{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T21:10:02Z","timestamp":1725570602382},"publisher-location":"Berlin, Heidelberg","reference-count":18,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642176180"},{"type":"electronic","value":"9783642176197"}],"license":[{"start":{"date-parts":[[2010,1,1]],"date-time":"2010-01-01T00:00:00Z","timestamp":1262304000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-17619-7_11","type":"book-chapter","created":{"date-parts":[[2010,11,30]],"date-time":"2010-11-30T11:45:07Z","timestamp":1291117507000},"page":"140-155","source":"Crossref","is-referenced-by-count":2,"title":["Practical Algebraic Cryptanalysis for Dragon-Based Cryptosystems"],"prefix":"10.1007","author":[{"given":"Johannes","family":"Buchmann","sequence":"first","affiliation":[]},{"given":"Stanislav","family":"Bulygin","sequence":"additional","affiliation":[]},{"given":"Jintai","family":"Ding","sequence":"additional","affiliation":[]},{"given":"Wael Said Abd Elmageed","family":"Mohamed","sequence":"additional","affiliation":[]},{"given":"Fabian","family":"Werner","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"11_CR1","volume-title":"Computers and Intractability: A Guide to the Theory of NP-Completeness","author":"M.R. Garey","year":"1979","unstructured":"Garey, M.R., Johnson, D.S.: Computers and Intractability: A Guide to the Theory of NP-Completeness. W. H. Freeman & Co., New York (1979)"},{"key":"11_CR2","volume-title":"Multivariate Public Key Cryptosystems (Advances in Information Security)","author":"J. Ding","year":"2006","unstructured":"Ding, J., Gower, J.E., Schmidt, D.: Multivariate Public Key Cryptosystems (Advances in Information Security). Springer, New York (2006)"},{"key":"11_CR3","first-page":"193","volume-title":"Post Quantum Cryptography","author":"J. Ding","year":"2008","unstructured":"Ding, J., Yang, B.Y.: Multivariate Public Key Cryptography. In: Bernstein, D.J., et al. (eds.) Post Quantum Cryptography, pp. 193\u2013234. Springer, Heidelberg (2008)"},{"key":"11_CR4","doi-asserted-by":"publisher","first-page":"1","DOI":"10.5121\/ijnsa.2010.2201","volume":"2","author":"R.P. Singh","year":"2010","unstructured":"Singh, R.P., Saikia, A., Sarma, B.K.: Little Dragon Two: An Efficient Multivariate Public Key Cryptosystem. International Journal of Network Security and Its Applications (IJNSA)\u00a02, 1\u201310 (2010)","journal-title":"International Journal of Network Security and Its Applications (IJNSA)"},{"key":"11_CR5","series-title":"Lecture Notes in Computer Science","first-page":"45","volume-title":"CRYPTO \u201996","author":"P. Jacques","year":"1996","unstructured":"Jacques, P.: Asymmetric Cryptography with a Hidden Monomial. In: Koblitz, N. (ed.) CRYPTO 1996. LNCS, vol.\u00a01109, pp. 45\u201360. Springer, Heidelberg (1996)"},{"key":"11_CR6","unstructured":"Singh, R.P., Saikia, A., Sarma, B.: Poly-Dragon: An efficient Multivariate Public Key Cryptosystem. Cryptology ePrint Archive, Report 2009\/587 (2009), \n                    \n                      http:\/\/eprint.iacr.org\/"},{"key":"11_CR7","unstructured":"Ding, J., Buchmann, J., Mohamed, M.S.E., Moahmed, W.S.A., Weinmann, R.P.: MutantXL. In: Proceedings of the 1st International Conference on Symbolic Computation and Cryptography (SCC 2008), Beijing, China, pp. 16\u201322. LMIB (2008), \n                    \n                      http:\/\/www.cdc.informatik.tu-darmstadt.de\/reports\/reports\/MutantXL_Algorithm.pdf"},{"key":"11_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"392","DOI":"10.1007\/978-3-642-10433-6_26","volume-title":"Cryptology and Network Security","author":"M.S. Mohamed","year":"2009","unstructured":"Mohamed, M.S., Ding, J., Buchmann, J., Werner, F.: Algebraic Attack on the MQQ Public Key Cryptosystem. In: Garay, J.A., Miyaji, A., Otsuka, A. (eds.) CANS 2009. LNCS, vol.\u00a05888, pp. 392\u2013401. Springer, Heidelberg (2009)"},{"key":"11_CR9","series-title":"Encyclopedia of Mathematics and its Applications","volume-title":"Finite Fields","author":"R. Lidl","year":"1997","unstructured":"Lidl, R., Niederreiter, H.: Finite Fields, 2nd edn. Encyclopedia of Mathematics and its Applications, vol.\u00a020. Cambridge University Press, Cambridge (1997)","edition":"2"},{"key":"11_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"203","DOI":"10.1007\/978-3-540-88403-3_14","volume-title":"Post-Quantum Cryptography","author":"M.S.E. Mohamed","year":"2008","unstructured":"Mohamed, M.S.E., Mohamed, W.S.A.E., Ding, J., Buchmann, J.: MXL2: Solving Polynomial Equations over GF(2) Using an Improved Mutant Strategy. In: Buchmann, J., Ding, J. (eds.) PQCrypto 2008. LNCS, vol.\u00a05299, pp. 203\u2013215. Springer, Heidelberg (2008)"},{"key":"11_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"392","DOI":"10.1007\/3-540-45539-6_27","volume-title":"Advances in Cryptology - EUROCRYPT 2000","author":"N.T. Courtois","year":"2000","unstructured":"Courtois, N.T., Klimov, A., Patarin, J., Shamir, A.: Efficient Algorithms for Solving Overdefined Systems of Multivariate Polynomial Equations. In: Preneel, B. (ed.) EUROCRYPT 2000. LNCS, vol.\u00a01807, pp. 392\u2013407. Springer, Heidelberg (2000)"},{"key":"11_CR12","unstructured":"Ding, J.: Mutants and its Impact on Polynomial Solving Strategies and Algorithms. Privately distributed research note, University of Cincinnati and Technical University of Darmstadt (2006)"},{"key":"11_CR13","unstructured":"Ding, J., Cabarcas, D., Schmidt, D., Buchmann, J., Tohaneanu, S.: Mutant Gr\u00f6bner Basis Algorithm. In: Proceedings of the 1st International Conference on Symbolic Computation and Cryptography (SCC 2008), Beijing, China, pp. 23\u201332. LMIB (2008)"},{"key":"11_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"87","DOI":"10.1007\/978-3-642-14423-3_7","volume-title":"ICISC 2009","author":"M.S.E. Mohamed","year":"2010","unstructured":"Mohamed, M.S.E., Cabarcas, D., Ding, J., Buchmann, J., Bulygin, S.: MXL3: An Efficient Algorithm for Computing Gr\u00f6bner Bases of Zero-dimensional Ideals. In: Lee, D., Hong, S. (eds.) ICISC 2009. LNCS, vol.\u00a05984, pp. 87\u2013100. Springer, Heidelberg (2010)"},{"key":"11_CR15","unstructured":"Albrecht, M., Bard, G.: The M4RI Library\u2013 Linear Algebra over GF(2) (2008), \n                    \n                      http:\/\/m4ri.sagemath.org"},{"key":"11_CR16","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-88757-9","volume-title":"Algebraic Cryptanalysis","author":"G.V. Bard","year":"2009","unstructured":"Bard, G.V.: Algebraic Cryptanalysis. Springer Publishing Company, Incorporated, Heidelberg (2009)"},{"key":"11_CR17","unstructured":"Wolf, C.: Efficient Public Key Generation for HFE and Variations. In: Dawson, E., Klemm, W. (eds.) Cryptographic Algorithms and their Uses, Queensland University of Technology, pp. 78\u201393 (2004)"},{"key":"11_CR18","doi-asserted-by":"publisher","first-page":"263","DOI":"10.1007\/978-3-540-93806-4_15","volume-title":"Gr\u00f6bner Bases, Coding, and Cryptography","author":"O. Billet","year":"2009","unstructured":"Billet, O., Ding, J.: Overview of Cryptanalysis Techniques in Multivariate Public Key Cryptography. In: Sala, M., et al. (eds.) Gr\u00f6bner Bases, Coding, and Cryptography, pp. 263\u2013284. Springer, Heidelberg (2009)"}],"container-title":["Lecture Notes in Computer Science","Cryptology and Network Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-17619-7_11","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,3,22]],"date-time":"2019-03-22T14:23:25Z","timestamp":1553264605000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-17619-7_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642176180","9783642176197"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-17619-7_11","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2010]]}}}