{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,27]],"date-time":"2025-11-27T10:32:21Z","timestamp":1764239541875},"publisher-location":"Berlin, Heidelberg","reference-count":10,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540884026"},{"type":"electronic","value":"9783540884033"}],"license":[{"start":{"date-parts":[[2008,1,1]],"date-time":"2008-01-01T00:00:00Z","timestamp":1199145600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008]]},"DOI":"10.1007\/978-3-540-88403-3_9","type":"book-chapter","created":{"date-parts":[[2008,10,7]],"date-time":"2008-10-07T04:26:31Z","timestamp":1223353591000},"page":"124-136","source":"Crossref","is-referenced-by-count":3,"title":["Cryptanalysis of Rational Multivariate Public Key Cryptosystems"],"prefix":"10.1007","author":[{"given":"Jintai","family":"Ding","sequence":"first","affiliation":[]},{"given":"John","family":"Wagner","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"9_CR1","unstructured":"International Workshop on Post-Quantum Cryptography. Katholieke Universiteit Leuven, Belgium, May 24\u201326 (2006), \n                  \n                    http:\/\/postquantum.cr.yp.to"},{"key":"9_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"357","DOI":"10.1007\/11818175_21","volume-title":"Advances in Cryptology - CRYPTO 2006","author":"J.-C. Faugere","year":"2006","unstructured":"Faugere, J.-C., Perret, L.: Cryptanalysis of 2R- Schemes. In: Dwork, C. (ed.) CRYPTO 2006. LNCS, vol.\u00a04117, pp. 357\u2013372. Springer, Heidelberg (2006)"},{"key":"9_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"340","DOI":"10.1007\/3-540-39799-X_24","volume-title":"Advances in cryptology\u2014CRYPTO 1985","author":"H. Fell","year":"1986","unstructured":"Fell, H., Diffie, W.: Analysis of a public key approach based on polynomial substitution. In: Williams, H.C. (ed.) CRYPTO 1985. LNCS, vol.\u00a0218, pp. 340\u2013349. Springer, Heidelberg (1986)"},{"key":"9_CR4","unstructured":"Goubin, L., Patarin, J.: Asymmetric Cryptography with S-Boxes, Extended Version, \n                  \n                    http:\/\/citeseer.ist.psu.edu\/patarin97asymmetric.html"},{"key":"9_CR5","first-page":"390","volume":"2","author":"S. Tsujii","year":"1989","unstructured":"Tsujii, S., Fujioka, A., Hirayama, Y.: Generalization of the public key cryptosystem based on the difficulty of solving a system of non-linear equations. ICICE Transactions (A) J72-A\u00a02, 390\u2013397 (1989), \n                  \n                    http:\/\/eprint.iacr.org\/2004\/336","journal-title":"ICICE Transactions (A) J72-A"},{"key":"9_CR6","unstructured":"Tsujii, S., Tadaki, K., Fujita, R.: Piece In Hand Concept for Enhancing the Security of Multivariate Type Public Key Cryptosystems: Public Key Without Containing All the Information of Secret Key, Cryptology ePrint Archive, Report 2004\/366 (2004), \n                  \n                    http:\/\/eprint.iacr.org\/2004\/366"},{"key":"9_CR7","first-page":"1963","volume":"12","author":"S. Tsujii","year":"1986","unstructured":"Tsujii, S., Kurosawa, K., Itoh, T., Fujioka, A., Matsumoto, T.: A public key cryptosystem based on the difficulty of solving a system of nonlinear equations. ICICE Transactions (D) J69-D\u00a012, 1963\u20131970 (1986)","journal-title":"ICICE Transactions (D) J69-D"},{"key":"9_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"244","DOI":"10.1007\/978-3-540-30580-4_17","volume-title":"Public key cryptography - PKC 2005","author":"W. Lih-Chung","year":"2005","unstructured":"Lih-Chung, W., Yuh-Hua, H., Lai, F., Chun-Yen, C., Bo-Yin, Y.: Tractable rational map signature. In: Vaudenay, S. (ed.) PKC 2005. LNCS, vol.\u00a03386, pp. 244\u2013257. Springer, Heidelberg (2005)"},{"key":"9_CR9","series-title":"Lecture Notes in Computer Science","first-page":"315","volume-title":"Advances in Cryptology - CRYPTO 1999","author":"D.F. Ye","year":"1999","unstructured":"Ye, D.F., Lam, K.Y., Dai, Z.D.: Cryptanalysis of 2R Schemes. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol.\u00a01666, pp. 315\u2013325. Springer, Heidelberg (1999)"},{"key":"9_CR10","unstructured":"Specifications of SFLASH, NESSIE documentation, \n                  \n                    https:\/\/www.cosic.esat.kuleuven.ac.be\/nessie\/workshop\/"}],"container-title":["Lecture Notes in Computer Science","Post-Quantum Cryptography"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-88403-3_9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,1,25]],"date-time":"2019-01-25T07:38:39Z","timestamp":1548401919000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-88403-3_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008]]},"ISBN":["9783540884026","9783540884033"],"references-count":10,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-88403-3_9","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2008]]}}}