{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T07:24:12Z","timestamp":1740122652498,"version":"3.37.3"},"reference-count":30,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2017,12,27]],"date-time":"2017-12-27T00:00:00Z","timestamp":1514332800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"name":"Shenzhen Science and Technology Program","award":["No. JCYJ20170306144219159","No. JCYJ20160428092427867","No. JCYJ20160322114027138"],"award-info":[{"award-number":["No. JCYJ20170306144219159","No. JCYJ20160428092427867","No. JCYJ20160322114027138"]}]},{"name":"Science and Technology Program of Shenzhen Polytechnic","award":["No. 601722K20018"],"award-info":[{"award-number":["No. 601722K20018"]}]},{"DOI":"10.13039\/501100003453","name":"Natural Science Foundation of Guangdong Province","doi-asserted-by":"crossref","award":["No. 2016A030313023"],"award-info":[{"award-number":["No. 2016A030313023"]}],"id":[{"id":"10.13039\/501100003453","id-type":"DOI","asserted-by":"crossref"}]},{"name":"Special funds for Shenzhen Strategic Emerging Industries and Future Industrial Development","award":["No. 20170502142224600"],"award-info":[{"award-number":["No. 20170502142224600"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Pers Commun"],"published-print":{"date-parts":[[2018,9]]},"DOI":"10.1007\/s11277-017-5206-z","type":"journal-article","created":{"date-parts":[[2017,12,27]],"date-time":"2017-12-27T10:19:56Z","timestamp":1514369996000},"page":"1471-1484","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Towards Wearability in Cryptographic Systems: A Novel Architecture Based on Rainbow Scheme for Wearable Devices"],"prefix":"10.1007","volume":"102","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-0481-4231","authenticated-orcid":false,"given":"Haibo","family":"Yi","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,12,27]]},"reference":[{"issue":"4","key":"5206_CR1","doi-asserted-by":"crossref","first-page":"28","DOI":"10.1109\/MSP.2017.3151328","volume":"15","author":"J Ding","year":"2017","unstructured":"Ding, J., & Petzoldt, A. (2017). Current state of multivariate cryptography. IEEE Security and Privacy, 15(4), 28\u201336.","journal-title":"IEEE Security and Privacy"},{"issue":"2","key":"5206_CR2","doi-asserted-by":"crossref","first-page":"303","DOI":"10.1137\/S0036144598347011","volume":"41","author":"PW Shor","year":"1999","unstructured":"Shor, P. W. (1999). Polynomial\u2014Time algorithms for prime factorization and discrete logarithms on a quantum computer. SIAM Review, 41(2), 303\u2013332.","journal-title":"SIAM Review"},{"key":"5206_CR3","unstructured":"Petzoldt, A., Chen, M. S., & Ding, J., et al. (2017). HMFEv\u2014An efficient multivariate signature scheme. International workshop on post-quantum cryptography (pp. 205\u2013223). Cham: Springer."},{"key":"5206_CR4","doi-asserted-by":"crossref","unstructured":"Kipnis, A., Patarin, J., & Goubin, L. (1999). Unbalanced oil and vinegar signature schemes. In Advances in cryptology\u2014EUROCRYPT 99, Prague, Czech Republic, May 2\u20136, 1999 (Vol. 1592, pp. 206\u2013222). Berlin: Springer.","DOI":"10.1007\/3-540-48910-X_15"},{"key":"5206_CR5","doi-asserted-by":"crossref","unstructured":"Ding, J., & Schmidt, D. (2005). Rainbow, a new multivariable polynomial signature scheme. In Third international conference, ACNS 2005, New York, NY, USA, June 7\u201310, 2005 (Vol. 3531, pp. 164\u2013175). Berlin: Springer.","DOI":"10.1007\/11496137_12"},{"key":"5206_CR6","doi-asserted-by":"crossref","unstructured":"Petzoldt, A., Bulygin, S., & Buchmann, J. (2010). Selecting parameters for the Rainbow signature scheme. In Proceedings of the post-quantum cryptography third international workshop, PQCrypto 2010, Darmstadt, Germany, May 25\u201328, 2010 (pp. 218\u2013240).","DOI":"10.1007\/978-3-642-12929-2_16"},{"key":"5206_CR7","doi-asserted-by":"crossref","unstructured":"Petzoldt, A., Bulygin, S. & Buchmann, J. (2013). Fast verification for improved versions of the UOV and Rainbow signature schemes. In Post-quantum cryptography, PQCrypto 2013 (pp. 188\u2013202). Berlin: Springer.","DOI":"10.1007\/978-3-642-38616-9_13"},{"key":"5206_CR8","first-page":"1","volume":"2017","author":"H Yi","year":"2017","unstructured":"Yi, H., & Li, W. (2017). On the importance of checking multivariate public key cryptography for side-channel attacks: The case of enTTS scheme. Computer Journal, 2017, 1\u201313.","journal-title":"Computer Journal"},{"key":"5206_CR9","first-page":"552","volume":"513\u2013517","author":"CM Liu","year":"2014","unstructured":"Liu, C. M., Zhao, L., & Sun, Y. J. (2014). The design of public key cryptography for key exchange base on multivariate equations. Applied Mechanics and Materials, 513\u2013517, 552\u2013554.","journal-title":"Applied Mechanics and Materials"},{"key":"5206_CR10","doi-asserted-by":"crossref","unstructured":"Szepieniec, A., Ding, J., & Preneel, B. (2016). Extension field cancellation: A new central trapdoor for multivariate quadratic systems. International workshop on post-quantum cryptography (pp. 182\u2013196). New York: Springer.","DOI":"10.1007\/978-3-319-29360-8_12"},{"key":"5206_CR11","unstructured":"Thomae, E., & Wolf, C. (2012). Cryptanalysis of enhanced TTS, STS and all its variants, or: Why cross-terms are important. In 5th international conference on cryptology in Africa, Ifrance, Morocco, July 10\u201312, 2012 (pp. 188\u2013202). Berlin: Springer."},{"key":"5206_CR12","doi-asserted-by":"crossref","unstructured":"Porras, J., Baena, J., & Ding, J. (2014). ZHFE, a new multivariate public key encryption scheme. International workshop on post-quantum cryptography (pp. 229\u2013245). Berlin: Springer International Publishing.","DOI":"10.1007\/978-3-319-11659-4_14"},{"key":"5206_CR13","unstructured":"Bogdanov, A., Eisenbarth, T., Rupp, A., & Wolf, C. (2008). Time-area optimized public-key engines: MQ-cryptosystems as replacement for elliptic curves? In Cryptographic hardware and embedded systems\u2014CHES 2008, Washington, D.C., USA, August 10\u201313, 2008 (pp. 45\u201361). Berlin: Springer."},{"issue":"9","key":"5206_CR14","doi-asserted-by":"crossref","first-page":"165","DOI":"10.14257\/ijsia.2015.9.9.15","volume":"9","author":"H Yi","year":"2015","unstructured":"Yi, H., & Li, W. (2015). Fast three-input multipliers over small composite fields for multivariate public key cryptography. International Journal of Security and Its Applications, 9(9), 165\u2013178.","journal-title":"International Journal of Security and Its Applications"},{"issue":"C","key":"5206_CR15","doi-asserted-by":"crossref","first-page":"352","DOI":"10.1016\/j.ffa.2015.06.001","volume":"35","author":"C Tao","year":"2015","unstructured":"Tao, C., Xiang, H., Petzoldt, A., et al. (2015). Simple matrix\u2014A multivariate public key cryptosystem (MPKC) for encryption. Finite Fields and Their Applications, 35(C), 352\u2013368.","journal-title":"Finite Fields and Their Applications"},{"issue":"7","key":"5206_CR16","doi-asserted-by":"crossref","first-page":"1102","DOI":"10.1093\/comjnl\/bxw009","volume":"59","author":"H Yi","year":"2016","unstructured":"Yi, H., Tang, S., & Vemuri, R. (2016). Fast inversions in small finite fields by using binary trees. Computer Journal, 59(7), 1102\u20131112.","journal-title":"Computer Journal"},{"key":"5206_CR17","unstructured":"Balasubramanian, S., Bogdanov, A., & Rupp, A., et al. (2008). Fast multivariate signature generation in hardware: The case of Rainbow. In International conference on application\u2014Specific systems, architectures and processors (pp. 25\u201330). IEEE."},{"issue":"7","key":"5206_CR18","doi-asserted-by":"crossref","first-page":"1091","DOI":"10.1093\/comjnl\/bxw008","volume":"59","author":"H Yi","year":"2016","unstructured":"Yi, H., & Tang, S. (2016). Very small FPGA processor for multivariate signatures. Computer Journal, 59(7), 1091\u20131101.","journal-title":"Computer Journal"},{"issue":"1","key":"5206_CR19","doi-asserted-by":"crossref","first-page":"106","DOI":"10.1109\/JETCAS.2013.2244772","volume":"3","author":"JR Shih","year":"2013","unstructured":"Shih, J. R., Hu, Y., Hsiao, M. C., et al. (2013). Securing M2M with post-quantum public-key cryptography. IEEE Journal on Emerging and Selected Topics in Circuits and Systems, 3(1), 106\u2013116.","journal-title":"IEEE Journal on Emerging and Selected Topics in Circuits and Systems"},{"issue":"9","key":"5206_CR20","doi-asserted-by":"crossref","first-page":"109","DOI":"10.14257\/ijsia.2016.10.9.12","volume":"19","author":"H Yi","year":"2016","unstructured":"Yi, H., Li, W., & Nie, Z. (2016). Fast hardware implementations of inversions in small finite fields for special irreducible polynomials on FPGAs. International Journal of Security and Its Applications, 19(9), 109\u2013120.","journal-title":"International Journal of Security and Its Applications"},{"key":"5206_CR21","doi-asserted-by":"crossref","first-page":"374","DOI":"10.1007\/978-3-642-33027-8_22","volume-title":"Cryptographic hardware and embedded systems\u2014CHES 2012","author":"P Czypek","year":"2012","unstructured":"Czypek, P., Heyse, S., & Thomae, E. (2012). Efficient implementations of MQPKS on constrained devices. In E. Prouff & P. Schaumont (Eds.), Cryptographic hardware and embedded systems\u2014CHES 2012 (pp. 374\u2013389). Berlin: Springer."},{"issue":"1","key":"5206_CR22","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s10623-011-9582-1","volume":"67","author":"S Gao","year":"2013","unstructured":"Gao, S., & Heindl, R. (2013). Multivariate public key cryptosystems from diophantine equations. Designs Codes and Cryptography, 67(1), 1\u201318.","journal-title":"Designs Codes and Cryptography"},{"key":"5206_CR23","doi-asserted-by":"crossref","unstructured":"Huang, Y. J., Liu, F. H., & Yang, B. Y. (2012). Public-key cryptography from new multivariate quadratic assumptions. International conference on practice and theory in public key cryptography (pp. 190\u2013205). Berlin: Springer.","DOI":"10.1007\/978-3-642-30057-8_12"},{"issue":"9","key":"5206_CR24","doi-asserted-by":"crossref","first-page":"1881","DOI":"10.3724\/SP.J.1016.2012.01881","volume":"35","author":"X An","year":"2012","unstructured":"An, X. (2012). Certificateless multi-receiver signcryption scheme based on multivariate public key cryptography. Chinese Journal of Computers, 35(9), 1881.","journal-title":"Chinese Journal of Computers"},{"issue":"1","key":"5206_CR25","first-page":"130","volume":"19","author":"V Ustimenko","year":"2015","unstructured":"Ustimenko, V. (2015). On the flag geometry of simple group of Lie type and multivariate cryptography. Algebra and Discrete Mathematics, 19(1), 130\u2013144.","journal-title":"Algebra and Discrete Mathematics"},{"key":"5206_CR26","doi-asserted-by":"crossref","unstructured":"Tang, S., Yi, H., & Ding, J., et al. (2011). High-speed hardware implementation of rainbow signature on FPGAs. Post-quantum cryptography (pp. 228\u2013243). Berlin: Springer.","DOI":"10.1007\/978-3-642-25405-5_15"},{"issue":"99","key":"5206_CR27","first-page":"1","volume":"PP","author":"J Wang","year":"2016","unstructured":"Wang, J., Cheng, L. M., & Su, T. (2016). Multivariate cryptography based on clipped hopfield neural network. IEEE Transactions on Neural Networks and Learning Systems, PP(99), 1\u201311.","journal-title":"IEEE Transactions on Neural Networks and Learning Systems"},{"key":"5206_CR28","doi-asserted-by":"crossref","unstructured":"Sun, X., Liu, H., & Zhang, M. (2016). Multivariate symmetric cryptography with 2-dimesion chaotic disturbation. In International conference on wireless communications and signal processing (pp. 1\u20134). IEEE.","DOI":"10.1109\/WCSP.2016.7752691"},{"issue":"7","key":"5206_CR29","first-page":"37","volume":"40","author":"H Xiang","year":"2017","unstructured":"Xiang, H., Siyao, L. I., & Cai, B. (2017). Multivariate public key cryptography scheme with changeable ratio of ciphertext length to plaintext length. Journal of Chongqing University, 40(7), 37\u201342.","journal-title":"Journal of Chongqing University"},{"key":"5206_CR30","unstructured":"Albrecht, M. R., Faug\u00e9re, J. C., & Fitzpatrick, R., et al. (2014). Practical cryptanalysis of a public-key encryption scheme based on new multivariate quadratic assumptions. International workshop on public key cryptography (pp. 446\u2013464). Berlin: Springer."}],"container-title":["Wireless Personal Communications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11277-017-5206-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-017-5206-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-017-5206-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,9,3]],"date-time":"2018-09-03T06:42:30Z","timestamp":1535956950000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11277-017-5206-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,12,27]]},"references-count":30,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2018,9]]}},"alternative-id":["5206"],"URL":"https:\/\/doi.org\/10.1007\/s11277-017-5206-z","relation":{},"ISSN":["0929-6212","1572-834X"],"issn-type":[{"type":"print","value":"0929-6212"},{"type":"electronic","value":"1572-834X"}],"subject":[],"published":{"date-parts":[[2017,12,27]]}}}