{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T02:42:00Z","timestamp":1743129720614,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":23,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642254048"},{"type":"electronic","value":"9783642254055"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-25405-5_18","type":"book-chapter","created":{"date-parts":[[2011,11,24]],"date-time":"2011-11-24T06:32:34Z","timestamp":1322116354000},"page":"275-294","source":"Crossref","is-referenced-by-count":2,"title":["A Security Analysis of Uniformly-Layered Rainbow"],"prefix":"10.1007","author":[{"given":"Takanori","family":"Yasuda","sequence":"first","affiliation":[]},{"given":"Kouichi","family":"Sakurai","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"3-4","key":"18_CR1","doi-asserted-by":"publisher","first-page":"287","DOI":"10.4310\/MRL.1999.v6.n3.a3","volume":"6","author":"I. Anshel","year":"1999","unstructured":"Anshel, I., Anshel, M., Goldfeld, D.: An Algebraic Method for Public-Kkey Cryptography. Math. Res. Lett.\u00a06(3-4), 287\u2013291 (1999)","journal-title":"Math. Res. Lett."},{"key":"18_CR2","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1090\/S0025-5718-1987-0866095-8","volume":"48","author":"L.M. Adleman","year":"1987","unstructured":"Adleman, L.M., Estes, D.R., McCurley, K.S.: Solving bivariate quadratic congruences in random polynomial time. Math. Comput.\u00a048, 17\u201328 (1987)","journal-title":"Math. Comput."},{"key":"18_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"336","DOI":"10.1007\/11832072_23","volume-title":"Security and Cryptography for Networks","author":"O. Billet","year":"2006","unstructured":"Billet, O., Gilbert, H.: Cryptanalysis of Rainbow. In: De Prisco, R., Yung, M. (eds.) SCN 2006. LNCS, vol.\u00a04116, pp. 336\u2013347. Springer, Heidelberg (2006)"},{"key":"18_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"305","DOI":"10.1007\/3-540-48405-1_19","volume-title":"Advances in Cryptology - CRYPTO \u201999","author":"D. Coppersmith","year":"1999","unstructured":"Coppersmith, D.: Weakness in Quaternion Signatures. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol.\u00a01666, pp. 305\u2013314. Springer, Heidelberg (1999)"},{"key":"18_CR5","doi-asserted-by":"publisher","first-page":"207","DOI":"10.1007\/s001459900028","volume":"10","author":"D. Coppersmith","year":"1997","unstructured":"Coppersmith, D., Stern, J., Vaudenay, S.: The security of the birational permutation signature scheme. J. Cryptology\u00a010, 207\u2013221 (1997)","journal-title":"J. Cryptology"},{"key":"18_CR6","unstructured":"Ding, J., Gower, J.E., Schmidt, D.S.: Multivariate Public Key Cryptosystems. In: Advances in Information Security, vol.\u00a025 (2006)"},{"key":"18_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"164","DOI":"10.1007\/11496137_12","volume-title":"Applied Cryptography and Network Security","author":"J. Ding","year":"2005","unstructured":"Ding, J., Schmidt, D.: Rainbow, a New Multivariable Polynomial Signature Scheme. In: Ioannidis, J., Keromytis, A.D., Yung, M. (eds.) ACNS 2005. LNCS, vol.\u00a03531, pp. 164\u2013175. Springer, Heidelberg (2005)"},{"key":"18_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"242","DOI":"10.1007\/978-3-540-68914-0_15","volume-title":"Applied Cryptography and Network Security","author":"J. Ding","year":"2008","unstructured":"Ding, J., Yang, B.-Y., Chen, C.-H.O., Chen, M.-S., Cheng, C.-M.: New Differential-Algebraic Attacks and Reparametrization of Rainbow. In: Bellovin, S.M., Gennaro, R., Keromytis, A.D., Yung, M. (eds.) ACNS 2008. LNCS, vol.\u00a05037, pp. 242\u2013257. Springer, Heidelberg (2008)"},{"key":"18_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"44","DOI":"10.1007\/3-540-44448-3_4","volume-title":"Advances in Cryptology - ASIACRYPT 2000","author":"L. Goubin","year":"2000","unstructured":"Goubin, L., Courtois, N.T.: Cryptanalysis of the TTM Cryptosystem. In: Okamoto, T. (ed.) ASIACRYPT 2000. LNCS, vol.\u00a01976, pp. 44\u201357. Springer, Heidelberg (2000)"},{"key":"18_CR10","unstructured":"Hashimoto, Y., Sakurai, K.: On construction of signature schemes based on birational permutations over noncommutative. Presented at the 1st International Conference on Symbolic Computation and Cryptography (SCC 2008), held in Beijing (April 2008). ePrint \n                  \n                    http:\/\/eprint.iacr.org\/2008\/340"},{"key":"18_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"166","DOI":"10.1007\/3-540-44598-6_10","volume-title":"Advances in Cryptology - CRYPTO 2000","author":"K.H. Ko","year":"2000","unstructured":"Ko, K.H., Lee, S.-J., Cheon, J.H., Han, J.W., Kang, J.-S., Park, C.-S.: New Public-Key Cryptosystem Using Braid Groups. In: Bellare, M. (ed.) CRYPTO 2000. LNCS, vol.\u00a01880, pp. 166\u2013183. Springer, Heidelberg (2000)"},{"key":"18_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"206","DOI":"10.1007\/3-540-48910-X_15","volume-title":"Advances in Cryptology - EUROCRYPT \u201999","author":"A. Kipnis","year":"1999","unstructured":"Kipnis, A., Patarin, J., Goubin, L.: Unbalanced Oil and Vinegar Sschemes. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol.\u00a01592, pp. 206\u2013222. Springer, Heidelberg (1999)"},{"key":"18_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"257","DOI":"10.1007\/BFb0055733","volume-title":"Advances in Cryptology - CRYPTO \u201998","author":"A. Kipnis","year":"1998","unstructured":"Kipnis, A., Shamir, A.: Cryptanalysis of the Oil & Vinegar Signature Scheme. In: Krawczyk, H. (ed.) CRYPTO 1998. LNCS, vol.\u00a01462, pp. 257\u2013266. Springer, Heidelberg (1998)"},{"key":"18_CR14","doi-asserted-by":"crossref","unstructured":"Ong, H., Schnorr, C.P., Shamir, A.: An efficient signature scheme based on quadratic equations. In: Proc. 16th ACM Symp. Theory Comp., pp. 208\u2013216 (1984)","DOI":"10.1145\/800057.808683"},{"key":"18_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"248","DOI":"10.1007\/3-540-44750-4_20","volume-title":"Advances in Cryptology - CRYPTO \u201995","author":"J. Patarin","year":"1995","unstructured":"Patarin, J.: Cryptanalysis of the Matsumoto and Imai Public Key Scheme of Eurocrypt 1988. In: Coppersmith, D. (ed.) CRYPTO 1995. LNCS, vol.\u00a0963, pp. 248\u2013261. Springer, Heidelberg (1995)"},{"key":"18_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"218","DOI":"10.1007\/978-3-642-12929-2_16","volume-title":"Post-Quantum Cryptography","author":"A. Petzoldt","year":"2010","unstructured":"Petzoldt, A., Bulygin, S., Buchmann, J.: Selecting Parameters for the Rainbow Signature Scheme. In: Sendrier, N. (ed.) PQCrypto 2010. LNCS, vol.\u00a06061, pp. 218\u2013240. Springer, Heidelberg (2010)"},{"key":"18_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1007\/978-3-642-17401-8_4","volume-title":"Progress in Cryptology - INDOCRYPT 2010","author":"A. Petzoldt","year":"2010","unstructured":"Petzoldt, A., Bulygin, S., Buchmann, J.: CyclicRainbow \u2013 A Multivariate Signature Scheme with a Partially cyclic Public Key. In: Gong, G., Gupta, K.C. (eds.) INDOCRYPT 2010. LNCS, vol.\u00a06498, pp. 33\u201348. Springer, Heidelberg (2010)"},{"key":"18_CR18","doi-asserted-by":"publisher","first-page":"702","DOI":"10.1109\/TIT.1987.1057350","volume":"IT-33","author":"J.M. Pollard","year":"1987","unstructured":"Pollard, J.M., Schnorr, C.P.: An efficient solution of the congruence x\n                2\u2009+\u2009ky\n                2\u2009\u2261m (mod n). IEEE Trans. Inf. Theory\u00a0IT-33, 702\u2013709 (1987)","journal-title":"IEEE Trans. Inf. Theory"},{"key":"18_CR19","unstructured":"Rai, T.S.: Infinite Gr\u00f6bner bases and Noncommutative Polly Cracker Cryptosystems. PhD Thesis, Virginia Polytechnique Institute and State Univ. (2004)"},{"key":"18_CR20","first-page":"702","volume":"E80-A","author":"T. Satoh","year":"1997","unstructured":"Satoh, T., Araki, K.: On construction of signature scheme over a certain noncommutative ring. IEICE Trans. Fundamentals\u00a0E80-A, 702\u2013709 (1997)","journal-title":"IEICE Trans. Fundamentals"},{"key":"18_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/3-540-48329-2_1","volume-title":"Advances in Cryptology - CRYPTO \u201993","author":"A. Shamir","year":"1994","unstructured":"Shamir, A.: Efficient Signature Schemes Based on Birational Permutations. In: Stinson, D.R. (ed.) CRYPTO 1993. LNCS, vol.\u00a0773, pp. 1\u201312. Springer, Heidelberg (1994)"},{"key":"18_CR22","doi-asserted-by":"publisher","first-page":"85","DOI":"10.14495\/jsiaml.2.85","volume":"2","author":"S. Uchiyama","year":"2010","unstructured":"Uchiyama, S., Ogura, N.: Cryptanalysis of the Birational Permutation Signature Scheme over a Non-commutative Ring. JSIAM Lett.ers\u00a02, 85\u201388 (2010), \n                  \n                    http:\/\/eprint.iacr.org\/2009\/245","journal-title":"JSIAM Lett.ers"},{"key":"18_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"518","DOI":"10.1007\/11506157_43","volume-title":"Information Security and Privacy","author":"B.-Y. Yang","year":"2005","unstructured":"Yang, B.-Y., Chen, J.-M.: Building Secure Tame-Like Multivariate Public-Key Cryptosystems: The New TTS. In: Boyd, C., Gonz\u00e1lez Nieto, J.M. (eds.) ACISP 2005. LNCS, vol.\u00a03574, pp. 518\u2013531. Springer, Heidelberg (2005)"}],"container-title":["Lecture Notes in Computer Science","Post-Quantum Cryptography"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-25405-5_18","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,1,8]],"date-time":"2020-01-08T14:01:09Z","timestamp":1578492069000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-25405-5_18"}},"subtitle":["Revisiting Sato-Araki\u2019s Non-commutative Approach to Ong-Schnorr-Shamir Signature towards PostQuantum Paradigm"],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642254048","9783642254055"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-25405-5_18","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2011]]}}}