{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,12]],"date-time":"2025-06-12T04:47:32Z","timestamp":1749703652420},"reference-count":9,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2016,12,29]],"date-time":"2016-12-29T00:00:00Z","timestamp":1482969600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Sci. China Inf. Sci."],"published-print":{"date-parts":[[2017,2]]},"DOI":"10.1007\/s11432-015-0721-4","type":"journal-article","created":{"date-parts":[[2017,1,5]],"date-time":"2017-01-05T19:31:32Z","timestamp":1483644692000},"update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["Cryptanalysis of a lattice based key exchange protocol"],"prefix":"10.1007","volume":"60","author":[{"given":"Shaowu","family":"Mao","sequence":"first","affiliation":[]},{"given":"Pei","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Houzhen","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Huanguo","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Wanqing","family":"Wu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,12,29]]},"reference":[{"key":"721_CR1","first-page":"110101","volume":"58","author":"H G Zhang","year":"2015","unstructured":"Zhang H G, Han W B, Lai X J, et al. Survey on cyberspace security. Sci China Inf Sci, 2015, 58: 110101","journal-title":"Sci China Inf Sci"},{"key":"721_CR2","first-page":"284","volume-title":"Proceedings of the 29th Annual ACM Symposium on Theory of Computing. New York: ACM","author":"M Ajtai","year":"1997","unstructured":"Ajtai M, Dwork C. A public-key cryptosystem with worst-case\/average-case equivalence. In: Proceedings of the 29th Annual ACM Symposium on Theory of Computing. New York: ACM, 1997. 284\u2013293"},{"key":"721_CR3","unstructured":"Arbitman Y, Dogon G, Lyubashevsky V, et al. SWIFFTX: a proposal for the SHA-3 standard. 2008"},{"key":"721_CR4","doi-asserted-by":"crossref","first-page":"40","DOI":"10.1007\/978-3-642-40041-4_3","volume-title":"Advances in Cryptology\u2014CRYPTO 2013. Berlin: Springer","author":"L Ducas","year":"2013","unstructured":"Ducas L, Durmus A, Lepoint T, et al. Lattice signatures and bimodal gaussians. In: Advances in Cryptology\u2014CRYPTO 2013. Berlin: Springer, 2013. 40\u201356"},{"key":"721_CR5","first-page":"319","volume-title":"Proceedings of the 11th International Conference on Topics in Cryptology: CT-RSA, San Francisco","author":"R Lindner","year":"2011","unstructured":"Lindner R, Peikert C. Better key sizes (and attacks) for LWE-based encryption. In: Proceedings of the 11th International Conference on Topics in Cryptology: CT-RSA, San Francisco, 2011. 319\u2013339"},{"key":"721_CR6","doi-asserted-by":"crossref","first-page":"22","DOI":"10.1007\/978-3-662-45608-8_2","volume-title":"Advances in Cryptology\u2014ASIACRYPT 2014. Berlin: Springer","author":"L Ducas","year":"2014","unstructured":"Ducas L, Lyubashevsky V, Prest T. Efficient identitybased encryption over NTRU lattices. In: Advances in Cryptology\u2014ASIACRYPT 2014. Berlin: Springer, 2014. 22\u201341"},{"key":"721_CR7","doi-asserted-by":"crossref","first-page":"267","DOI":"10.1137\/S0097539705447360","volume":"37","author":"D Micciancio","year":"2007","unstructured":"Micciancio D, Regev O. Worst-case to average-case reductions based on Gaussian measures. SIAM J Comput, 2007, 37: 267\u2013302","journal-title":"SIAM J Comput"},{"key":"721_CR8","first-page":"112111","volume":"57","author":"S B Wang","year":"2014","unstructured":"Wang S B, Zhu Y, Ma D, et al. Lattice-based key exchange on small integer solution problem. Sci China Inf Sci, 2014, 57: 112111","journal-title":"Sci China Inf Sci"},{"key":"721_CR9","doi-asserted-by":"crossref","first-page":"228","DOI":"10.1016\/j.pisc.2016.04.034","volume":"8","author":"D S Gupta","year":"2016","unstructured":"Gupta D S, Biswas G P. Cryptanalysis of Wang et al.\u2019s lattice-based key exchange protocol. Perspect Sci, 2016, 8: 228\u2013230","journal-title":"Perspect Sci"}],"container-title":["Science China Information Sciences"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11432-015-0721-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11432-015-0721-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11432-015-0721-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,17]],"date-time":"2019-09-17T02:15:20Z","timestamp":1568686520000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11432-015-0721-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,12,29]]},"references-count":9,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2017,2]]}},"alternative-id":["721"],"URL":"https:\/\/doi.org\/10.1007\/s11432-015-0721-4","relation":{},"ISSN":["1674-733X","1869-1919"],"issn-type":[{"value":"1674-733X","type":"print"},{"value":"1869-1919","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,12,29]]},"article-number":"028101"}}