{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,3,30]],"date-time":"2022-03-30T22:22:24Z","timestamp":1648678944714},"reference-count":16,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2010,2,5]],"date-time":"2010-02-05T00:00:00Z","timestamp":1265328000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Sci. China Inf. Sci."],"published-print":{"date-parts":[[2010,4]]},"DOI":"10.1007\/s11432-010-0025-9","type":"journal-article","created":{"date-parts":[[2010,2,5]],"date-time":"2010-02-05T06:16:15Z","timestamp":1265350575000},"page":"760-768","source":"Crossref","is-referenced-by-count":4,"title":["A new perturbation algorithm and enhancing security of SFLASH signature scheme"],"prefix":"10.1007","volume":"53","author":[{"given":"HouZhen","family":"Wang","sequence":"first","affiliation":[]},{"given":"HuanGuo","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"HaiMing","family":"Guan","sequence":"additional","affiliation":[]},{"given":"HaiQing","family":"Han","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2010,2,5]]},"reference":[{"key":"25_CR1","doi-asserted-by":"crossref","first-page":"124","DOI":"10.1109\/SFCS.1994.365700","volume-title":"Proceedings of the 35th Symposium on Foundations of Computer Science","author":"P. W. Shor","year":"1994","unstructured":"Shor P W. Algorithms for quantum computation: Discrete log and factoring. In: Proceedings of the 35th Symposium on Foundations of Computer Science, New York: IEEE Computer Society Press, 1994. 124\u2013134"},{"key":"25_CR2","first-page":"267","volume-title":"Proc. of ANTS III, LNCS 1423","author":"J. Hoffstein","year":"1998","unstructured":"Hoffstein J, Pipher J, Silverman J H. NTRU: a ring based public key cryptosystem. In: Proc. of ANTS III, LNCS 1423. Berlin: Springer-Verlag, 1998. 267\u2013288"},{"key":"25_CR3","first-page":"147","volume-title":"CRYPTO2000, LNCS 1880","author":"T. Okamoto","year":"2000","unstructured":"Okamoto T, Tanaka K, Uchiyama S. Quantum public-key cryptosystems. In: CRYPTO2000, LNCS 1880. Berlin: Springer-Verlag, 2000. 147\u2013165"},{"key":"25_CR4","first-page":"11","volume-title":"Multivariate Public Key Cryptosystems","author":"J. Ding","year":"2006","unstructured":"Ding J. Multivariate Public Key Cryptosystems. Berlin: Springer-Verlag, 2006. 11\u2013190"},{"key":"25_CR5","volume-title":"Computers and Intractability, A Guide to the Theory of NP-Completeness","author":"M. Garey","year":"1979","unstructured":"Garey M, Johnson D. Computers and Intractability, A Guide to the Theory of NP-Completeness. New York: Freeman, 1979"},{"key":"25_CR6","first-page":"297","volume-title":"CT-RSA 2001, LNCS 2020","author":"J. Patarin","year":"2001","unstructured":"Patarin J, Courtois N, Goubin L. FLASH, a fast multivariate signature algorithm. In: CT-RSA 2001, LNCS 2020, Berlin: Springer-Verlag, 2001. 297\u2013307"},{"key":"25_CR7","first-page":"267","volume-title":"PKC2003, LNCS, Vol. 2567","author":"M. Akkar","year":"2003","unstructured":"Akkar M, Courtois N, Duteuil R, et al. A fast and secure implementation of SFLASH. In: PKC2003, LNCS, Vol. 2567. Berlin: Springer, 2003. 267\u2013278"},{"key":"25_CR8","first-page":"1","volume-title":"Crypto2007, LNCS 4622","author":"V. Dubois","year":"2007","unstructured":"Dubois V, Fouque P A, Shamir A, et al. Practical cryptanalysis of SFLASH. In: Crypto2007, LNCS 4622. Berlin: Springer-Verlag, 2007. 1\u201312"},{"key":"25_CR9","first-page":"419","volume-title":"Advances in Eurocryp1988, LNCS 330","author":"T. Matsumoto","year":"1988","unstructured":"Matsumoto T, Imai H. Public quadratic polynomial-tuples for efficient signature verification and message encryption. In: Advances in Eurocryp1988, LNCS 330. Berlin: Springer, 1988. 419\u2013453"},{"key":"25_CR10","first-page":"33","volume-title":"Eurocrypt1996, LNCS 1070","author":"J. Patarin","year":"1996","unstructured":"Patarin J. Hidden field equations (HFE) and isomorphisms of polynomials (IP): two new families of asymmetric algorithms. In: Eurocrypt1996, LNCS 1070. Berlin: Springer, 1996. 33\u201348"},{"key":"25_CR11","first-page":"206","volume-title":"EUROCRYPT 1999, Vol. 1592 of Lecture Notes in Computer Science","author":"A. Kipnis","year":"1999","unstructured":"Kipnis A, Patarin J, Goubin L. Unbalanced oil and vinegar signature schemes. In: EUROCRYPT 1999, Vol. 1592 of Lecture Notes in Computer Science. Berlin: Springer, 1999. 206\u2013222"},{"key":"25_CR12","unstructured":"Yang B Y, Chen J M. Ranks attacks and defence in Tame-like multivariate PKCs. Report 2004\/061, 29rd September 2004. http:\/\/eprint.iac.org"},{"key":"25_CR13","doi-asserted-by":"crossref","unstructured":"Patarin J. Cryptanalysis of the Matsumoto and Imai public key scheme of Eurocrypt 1988. In: Crypto1995, LNCS 963. Springer-Verlag, 1995. 248\u2013261","DOI":"10.1007\/3-540-44750-4_20"},{"key":"25_CR14","first-page":"264","volume-title":"Eurocrypt2007, LNCS 4145","author":"V. Dubois","year":"2007","unstructured":"Dubois V, Fouque P A, Stern J. Cryptanalysis of SFLASH with slightly modified parameters. In: Eurocrypt2007, LNCS 4145. Berlin: Springer-Verlag, 2007. 264\u2013275"},{"key":"25_CR15","first-page":"35","volume-title":"Asiacrypt1998, LNCS 1514","author":"J. Patarin","year":"1998","unstructured":"Patarin J, Goubin L, Courtois N. C \u2212+ * and HM: Variations around two schemes of T. Matsumoto and H. Imai. In: Asiacrypt1998, LNCS 1514. Berlin: Springer, 1998. 35\u201349"},{"key":"25_CR16","first-page":"288","volume-title":"Eurocrypt 2002, LNCS 2332","author":"H. Gilbert","year":"2002","unstructured":"Gilbert H, Minier M. Cryptanalysis of SFLASH. In: Eurocrypt 2002, LNCS 2332. Berlin: Springer, 2002. 288\u2013298"}],"container-title":["Science China Information Sciences"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11432-010-0025-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11432-010-0025-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11432-010-0025-9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T15:36:02Z","timestamp":1559403362000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11432-010-0025-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,2,5]]},"references-count":16,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2010,4]]}},"alternative-id":["25"],"URL":"https:\/\/doi.org\/10.1007\/s11432-010-0025-9","relation":{},"ISSN":["1674-733X","1869-1919"],"issn-type":[{"value":"1674-733X","type":"print"},{"value":"1869-1919","type":"electronic"}],"subject":[],"published":{"date-parts":[[2010,2,5]]}}}