{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T17:22:43Z","timestamp":1725556963509},"publisher-location":"Berlin, Heidelberg","reference-count":10,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642129285"},{"type":"electronic","value":"9783642129292"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-12929-2_4","type":"book-chapter","created":{"date-parts":[[2010,5,31]],"date-time":"2010-05-31T05:17:53Z","timestamp":1275283073000},"page":"41-60","source":"Crossref","is-referenced-by-count":2,"title":["Cryptanalysis of Two Quartic Encryption Schemes and One Improved MFE Scheme"],"prefix":"10.1007","author":[{"given":"Weiwei","family":"Cao","sequence":"first","affiliation":[]},{"given":"Xiuyun","family":"Nie","sequence":"additional","affiliation":[]},{"given":"Lei","family":"Hu","sequence":"additional","affiliation":[]},{"given":"Xiling","family":"Tang","sequence":"additional","affiliation":[]},{"given":"Jintai","family":"Ding","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"4_CR1","doi-asserted-by":"publisher","first-page":"644","DOI":"10.1109\/TIT.1976.1055638","volume":"22","author":"W. Diffie","year":"1976","unstructured":"Diffie, W., Hellman, M.: New Directions in Cryptography. IEEE Transactions on Information Theory\u00a022, 644\u2013654 (1976)","journal-title":"IEEE Transactions on Information Theory"},{"key":"4_CR2","volume-title":"Advances in Information Security","author":"J. Ding","year":"2006","unstructured":"Ding, J., Gower, J., Schmidt, D.: Multivariate Public-Key Cryptosystems. In: Advances in Information Security. Springer, Heidelberg (2006) ISBN 0-387-32229-9"},{"key":"4_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"233","DOI":"10.1007\/978-3-540-71677-8_16","volume-title":"Public Key Cryptography \u2013 PKC 2007","author":"J. Ding","year":"2007","unstructured":"Ding, J., Hu, L., Nie, X., Li, J., Wagner, J.: High Order Linearization Equation (HOLE) Attack on Multivariate Public Key Cryptosystems. In: Okamoto, T., Wang, X. (eds.) PKC 2007. LNCS, vol.\u00a04450, pp. 233\u2013248. Springer, Heidelberg (2007)"},{"key":"4_CR4","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1016\/S0022-4049(99)00005-5","volume":"139","author":"J. Faug\u00e8re","year":"1999","unstructured":"Faug\u00e8re, J.: A New Efficient Algorithm for Computing Gr\u00f6bner Bases (F4). Journal of Applied and Pure Algebra\u00a0139, 61\u201388 (1999)","journal-title":"Journal of Applied and Pure Algebra"},{"key":"4_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"248","DOI":"10.1007\/3-540-44750-4_20","volume-title":"Advances in Cryptology - CRYPTO \u201995","author":"J. Patarin","year":"1995","unstructured":"Patarin, J.: Cryptanalysis of the Matsumoto and Imai Public Key Scheme of Eurocrypt\u201988. In: Coppersmith, D. (ed.) CRYPTO 1995. LNCS, vol.\u00a0963, pp. 248\u2013261. Springer, Heidelberg (1995)"},{"key":"4_CR6","doi-asserted-by":"publisher","first-page":"1484","DOI":"10.1137\/S0097539795293172","volume":"26","author":"P. Shor","year":"1997","unstructured":"Shor, P.: Polynomial-time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer. SIAM Journal on Computing\u00a026, 1484\u20131509 (1997)","journal-title":"SIAM Journal on Computing"},{"key":"4_CR7","unstructured":"Wang, Z.: An Improved Medium-Field Equation (MFE) Multivariate Public Key Encryption Scheme. In: IIH-MISP (2007), \n                    \n                      http:\/\/bit.kuas.edu.tw\/~iihmsp07\/accepted_list_general_session.html"},{"issue":"3","key":"4_CR8","first-page":"1","volume":"6","author":"X. Wang","year":"2009","unstructured":"Wang, X., Feng, F., Wang, X., Wang, Q.: A More Secure MFE Multivariate Public Key Encryption Scheme. International Journal of Computer Science and Applications\u00a06(3), 1\u20139 (2009), \n                    \n                      http:\/\/www.tmrfindia.org\/ijcsa\/v6i31.pdf","journal-title":"International Journal of Computer Science and Applications"},{"key":"4_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"132","DOI":"10.1007\/11605805_9","volume-title":"Topics in Cryptology \u2013 CT-RSA 2006","author":"L. Wang","year":"2006","unstructured":"Wang, L., Yang, B., Hu, Y., Lai, F.: A Medium-Field Multivariate Public Key Encryption Scheme. In: Pointcheval, D. (ed.) CT-RSA 2006. LNCS, vol.\u00a03860, pp. 132\u2013149. Springer, Heidelberg (2006)"},{"issue":"6","key":"4_CR10","first-page":"1152","volume":"36","author":"Z. Wang","year":"2007","unstructured":"Wang, Z., Zheng, S., Yang, Y., et al.: Improved Medium- Field Multivariate Public Key Encryption. Journal of University of Electonic Science an Technology of China\u00a036(6), 1152\u20131154 (2007) (in Chinese)","journal-title":"Journal of University of Electonic Science an Technology of China"}],"container-title":["Lecture Notes in Computer Science","Post-Quantum Cryptography"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-12929-2_4.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,30]],"date-time":"2021-04-30T11:49:00Z","timestamp":1619783340000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-12929-2_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642129285","9783642129292"],"references-count":10,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-12929-2_4","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2010]]}}}