{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,21]],"date-time":"2025-04-21T09:43:01Z","timestamp":1745228581489},"publisher-location":"Berlin, Heidelberg","reference-count":33,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642176180"},{"type":"electronic","value":"9783642176197"}],"license":[{"start":{"date-parts":[[2010,1,1]],"date-time":"2010-01-01T00:00:00Z","timestamp":1262304000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-17619-7_13","type":"book-chapter","created":{"date-parts":[[2010,11,30]],"date-time":"2010-11-30T06:45:07Z","timestamp":1291099507000},"page":"169-183","source":"Crossref","is-referenced-by-count":8,"title":["Analysis of the MQQ Public Key Cryptosystem"],"prefix":"10.1007","author":[{"given":"Jean-Charles","family":"Faug\u00e8re","sequence":"first","affiliation":[]},{"given":"Rune Steinsmo","family":"\u00d8deg\u00e5rd","sequence":"additional","affiliation":[]},{"given":"Ludovic","family":"Perret","sequence":"additional","affiliation":[]},{"given":"Danilo","family":"Gligoroski","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"unstructured":"Bardet, M.: \u00c9tude des syst\u00e8mes alg\u00e9briques surd\u00e9termin\u00e9s. Applications aux codes correcteurs et \u00e0 la cryptographie. PhD thesis, Universit\u00e9 de Paris VI (2004)","key":"13_CR1"},{"unstructured":"Bardet, M., Faug\u00e8re, J.-C., Salvy, B.: Complexity study of Gr\u00f6bner basis computation. Technical report, INRIA (2002), \n                    \n                      http:\/\/www.inria.fr\/rrrt\/rr-5049.html","key":"13_CR2"},{"unstructured":"Bardet, M., Faug\u00e8re, J.-C., Salvy, B.: Complexity of Gr\u00f6bner basis computation for semi-regular overdetermined sequences over F2 with solutions in F2. Technical report, Institut national de recherche en informatique et en automatique (2003)","key":"13_CR3"},{"unstructured":"Bardet, M., Faug\u00e8re, J.-C., Salvy, B.: On the complexity of Gr\u00f6bner basis computation of semi-regular overdetermined algebraic equations. In: Proc. International Conference on Polynomial System Solving (ICPSS), pp. 71\u201375 (2004)","key":"13_CR4"},{"unstructured":"Bardet, M., Faug\u00e8re, J.-C., Salvy, B., Yang, B.-Y.: Asymptotic behaviour of the degree of regularity of semi-regular polynomial systems. In: Proc. of MEGA 2005, Eighth International Symposium on Effective Methods in Algebraic Geometry (2005)","key":"13_CR5"},{"key":"13_CR6","doi-asserted-by":"publisher","first-page":"263","DOI":"10.1007\/978-3-540-93806-4_15","volume-title":"Gr\u00f6bner Bases, Coding and Cryptography","author":"O. Billet","year":"2009","unstructured":"Billet, O., Ding, J.: Overview of cryptanalysis techniques in multivariate public key cryptography. In: Sala, M., Mora, T., Perret, L., Sakata, S., Traverso, C. (eds.) Gr\u00f6bner Bases, Coding and Cryptography, pp. 263\u2013283. Springer, Heidelberg (2009)"},{"unstructured":"Bouillaguet, C., Fouque, P.-A., Joux, A., Treger, J.: A family of weak keys in hfe (and the corresponding practical key-recovery). Cryptology ePrint Archive, Report 2009\/619 (2009)","key":"13_CR7"},{"unstructured":"Buchberger, B.: Ein Algorithmus zum Auffinden der Basiselemente des Restklassenringes nach einem nulldimensionalen Polynomideal. PhD thesis, Leopold-Franzens University (1965)","key":"13_CR8"},{"unstructured":"Chen, Y., Knapskog, S.J., Gligoroski, D.: Multivariate Quadratic Quasigroups (MQQ): Construction, Bounds and Complexity. Submitted to ISIT 2010 (2010)","key":"13_CR9"},{"key":"13_CR10","volume-title":"Using Algebraix Geometry","author":"D. Cox","year":"2005","unstructured":"Cox, D., Little, J., O\u2019Shea, D.: Using Algebraix Geometry. Springer, Heidelberg (2005)"},{"key":"13_CR11","first-page":"263","volume-title":"Gr\u00f6bner Bases, Coding and Cryptography","author":"F. Levy dit Vehel","year":"2009","unstructured":"Levy dit Vehel, F., Marinari, M.G., Perret, L., Traverso, C.: A survey on polly cracker system. In: Sala, M., Mora, T., Perret, L., Sakata, S., Traverso, C. (eds.) Gr\u00f6bner Bases, Coding and Cryptography, pp. 263\u2013283. Springer, Heidelberg (2009)"},{"issue":"2","key":"13_CR12","doi-asserted-by":"publisher","first-page":"139","DOI":"10.1007\/s002000050099","volume":"9","author":"H. Dobbertin","year":"1998","unstructured":"Dobbertin, H.: One-to-one highly nonlinear power functions on GF(2\n                    \n                      \n                    \n                    $^{\\mbox{n}}$\n                  ). Appl. Algebra Eng. Commun. Comput.\u00a09(2), 139\u2013152 (1998)","journal-title":"Appl. Algebra Eng. Commun. Comput."},{"issue":"1-3","key":"13_CR13","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1016\/S0022-4049(99)00005-5","volume":"139","author":"J.-C. Faug\u00e8re","year":"1999","unstructured":"Faug\u00e8re, J.-C.: A new efficient algorithm for computing Gr\u00f6bner bases \n                    \n                      \n                    \n                    $({F}\\sb 4)$\n                  . Journal of Pure and Applied Algebra\u00a0139(1-3), 61\u201388 (1999)","journal-title":"Journal of Pure and Applied Algebra"},{"key":"13_CR14","volume-title":"Proceedings of the 2002 International Symposium on Symbolic and Algebraic Computation","author":"J.-C. Faug\u00e8re","year":"2002","unstructured":"Faug\u00e8re, J.-C.: A new efficient algorithm for computing Gr\u00f6bner bases without reduction to zero \n                    \n                      \n                    \n                    $({F}\\sb 5)$\n                  . In: Proceedings of the 2002 International Symposium on Symbolic and Algebraic Computation. ACM, New York (2002)"},{"key":"13_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"44","DOI":"10.1007\/978-3-540-45146-4_3","volume-title":"Advances in Cryptology - CRYPTO 2003","author":"J.-C. Faug\u00e8re","year":"2003","unstructured":"Faug\u00e8re, J.-C., Joux, A.: Algebraic cryptanalysis of Hidden Field Equation (HFE) cryptosystems using Gr\u00f6bner bases. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol.\u00a02729, pp. 44\u201360. Springer, Heidelberg (2003)"},{"key":"13_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1007\/978-3-540-78967-3_2","volume-title":"EUROCRYPT 2008","author":"P.-A. Fouque","year":"2008","unstructured":"Fouque, P.-A., Macario-Rat, G., Stern, J.: Key recovery on hidden monomial multivariate schemes. In: Smart, N.P. (ed.) EUROCRYPT 2008. LNCS, vol.\u00a04965, pp. 19\u201330. Springer, Heidelberg (2008)"},{"key":"13_CR17","first-page":"44","volume-title":"Proceedings of the American Conference on Applied Mathematics, MATH 2008","author":"D. Gligoroski","year":"2008","unstructured":"Gligoroski, D., Markovski, S., Knapskog, S.J.: Multivariate quadratic trapdoor functions based on multivariate quadratic quasigroups. In: Proceedings of the American Conference on Applied Mathematics, MATH 2008, Stevens Point, Wisconsin, USA, pp. 44\u201349. World Scientific and Engineering Academy and Society (WSEAS), Singapore (2008)"},{"key":"13_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"44","DOI":"10.1007\/3-540-44448-3_4","volume-title":"Advances in Cryptology - ASIACRYPT 2000","author":"L. Goubin","year":"2000","unstructured":"Goubin, L., Courtois, N.T., Cp, S.: Cryptanalysis of the TTM cryptosystem. In: Okamoto, T. (ed.) ASIACRYPT 2000. LNCS, vol.\u00a01976, pp. 44\u201357. Springer, Heidelberg (2000)"},{"key":"13_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"345","DOI":"10.1007\/11818175_20","volume-title":"CRYPTO 2006","author":"L. Granboulan","year":"2006","unstructured":"Granboulan, L., Joux, A., Stern, J.: Inverting HFE is quasipolynomial. In: Dwork, C. (ed.) CRYPTO 2006. LNCS, vol.\u00a04117, pp. 345\u2013356. Springer, Heidelberg (2006)"},{"key":"13_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"206","DOI":"10.1007\/3-540-48910-X_15","volume-title":"Advances in Cryptology - EUROCRYPT \u201999","author":"A. Kipnis","year":"1999","unstructured":"Kipnis, A., Hotzvim, H.S.H., Patarin, J., Goubin, L.: Unbalanced oil and vinegar signature schemes. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol.\u00a01592, pp. 206\u2013222. Springer, Heidelberg (1999)"},{"key":"13_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"257","DOI":"10.1007\/BFb0055733","volume-title":"CRYPTO \u201998","author":"A. Kipnis","year":"1998","unstructured":"Kipnis, A., Shamir, A.: Cryptanalysis of the oil & vinegar signature scheme. In: Krawczyk, H. (ed.) CRYPTO 1998. LNCS, vol.\u00a01462, pp. 257\u2013266. Springer, Heidelberg (1998)"},{"unstructured":"MAGMA. High performance software for algebra, number theory, and geometry \u2014 a large commercial software package, \n                    \n                      http:\/\/magma.maths.usyd.edu.au","key":"13_CR22"},{"unstructured":"Markovski, S.: Quasigroup string processing and applications in cryptography. In: Proc. 1st Inter. Conf. Mathematics and Informatics for Industry MII 2003, Thessaloniki, April 14-16, pp. 278\u2013290 (2003)","key":"13_CR23"},{"unstructured":"Markovski, S., Gligoroski, D., Bakeva, V.: Quasigroup string processing. In: Part 1, Contributions, Sec. Math. Tech. Sci., MANU, XX, pp. 1\u20132 (1999)","key":"13_CR24"},{"key":"13_CR25","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"419","DOI":"10.1007\/3-540-45961-8_39","volume-title":"EUROCRYPT \u201988","author":"T. Matsumoto","year":"1988","unstructured":"Matsumoto, T., Imai, H.: Public quadratic polynomial-tuples for efficient signature-verification and message-encryption. In: G\u00fcnther, C.G. (ed.) EUROCRYPT 1988. LNCS, vol.\u00a0330, pp. 419\u2013453. Springer, Heidelberg (1988)"},{"key":"13_CR26","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"392","DOI":"10.1007\/978-3-642-10433-6_26","volume-title":"Cryptology and Network Security","author":"M.S. Mohamed","year":"2009","unstructured":"Mohamed, M.S., Ding, J., Buchmann, J., Werner, F.: Algebraic attack on the MQQ public key cryptosystem. In: Garay, J.A., Miyaji, A., Otsuka, A. (eds.) CANS 2009. LNCS, vol.\u00a05888, pp. 392\u2013401. Springer, Heidelberg (2009)"},{"key":"13_CR27","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"248","DOI":"10.1007\/3-540-44750-4_20","volume-title":"Advances in Cryptology - CRYPTO \u201995","author":"J. Patarin","year":"1995","unstructured":"Patarin, J.: Cryptanalysis of the Matsumoto and Imai public key scheme of Eurocrypt 1988. In: Coppersmith, D. (ed.) CRYPTO 1995. LNCS, vol.\u00a0963, pp. 248\u2013261. Springer, Heidelberg (1995)"},{"key":"13_CR28","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1007\/3-540-68339-9_4","volume-title":"Advances in Cryptology - EUROCRYPT \u201996","author":"J. Patarin","year":"1996","unstructured":"Patarin, J.: Hidden field equations (hfe) and isomorphisms of polynomials (ip): two new families of asymmetric algorithms. In: Maurer, U.M. (ed.) EUROCRYPT 1996. LNCS, vol.\u00a01070, pp. 33\u201348. Springer, Heidelberg (1996)"},{"unstructured":"Patarin, J.: The oil & vinegar signature scheme (1997)","key":"13_CR29"},{"key":"13_CR30","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"35","DOI":"10.1007\/3-540-49649-1_4","volume-title":"ASIACRYPT\u201998","author":"J. Patarin","year":"1998","unstructured":"Patarin, J., Goubin, L., Courtois, N.T.: C*\u2009\u2212\u2009+ and HM: Variations around two schemes of T. Matsumoto and H. Imai. In: Ohta, K., Pei, D. (eds.) ASIACRYPT 1998. LNCS, vol.\u00a01514, pp. 35\u201349. Springer, Heidelberg (1998)"},{"key":"13_CR31","series-title":"Lecture Notes in Computer Science","first-page":"1","volume-title":"CRYPTO \u201993","author":"A. Shamir","year":"1994","unstructured":"Shamir, A.: Efficient signature schemes based on birational permutations. In: Stinson, D.R. (ed.) CRYPTO 1993. LNCS, vol.\u00a0773, pp. 1\u201312. Springer, Heidelberg (1994)"},{"key":"13_CR32","volume-title":"An introduction to quasigroups and their representations","author":"J.D.H. Smith","year":"2007","unstructured":"Smith, J.D.H.: An introduction to quasigroups and their representations. Chapman & Hall\/CRC, Boca Raton (2007)"},{"unstructured":"Wolf, C., Preneel, B.: Taxonomy of public key schemes based on the problem of multivariate quadratic equations. Cryptology ePrint Archive, Report 2005\/077 (2005)","key":"13_CR33"}],"container-title":["Lecture Notes in Computer Science","Cryptology and Network Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-17619-7_13","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,3,22]],"date-time":"2019-03-22T09:02:20Z","timestamp":1553245340000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-17619-7_13"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642176180","9783642176197"],"references-count":33,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-17619-7_13","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2010]]}}}