{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,1]],"date-time":"2026-05-01T16:33:19Z","timestamp":1777653199722,"version":"3.51.4"},"publisher-location":"Berlin, Heidelberg","reference-count":14,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783642254048","type":"print"},{"value":"9783642254055","type":"electronic"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-25405-5_15","type":"book-chapter","created":{"date-parts":[[2011,11,24]],"date-time":"2011-11-24T06:32:34Z","timestamp":1322116354000},"page":"228-243","source":"Crossref","is-referenced-by-count":23,"title":["High-Speed Hardware Implementation of Rainbow Signature on FPGAs"],"prefix":"10.1007","author":[{"given":"Shaohua","family":"Tang","sequence":"first","affiliation":[]},{"given":"Haibo","family":"Yi","sequence":"additional","affiliation":[]},{"given":"Jintai","family":"Ding","sequence":"additional","affiliation":[]},{"given":"Huan","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Guomin","family":"Chen","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"2","key":"15_CR1","doi-asserted-by":"publisher","first-page":"303","DOI":"10.1137\/S0036144598347011","volume":"41","author":"P.W. Shor","year":"1999","unstructured":"Shor, P.W.: Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer. SIAM Review\u00a041(2), 303\u2013332 (1999)","journal-title":"SIAM Review"},{"key":"15_CR2","volume-title":"Advances in Information Security","author":"J. Ding","year":"2006","unstructured":"Ding, J., Schmidt, D.: Multivariate public key cryptosystems. In: Advances in Information Security, vol.\u00a025, Springer, Heidelberg (2006)"},{"key":"15_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"164","DOI":"10.1007\/11496137_12","volume-title":"Applied Cryptography and Network Security","author":"J. Ding","year":"2005","unstructured":"Ding, J., Schmidt, D.: Rainbow, a New Multivariable Polynomial Signature Scheme. In: Ioannidis, J., Keromytis, A.D., Yung, M. (eds.) ACNS 2005. LNCS, vol.\u00a03531, pp. 164\u2013175. Springer, Heidelberg (2005)"},{"key":"15_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"371","DOI":"10.1007\/978-3-540-28632-5_27","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2004","author":"B.-Y. Yang","year":"2004","unstructured":"Yang, B.-Y., Chen, J.-M., Chen, Y.-H.: TTS: High-Speed Signatures on a Low-Cost Smart Card. In: Joye, M., Quisquater, J.-J. (eds.) CHES 2004. LNCS, vol.\u00a03156, pp. 371\u2013385. Springer, Heidelberg (2004)"},{"key":"15_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"73","DOI":"10.1007\/11734666_7","volume-title":"Security in Pervasive Computing","author":"B.-Y. Yang","year":"2006","unstructured":"Yang, B.-Y., Cheng, C.-M., Chen, B.-R., Chen, J.-M.: Implementing Minimized Multivariate PKC on Low-Resource Embedded Systems. In: Clark, J.A., Paige, R.F., Polack, F.A.C., Brooke, P.J. (eds.) SPC 2006. LNCS, vol.\u00a03934, pp. 73\u201388. Springer, Heidelberg (2006)"},{"key":"15_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"95","DOI":"10.1007\/978-3-540-88403-3_7","volume-title":"Post-Quantum Cryptography","author":"A.I.-T. Chen","year":"2008","unstructured":"Chen, A.I.-T., Chen, C.-H.O., Chen, M.-S., Cheng, C.-M., Yang, B.-Y.: Practical-Sized Instances of Multivariate PKCs: Rainbow, TTS, and \u2113IC-derivatives. In: Buchmann, J., Ding, J. (eds.) PQCrypto 2008. LNCS, vol.\u00a05299, pp. 95\u2013108. Springer, Heidelberg (2008)"},{"key":"15_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1007\/978-3-642-04138-9_3","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2009","author":"A.I.-T. Chen","year":"2009","unstructured":"Chen, A.I.-T., Chen, M.-S., Chen, T.-R., Cheng, C.-M., Ding, J., Kuo, E.L.-H., Lee, F.Y.-S., Yang, B.-Y.: SSE Implementation of Multivariate PKCs on Modern X86 CPUs. In: Clavier, C., Gaj, K. (eds.) CHES 2009. LNCS, vol.\u00a05747, pp. 33\u201348. Springer, Heidelberg (2009)"},{"key":"15_CR8","doi-asserted-by":"crossref","unstructured":"Balasubramanian, S., Bogdanov, A., Rupp, A., Ding, J., Carter, H.W.: Fast multivariate signature generation in hardware: The case of Rainbow. In: 16th International Symposium on Field-Programmable Custom Computing Machines, pp. 281\u2013282 (April 2008)","DOI":"10.1109\/FCCM.2008.52"},{"key":"15_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1007\/978-3-540-85053-3_4","volume-title":"Cryptographic Hardware and Embedded Systems \u2013 CHES 2008","author":"A. Bogdanov","year":"2008","unstructured":"Bogdanov, A., Eisenbarth, T., Rupp, A., Wolf, C.: Time-Area Optimized Public-Key Engines: \n                  \n                    \n                  \n                  $\\mathcal{MQ}$\n                -Cryptosystems as Replacement for Elliptic Curves? In: Oswald, E., Rohatgi, P. (eds.) CHES 2008. LNCS, vol.\u00a05154, pp. 45\u201361. Springer, Heidelberg (2008)"},{"key":"15_CR10","series-title":"Lecture Notes in Computer Science","volume-title":"Applied Algebra, Algebraic Algorithms and Error-Correcting Codes","author":"E. Mastrovito","year":"1989","unstructured":"Mastrovito, E.: VLSI Designs for Multiplication over Finite Fields GF(2\n                  m\n                ). In: Huguet, L., Poli, A. (eds.) AAECC 1987. LNCS, vol.\u00a0356, Springer, Heidelberg (1989)"},{"key":"15_CR11","doi-asserted-by":"crossref","unstructured":"Bogdanov, A., Mertens, M.C., Paar, C., Pelzl, J., Rupp, A.: A parallel hardware architecture for fast Gaussian elimination over GF(2). In: 14th Annual IEEE Symposium on Field-Programmable Custom Computing Machines, pp. 237\u2013248. IEEE (2006)","DOI":"10.1109\/FCCM.2006.12"},{"issue":"9","key":"15_CR12","doi-asserted-by":"publisher","first-page":"1141","DOI":"10.1109\/12.241603","volume":"42","author":"C.-L. Wang","year":"1993","unstructured":"Wang, C.-L., Lin, J.-L.: A systolic architecture for computing inverses and divisions in finite fields GF(2\n                  m\n                ). IEEE Transactions on Computers\u00a042(9), 1141\u20131146 (1993)","journal-title":"IEEE Transactions on Computers"},{"issue":"9","key":"15_CR13","doi-asserted-by":"publisher","first-page":"1321","DOI":"10.1109\/12.29471","volume":"38","author":"B. Hochet","year":"1989","unstructured":"Hochet, B., Quinton, P., Robert, Y.: Systolic Gaussian elimination over GF(p) with partial pivoting. IEEE Transactions on Computers\u00a038(9), 1321\u20131324 (1989)","journal-title":"IEEE Transactions on Computers"},{"key":"15_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"242","DOI":"10.1007\/978-3-540-68914-0_15","volume-title":"Applied Cryptography and Network Security","author":"J. Ding","year":"2008","unstructured":"Ding, J., Yang, B.-Y., Chen, C.-H.O., Chen, M.-S., Cheng, C.-M.: New Differential-Algebraic Attacks and Reparametrization of Rainbow. In: Bellovin, S.M., Gennaro, R., Keromytis, A.D., Yung, M. (eds.) ACNS 2008. LNCS, vol.\u00a05037, pp. 242\u2013257. Springer, Heidelberg (2008)"}],"container-title":["Lecture Notes in Computer Science","Post-Quantum Cryptography"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-25405-5_15","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,4,19]],"date-time":"2019-04-19T13:41:07Z","timestamp":1555681267000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-25405-5_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642254048","9783642254055"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-25405-5_15","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2011]]}}}