{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,16]],"date-time":"2025-12-16T12:37:41Z","timestamp":1765888661903,"version":"3.37.3"},"reference-count":9,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2021,7,14]],"date-time":"2021-07-14T00:00:00Z","timestamp":1626220800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,7,14]],"date-time":"2021-07-14T00:00:00Z","timestamp":1626220800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cryptogr. Commun."],"published-print":{"date-parts":[[2021,9]]},"DOI":"10.1007\/s12095-021-00512-z","type":"journal-article","created":{"date-parts":[[2021,7,14]],"date-time":"2021-07-14T00:05:32Z","timestamp":1626221132000},"page":"837-845","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Efficient generation of quadratic cyclotomic classes for shortest quadratic decompositions of polynomials"],"prefix":"10.1007","volume":"13","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-8995-8327","authenticated-orcid":false,"given":"Kamil","family":"Otal","sequence":"first","affiliation":[]},{"given":"Eda","family":"Tekin","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,7,14]]},"reference":[{"issue":"1","key":"512_CR1","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/s12095-014-0104-7","volume":"7","author":"B Bilgin","year":"2015","unstructured":"Bilgin, B., Nikova, S., Nikov, V., Rijmen, V., Tokareva, N., Vitkup, V.: Threshold implementations of small S-boxes. Cryptogr. Commun. 7 (1), 3\u201333 (2015)","journal-title":"Cryptogr. Commun."},{"key":"512_CR2","first-page":"742","volume-title":"Algebraic Decomposition for Probing Security, CRYPTO LNCS 9215","author":"C Carlet","year":"2015","unstructured":"Carlet, C., Prouff, E., Rivain, M., Roche, T.: Algebraic Decomposition for Probing Security, CRYPTO LNCS 9215, pp 742\u2013763. Springer, Berlin (2015)"},{"key":"512_CR3","doi-asserted-by":"publisher","first-page":"538","DOI":"10.1090\/S0002-9939-1953-0055965-8","volume":"4","author":"L Carlitz","year":"1953","unstructured":"Carlitz, L.: Permutations in a finite field. Proc. Amer. Math. Soc. 4, 538 (1953)","journal-title":"Proc. Amer. Math. Soc."},{"issue":"2","key":"512_CR4","doi-asserted-by":"publisher","first-page":"73","DOI":"10.1007\/s13389-015-0099-9","volume":"5","author":"J-S Coron","year":"2015","unstructured":"Coron, J.-S., Roy, A., Vivek, S.: Fast evaluation of polynomials over binary finite fields and application to side-channel countermeasures. J. Cryptogr. Eng. 5(2), 73\u201383 (2015)","journal-title":"J. Cryptogr. Eng."},{"key":"512_CR5","doi-asserted-by":"crossref","unstructured":"Daemen, J., Rijmen, R.: The Design of Rijndael: AES - the advanced encryption standard. Information Security and Cryptography: Springer (2002)","DOI":"10.1007\/978-3-662-04722-4"},{"key":"512_CR6","doi-asserted-by":"crossref","unstructured":"Kutzner, S., Ha Nguyen, P., Poschmann, A.: Enabling 3-share threshold implementations for all 4-bit S-boxes. International Conference on Information Security and Cryptology, pp 91\u2013108 (2013)","DOI":"10.1007\/978-3-319-12160-4_6"},{"key":"512_CR7","volume-title":"Finite Fields, vol. 20","author":"R Lidl","year":"1997","unstructured":"Lidl, R., Niederreiter, H.: Finite Fields, vol. 20. Cambridge University Press, Cambridge (1997)"},{"key":"512_CR8","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1007\/s12095-018-0317-2","volume":"11","author":"S Nikova","year":"2019","unstructured":"Nikova, S., Nikov, V., Rijmen, V.: Decomposition of permutations in a finite field. Cryptogr. Commun. 11, 37\u2013384 (2019)","journal-title":"Cryptogr. Commun."},{"issue":"2","key":"512_CR9","doi-asserted-by":"publisher","first-page":"322","DOI":"10.1007\/s00145-010-9086-6","volume":"24","author":"A Poschmann","year":"2011","unstructured":"Poschmann, A., Moradi, A., Khoo, K., Lim, C.-W., Wang, H., Ling, S.: Side-channel resistant crypto for less than 2,300 GE. J. Cryptol. 24 (2), 322\u2013345 (2011)","journal-title":"J. Cryptol."}],"container-title":["Cryptography and Communications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12095-021-00512-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12095-021-00512-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12095-021-00512-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,10,10]],"date-time":"2021-10-10T05:45:08Z","timestamp":1633844708000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12095-021-00512-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,7,14]]},"references-count":9,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2021,9]]}},"alternative-id":["512"],"URL":"https:\/\/doi.org\/10.1007\/s12095-021-00512-z","relation":{},"ISSN":["1936-2447","1936-2455"],"issn-type":[{"type":"print","value":"1936-2447"},{"type":"electronic","value":"1936-2455"}],"subject":[],"published":{"date-parts":[[2021,7,14]]},"assertion":[{"value":"16 April 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"30 June 2021","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"14 July 2021","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}