{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,27]],"date-time":"2026-04-27T13:15:12Z","timestamp":1777295712089,"version":"3.51.4"},"reference-count":14,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2026,3,31]],"date-time":"2026-03-31T00:00:00Z","timestamp":1774915200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2026,3,31]],"date-time":"2026-03-31T00:00:00Z","timestamp":1774915200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/501100021856","name":"Ministero dell'Universit\u00e0 e della Ricerca","doi-asserted-by":"publisher","award":["P2022J4HRR"],"award-info":[{"award-number":["P2022J4HRR"]}],"id":[{"id":"10.13039\/501100021856","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100021856","name":"Ministero dell'Universit\u00e0 e della Ricerca","doi-asserted-by":"publisher","award":["2022RFAZCJ"],"award-info":[{"award-number":["2022RFAZCJ"]}],"id":[{"id":"10.13039\/501100021856","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Des. Codes Cryptogr."],"published-print":{"date-parts":[[2026,4]]},"DOI":"10.1007\/s10623-025-01793-8","type":"journal-article","created":{"date-parts":[[2026,3,31]],"date-time":"2026-03-31T11:31:05Z","timestamp":1774956665000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Cryptanalysis of a multivariate CCZ scheme"],"prefix":"10.1007","volume":"94","author":[{"given":"Alessio","family":"Caminata","sequence":"first","affiliation":[]},{"given":"Elisa","family":"Gorla","sequence":"additional","affiliation":[]},{"given":"Madison","family":"Mabe","sequence":"additional","affiliation":[]},{"given":"Martina","family":"Vigorito","sequence":"additional","affiliation":[]},{"given":"Irene","family":"Villa","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2026,3,31]]},"reference":[{"key":"1793_CR1","unstructured":"Beierle C., Felke P.: Not easy to prepare a Pesto: cryptanalysis of a multivariate public-key scheme from CCZ equivalence. Paper 2025\/1452 (2025)."},{"key":"1793_CR2","doi-asserted-by":"publisher","first-page":"235","DOI":"10.1006\/jsco.1996.0125","volume":"24","author":"W Bosma","year":"1997","unstructured":"Bosma W., Cannon J., Playoust C.: The Magma algebra system I: the user language. J. Symb. Comput. 24, 235\u2013265 (1997).","journal-title":"J. Symb. Comput."},{"key":"1793_CR3","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1007\/s00145-025-09544-7","volume":"38","author":"M Calderini","year":"2025","unstructured":"Calderini M., Caminata A., Villa I.: A new multivariate primitive from CCZ equivalence. J. Cryptol. 38, 25 (2025).","journal-title":"J. Cryptol."},{"key":"1793_CR4","doi-asserted-by":"crossref","unstructured":"Caminata A., Gorla E.: Solving multivariate polynomial systems and an invariant from commutative algebra. In: Arithmetic of Finite Fields. Lecture Notes in Computer Science, vol. 12542, pp. 3\u201336. Springer, Cham (2021).","DOI":"10.1007\/978-3-030-68869-1_1"},{"key":"1793_CR5","doi-asserted-by":"publisher","first-page":"322","DOI":"10.1016\/j.jsc.2022.05.001","volume":"114","author":"A Caminata","year":"2023","unstructured":"Caminata A., Gorla E.: Solving degree, last fall degree, and related invariants. J. Symb. Comput. 114, 322\u2013335 (2023).","journal-title":"J. Symb. Comput."},{"key":"1793_CR6","doi-asserted-by":"publisher","first-page":"209","DOI":"10.1016\/j.ffa.2018.11.008","volume":"56","author":"A Canteaut","year":"2019","unstructured":"Canteaut A., Perrin L.: On CCZ-equivalence, extended-affine equivalence, and function twisting. Finite Fields Appl. 56, 209\u2013246 (2019).","journal-title":"Finite Fields Appl."},{"key":"1793_CR7","doi-asserted-by":"publisher","first-page":"125","DOI":"10.1023\/A:1008344232130","volume":"15","author":"C Carlet","year":"1998","unstructured":"Carlet C., Charpin P., Zinoviev V.: Codes, bent functions and permutations suitable for DES-like cryptosystems. Des. Codes Cryptogr. 15, 125\u2013156 (1998).","journal-title":"Des. Codes Cryptogr."},{"key":"1793_CR8","first-page":"89","volume-title":"Oil and Vinegar","author":"J Ding","year":"2020","unstructured":"Ding J., Petzoldt A., Schmidt D.S.: Oil and Vinegar, pp. 89\u2013151. Springer, New York (2020)."},{"key":"1793_CR9","doi-asserted-by":"publisher","first-page":"386","DOI":"10.1016\/j.jsc.2020.07.011","volume":"109","author":"E Gorla","year":"2022","unstructured":"Gorla E., Mueller D., Petit C.: Stronger bounds on the cost of computing Gr\u00f6bner bases for HFE systems. J. Symb. Comput. 109, 386\u2013398 (2022).","journal-title":"J. Symb. Comput."},{"key":"1793_CR10","doi-asserted-by":"publisher","first-page":"207","DOI":"10.1016\/j.jsc.2017.08.002","volume":"87","author":"M-DA Huang","year":"2018","unstructured":"Huang M.-D.A., Kosters M., Yang Y., Yeo S.L.: On the last fall degree of zero-dimensional Weil descent systems. J. Symb. Comput. 87, 207\u2013226 (2018).","journal-title":"J. Symb. Comput."},{"key":"1793_CR11","doi-asserted-by":"crossref","unstructured":"Kipnis A., Shamir A.: Cryptanalysis of the oil and vinegar signature scheme. In: Annual International Cryptology Conference, pp. 257\u2013266. Springer, New York (1998).","DOI":"10.1007\/BFb0055733"},{"key":"1793_CR12","doi-asserted-by":"crossref","unstructured":"Matsumoto T., Imai H.: Public quadratic polynomial-tuples for efficient signature-verification and message-encryption. In: Advances in Cryptology EUROCRYPT 88: Workshop on the Theory and Application of Cryptographic Techniques Davos, Switzerland, May 25\u201327. Proceedings 7, pp. 419\u2013453. Springer, New York (1988).","DOI":"10.1007\/3-540-45961-8_39"},{"key":"1793_CR13","doi-asserted-by":"crossref","unstructured":"Patarin J.: Cryptanalysis of the Matsumoto and Imai public key scheme of Eurocrypt \u201988. In: Advances in Cryptology\u2014CRYPTO \u201995. Lecture Notes in Computer Science, vol. 963, pp.\u00a0248\u2013261. Springer, Berlin (1995).","DOI":"10.1007\/3-540-44750-4_20"},{"key":"1793_CR14","first-page":"1","volume":"5","author":"F Salizzoni","year":"2025","unstructured":"Salizzoni F.: An upper bound for the solving degree in terms of the degree of regularity. Trans. Math. Cryptol. 5, 1\u20137 (2025).","journal-title":"Trans. Math. Cryptol."}],"container-title":["Designs, Codes and Cryptography"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-025-01793-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10623-025-01793-8","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-025-01793-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,27]],"date-time":"2026-04-27T12:15:58Z","timestamp":1777292158000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10623-025-01793-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,3,31]]},"references-count":14,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2026,4]]}},"alternative-id":["1793"],"URL":"https:\/\/doi.org\/10.1007\/s10623-025-01793-8","relation":{},"ISSN":["0925-1022","1573-7586"],"issn-type":[{"value":"0925-1022","type":"print"},{"value":"1573-7586","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026,3,31]]},"assertion":[{"value":"24 July 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"3 December 2025","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"10 December 2025","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"31 March 2026","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}],"article-number":"75"}}