{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,5]],"date-time":"2025-10-05T04:30:53Z","timestamp":1759638653550},"reference-count":8,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2003,11,1]],"date-time":"2003-11-01T00:00:00Z","timestamp":1067644800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IJIS"],"published-print":{"date-parts":[[2003,11]]},"DOI":"10.1007\/s10207-003-0025-5","type":"journal-article","created":{"date-parts":[[2003,12,11]],"date-time":"2003-12-11T00:44:12Z","timestamp":1071103452000},"page":"59-64","source":"Crossref","is-referenced-by-count":15,"title":["An attack on the isomorphisms of polynomials problem with one secret"],"prefix":"10.1007","volume":"2","author":[{"given":"Willi","family":"Geiselmann","sequence":"first","affiliation":[]},{"given":"Willi","family":"Meier","sequence":"additional","affiliation":[]},{"given":"Rainer","family":"Steinwandt","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2003,11,1]]},"reference":[{"key":"25_CRBeWe93","doi-asserted-by":"crossref","unstructured":"Becker T, Weispfenning V (1993) Gr\u00f6bner Bases: a computational approach to commutative algebra. In: Graduate texts in mathematics, vol 141. Springer, Berlin Heidelberg New York. (In cooperation with Heinz Kredel)","DOI":"10.1007\/978-1-4612-0913-3"},{"key":"25_CRBoCaPl97","doi-asserted-by":"crossref","first-page":"235","DOI":"10.1006\/jsco.1996.0125","volume":"24","author":"Bosma","year":"1997","unstructured":"Bosma W, Cannon J, Playoust C (1997) The Magma algebra system. I: The user language. J Symb Comput 24:235\u2013265","journal-title":"J Symb Comput"},{"key":"25_CRMaIm88","doi-asserted-by":"crossref","unstructured":"Matsumoto T, Imai H (1988) Public quadratic polynomial-tuples for efficient signature-verification and message-encryption. In: G\u00fcnther CG (ed) Advances in Cryptology \u2013 EUROCRYPT \u201988; workshop on the theory and application of cryptographic techniques, Davos, Switzerland, May 1988. Lecture notes in computer science, vol 330. Springer, Berlin Heidelberg New York, pp 419\u2013453","DOI":"10.1007\/3-540-45961-8_39"},{"key":"25_CRPat96","doi-asserted-by":"crossref","unstructured":"Patarin J (1996a) Hidden fields equations (HFE) and isomorphisms of polynomials (IP): two new families of asymmetric algorithms. In: Maurer U (ed) Advances in Cryptology \u2013 EUROCRYPT \u201996, Zaragoza, Spain, May 1996. Lecture notes in computer science, vol 1070. Springer, Berlin Heidelberg New York, pp 33\u201348","DOI":"10.1007\/3-540-68339-9_4"},{"key":"25_CRPat96b","doi-asserted-by":"crossref","unstructured":"Patarin J (1996b) Hidden fields equations (HFE) and isomorphisms of polynomials (IP): two new families of asymmetric algorithms. Extended version of [4]. At the time of writing available at: http:\/\/www.minrank.org\/hfe.pdf","DOI":"10.1007\/3-540-68339-9_4"},{"key":"25_CRPGC98","doi-asserted-by":"crossref","unstructured":"Patarin J, Goubin L, Courtois N (1998a) Improved algorithms for isomorphisms of polynomials. In: Nyberg K (ed) Advances in Cryptology \u2013 EUROCRYPT \u201998, Helsinki, May\/June 1998. Lecture notes in computer science, vol 1403. Springer, Berlin Heidelberg New York, pp 184\u2013200","DOI":"10.1007\/BFb0054126"},{"key":"25_CRPGC98b","doi-asserted-by":"crossref","unstructured":"Patarin J, Goubin L, Courtois N (1998b) Improved algorithms for isomorphisms of polynomials. Extended version of [6]. At the time of writing available at: http:\/\/www.minrank.org\/ip6long.ps","DOI":"10.1007\/BFb0054126"},{"key":"25_CRSho97","doi-asserted-by":"crossref","first-page":"1484","DOI":"10.1137\/S0097539795293172","volume":"26","author":"Shor","year":"1997","unstructured":"Shor P (1997) Polynomial time algorithms for prime factorization and discrete logarithms on quantum computer. SIAM J Comput 26(5):1484\u20131509","journal-title":"SIAM J Comput"}],"container-title":["International Journal of Information Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-003-0025-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10207-003-0025-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-003-0025-5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,3,27]],"date-time":"2020-03-27T23:43:16Z","timestamp":1585352596000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10207-003-0025-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2003,11]]},"references-count":8,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2003,11]]}},"alternative-id":["25"],"URL":"https:\/\/doi.org\/10.1007\/s10207-003-0025-5","relation":{},"ISSN":["1615-5262","1615-5270"],"issn-type":[{"value":"1615-5262","type":"print"},{"value":"1615-5270","type":"electronic"}],"subject":[],"published":{"date-parts":[[2003,11]]}}}