007\/11767480_14","volume-title":"Applied Cryptography and Network Security","author":"X. Nie","year":"2006","unstructured":"Nie, X., Hu, L., Li, J., Updegrove, C., Ding, J.: Breaking a New Instance of TTM Cryptosystems. In: Zhou, J., Yung, M., Bao, F. (eds.) ACNS 2006. LNCS, vol.\u00a03989, pp. 210\u2013225. Springer, Heidelberg (2006)"},{"key":"7_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"248","DOI":"10.1007\/3-540-44750-4_20","volume-title":"Advances in Cryptology - CRYPTO \u201995","author":"J. Patarin","year":"1995","unstructured":"Patarin, J.: Cryptanalysis of the Matsumoto and Imai Public Key Scheme of Eurocrypt \u201988. In: Coppersmith, D. (ed.) CRYPTO 1995. LNCS, vol.\u00a0963, pp. 248\u2013261. Springer, Heidelberg (1995)"},{"issue":"5","key":"7_CR9","doi-asserted-by":"publisher","first-page":"1484","DOI":"10.1137\/S0097539795293172","volume":"26","author":"P. Shor","year":"1997","unstructured":"Shor, P.: Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer. SIAM Journal on Computing\u00a026(5), 1484\u20131509 (1997)","journal-title":"SIAM Journal on Computing"},{"unstructured":"Wang, L., Chang, F.: Tractable Rational Map Cryptosystem, available at \n                    \n                      http:\/\/eprint.iacr.org\/2004\/046\n                    \n                    \n                   (revised on February 3, 2006)","key":"7_CR10"},{"unstructured":"Wolf, C.: Multivariate Quadratic Polynomials in Public Key Cryptography. Cryptology ePrint Archive, Report 2005\/393 (2005), available at \n                    \n                      http:\/\/eprint.iacr.org\/","key":"7_CR11"},{"key":"7_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"518","DOI":"10.1007\/11506157_43","volume-title":"Information Security and Privacy","author":"B.-Y. Yang","year":"2005","unstructured":"Yang, B.-Y., Chen, J.-M.: Building Secure Tame-like Multivariate Public-Key Cryptosystems: The New TTS. In: Boyd, C., Gonz\u00e1lez Nieto, J.M. (eds.) ACISP 2005. LNCS, vol.\u00a03574, pp. 518\u2013531. Springer, Heidelberg (2005)"}],"container-title":["Lecture Notes in Computer Science","Applied Cryptography and Network Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-72738-5_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,19]],"date-time":"2019-05-19T09:48:44Z","timestamp":1558259324000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-72738-5_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007]]},"ISBN":["9783540727378","9783540727385"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-72738-5_7","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2007]]}}}