{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,7,16]],"date-time":"2024-07-16T12:37:35Z","timestamp":1721133455750},"reference-count":22,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2011,5,24]],"date-time":"2011-05-24T00:00:00Z","timestamp":1306195200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Sci. China Inf. Sci."],"published-print":{"date-parts":[[2011,6]]},"DOI":"10.1007\/s11432-011-4262-3","type":"journal-article","created":{"date-parts":[[2011,5,23]],"date-time":"2011-05-23T14:32:40Z","timestamp":1306161160000},"page":"1161-1171","source":"Crossref","is-referenced-by-count":12,"title":["Extended multivariate public key cryptosystems with secure encryption function"],"prefix":"10.1007","volume":"54","author":[{"given":"HouZhen","family":"Wang","sequence":"first","affiliation":[]},{"given":"HuanGuo","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"ZhangYi","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Ming","family":"Tang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2011,5,24]]},"reference":[{"key":"4262_CR1","doi-asserted-by":"crossref","first-page":"1484","DOI":"10.1137\/S0097539795293172","volume":"6","author":"P. W. Shor","year":"1997","unstructured":"Shor P W. Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer. SIAM J Comput, 1997, 6: 1484\u20131509","journal-title":"SIAM J Comput"},{"key":"4262_CR2","doi-asserted-by":"crossref","first-page":"883","DOI":"10.1038\/414883a","volume":"414","author":"L. M. K. Vandersypen","year":"2001","unstructured":"Vandersypen L M K, Steffen M, Breyta G, et al. Experimental realization of Shor\u2019s quantum factoring algorithm using nuclear magnetic resonance. Nature, 2001, 414: 883\u2013887","journal-title":"Nature"},{"key":"4262_CR3","first-page":"1","volume":"4","author":"H. M. Guan","year":"2009","unstructured":"Guan H M. Progress in quantum computers abroad, information security challenges and countermeasures. Comput Secur, 2009, 4: 1\u20135","journal-title":"Comput Secur"},{"key":"4262_CR4","doi-asserted-by":"crossref","first-page":"322","DOI":"10.1360\/csb2010-55-4-5-322","volume":"55","author":"X. Q. Fu","year":"2010","unstructured":"Fu X Q, Bao W S, Zhou C. Speeding up implementation for Shor\u2019s factorization quantum. Chinese Sci Bull, 2010, 55: 322\u2013327","journal-title":"Chinese Sci Bull"},{"key":"4262_CR5","series-title":"LNCS","doi-asserted-by":"crossref","first-page":"153","DOI":"10.1007\/978-3-642-01001-9_9","volume-title":"Eurocrypt 2009","author":"Q. H. Wu","year":"2009","unstructured":"Wu Q H, Mu Y, Susilo W, et al. Asymmetric group key agreement. In: Eurocrypt 2009, LNCS, Vol. 5479. Berlin: Springer-Verlag, 2009. 153\u2013170"},{"key":"4262_CR6","first-page":"559","volume":"2","author":"Q. H. Wu","year":"2010","unstructured":"Wu Q H, Domingo-Ferrer J, Gonz\u00e1lez-Nicol\u00e1s U. Balanced trustworthiness, safety and privacy in vehicle-to-vehicle communications. IEEE Trans Veh Technol, 2010, 2: 559\u2013573","journal-title":"IEEE Trans Veh Technol"},{"key":"4262_CR7","first-page":"271","volume":"44","author":"Y. Li","year":"1994","unstructured":"Li Y, Deng R, Wang X. The equivalence of McEliece\u2019s and Niederreiter\u2019s public-key cryptosystems. IEEE Trans Inf Theory, 1994, 44: 271\u2013273","journal-title":"IEEE Trans Inf Theory"},{"key":"4262_CR8","first-page":"128","volume-title":"Computers and Intractability, a Guide to the Theory of NP-Completeness","author":"M. Garey","year":"1979","unstructured":"Garey M, Johnson D. Computers and Intractability, a Guide to the Theory of NP-Completeness. New York: Freeman, 1979. 128\u2013130"},{"key":"4262_CR9","series-title":"LNCS","first-page":"33","volume-title":"Proceedings of Eurocrypt 1996","author":"J. Patarin","year":"1996","unstructured":"Patarin J. Hidden field equations (HFE) and isomorphisms of polynomials (IP): two new families of asymmetric algorithms. In: Proceedings of Eurocrypt 1996, LNCS, Vol. 1070. Berlin: Springer-Verlag, 1996. 33\u201348"},{"key":"4262_CR10","unstructured":"Wolf C. Multivariate quadratic polynomials in public key cryptography. Katholieke Universiteit Leuven, 2005"},{"key":"4262_CR11","series-title":"LNCS","first-page":"1","volume-title":"Proceedings of Crypto 1993","author":"A. Shamir","year":"1993","unstructured":"Shamir A. Efficient signature schemes based on birational permutations. In: Proceedings of Crypto 1993, LNCS, Vol. 773. Berlin: Springer-Verlag, 1993. 1\u201312"},{"key":"4262_CR12","first-page":"9","volume":"5","author":"H. Z. Wang","year":"2010","unstructured":"Wang H Z, Zhang H G, Guan H M. Multivariate algebra theory and its application in cryptography. J Beijing Univ Technol, 2010, 5: 9\u201317","journal-title":"J Beijing Univ Technol"},{"key":"4262_CR13","series-title":"LNCS","doi-asserted-by":"crossref","first-page":"392","DOI":"10.1007\/3-540-45539-6_27","volume-title":"Proceedings of Eurocrypt 2000","author":"N. T. Coutrtois","year":"2000","unstructured":"Coutrtois N T, Klimov A, Patarin J, et al. Efficient algorithms for solving overdefined systems of multivariate polynomial equations. In: Proceedings of Eurocrypt 2000, LNCS, Vol. 1807. Berlin: Springer-Verlag, 2000. 392\u2013407"},{"key":"4262_CR14","series-title":"LNCS","doi-asserted-by":"crossref","first-page":"75","DOI":"10.1145\/780506.780516","volume-title":"Proceedings of ISSAC 2002","author":"J. C. Faugere","year":"2002","unstructured":"Faugere J C. A new efficient algorithm for computing Grobner bases without reduction to zero (F5). In: Proceedings of ISSAC 2002 LNCS, Vol. 2518. Berlin: Springer-Verlag, 2002. 75\u201383"},{"key":"4262_CR15","doi-asserted-by":"crossref","first-page":"1738","DOI":"10.1360\/jos181738","volume":"7","author":"X. J. Tang","year":"2007","unstructured":"Tang X J, Feng Y. Applying dixon resultants in cryptography. J Softw, 2007, 7: 1738\u20131745","journal-title":"J Softw"},{"key":"4262_CR16","doi-asserted-by":"crossref","first-page":"1977","DOI":"10.1007\/s11432-010-4062-1","volume":"53","author":"H. Z. Wang","year":"2010","unstructured":"Wang H Z, Zhang H G, et al. Design theory and method of multivariate hash function. Sci China Inf Sci, 2010, 53: 1977\u20131987","journal-title":"Sci China Inf Sci"},{"key":"4262_CR17","series-title":"LNCS","first-page":"218","volume-title":"Proceedings of CRYPTO1989","author":"R. C. Merkle","year":"1989","unstructured":"Merkle R C. A certified digital signature. In: Proceedings of CRYPTO1989. LNCS, Vol. 435. Berlin: Springer-Verlag, 1989. 218\u2013238"},{"key":"4262_CR18","series-title":"LNCS","first-page":"419","volume-title":"Proceedings of Eurocryp 1988","author":"T. Matsumoto","year":"1988","unstructured":"Matsumoto T, Imai H. Public quadratic polynomial-tuples for efficient signature verification and message encryption. In: Proceedings of Eurocryp 1988, LNCS, Vol. 330. Berlin: Springer-Verlag, 1988. 419\u2013453"},{"key":"4262_CR19","series-title":"LNCS","first-page":"248","volume-title":"Proceedings of Crypto 1995","author":"J. Patarin","year":"1995","unstructured":"Patarin J. Cryptanalysis of the Matsumoto and Imai public key scheme of Eurocrypt 1988. In: Proceedings of Crypto 1995, LNCS, Vol. 963. Berlin: Springer-Verlag, 1995. 248\u2013261"},{"key":"4262_CR20","series-title":"LNCS","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/978-3-540-74143-5_1","volume-title":"Proceedings of Crypto 2007","author":"V. Dubois","year":"2007","unstructured":"Dubois V, Fouque P A, Shamir A, et al. Practical cryptanalysis of SFLASH. In: Proceedings of Crypto 2007, LNCS, Vol. 4622. Berlin: Springer-Verlag, 2007. 1\u201312"},{"key":"4262_CR21","doi-asserted-by":"crossref","first-page":"760","DOI":"10.1007\/s11432-010-0025-9","volume":"53","author":"H. Z. Wang","year":"2010","unstructured":"Wang H Z, Zhang H G, et al. A new perturbation algorithm and enhancing security of SFLASH signature scheme. Sci China Inf Sci, 2010, 53: 760\u2013768","journal-title":"Sci China Inf Sci"},{"key":"4262_CR22","series-title":"LNCS","first-page":"267","volume-title":"Proceedings of PKC 2003","author":"M. Akkar","year":"2003","unstructured":"Akkar M, Courtois N. A fast and secure implementation of SFLASH. In: Proceedings of PKC 2003, LNCS, Vol. 2567. Berlin: Springer-Verlag, 2003. 267\u2013278"}],"container-title":["Science China Information Sciences"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11432-011-4262-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11432-011-4262-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11432-011-4262-3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,6,19]],"date-time":"2020-06-19T12:50:10Z","timestamp":1592571010000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11432-011-4262-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,5,24]]},"references-count":22,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2011,6]]}},"alternative-id":["4262"],"URL":"https:\/\/doi.org\/10.1007\/s11432-011-4262-3","relation":{},"ISSN":["1674-733X","1869-1919"],"issn-type":[{"value":"1674-733X","type":"print"},{"value":"1869-1919","type":"electronic"}],"subject":[],"published":{"date-parts":[[2011,5,24]]}}}