{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,7]],"date-time":"2026-05-07T04:27:33Z","timestamp":1778128053249,"version":"3.51.4"},"reference-count":28,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2023,7,7]],"date-time":"2023-07-07T00:00:00Z","timestamp":1688688000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,7,7]],"date-time":"2023-07-07T00:00:00Z","timestamp":1688688000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Iran J Comput Sci"],"published-print":{"date-parts":[[2023,12]]},"DOI":"10.1007\/s42044-023-00150-z","type":"journal-article","created":{"date-parts":[[2023,7,7]],"date-time":"2023-07-07T08:02:24Z","timestamp":1688716944000},"page":"431-443","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["A post-quantum signature scheme from the secant variety of the Grassmannian"],"prefix":"10.1007","volume":"6","author":[{"given":"Daniele","family":"Di Tullio","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Manoj","family":"Gyawali","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2023,7,7]]},"reference":[{"key":"150_CR1","doi-asserted-by":"crossref","unstructured":"Shor P.W.: Algorithms for quantum computation: discrete logarithms and factoring. In: Robshaw, M., Katz, J. (eds) Foundations of Computer Science, Conference 1994, Proceedings, 35th Annual Symposium, pp. 124\u2013134 (1994)","DOI":"10.1109\/SFCS.1994.365700"},{"issue":"3","key":"150_CR2","doi-asserted-by":"publisher","first-page":"384","DOI":"10.1109\/TIT.1978.1055873","volume":"24","author":"ER Berlekamp","year":"1978","unstructured":"Berlekamp, E.R., McEliece, R.J., van Tilborg, H.C.A.: On the inherent intractability of certain coding problems. IEEE Trans. Inf. Theory IT 24(3), 384\u2013386 (1978)","journal-title":"IEEE Trans. Inf. Theory IT"},{"key":"150_CR3","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-88702-7","volume-title":"Post-Quantum Cryptography","author":"DJ Bernstein","year":"2009","unstructured":"Bernstein, D.J., Buchmann, J., Dahmen, E.: Post-Quantum Cryptography. Springer-Verlag, Berlin, Heidelberg (2009)"},{"key":"150_CR4","unstructured":"Avanzi, R., Bos, J., Ducas, L., Kiltz, E., Lepoint, T., Lyubashevsky, V., Schanck, J.M., University of Schwabe, P., Seiler, G., Stehle, D. : KYBER Algorithm Specifications and Supporting Documentation. CRYSTALS Team (2021). www.pq-crystals.org"},{"key":"150_CR5","unstructured":"Aumasson, J.P., Bernstein, D.J., Beullens, W., Dobraunig, C., Eichlseder, M., Fluhrer, S., Gazdag, S.L., H\u00fclsing, A., Kampanakis, P., K\u00f6lbl, S., Lange, T., Lauridsen, M.M., Mendel F., Niederhagen, R., Rechberger, C., Rijneveld, J., Schwabe, P., Westerbaan B.: SPHINCS+.2023. https:\/\/sphincs.org\/. Accessed October 1, 2020"},{"key":"150_CR6","doi-asserted-by":"crossref","unstructured":"Di Tullio, D., Gyawali, M.: A post-quantum key exchange protocol from the intersection of quadric surfaces. J. Supercomput. (2023)","DOI":"10.21203\/rs.3.rs-1920498\/v1"},{"key":"150_CR7","series-title":"Lecture Notes in Computer Science","volume-title":"Advances in Cryptology\u2013ASIACRYPT 2018","author":"W Castryck","year":"2018","unstructured":"Castryck, W., Lange, T., Martindale, C., Panny, L., Renes, J.: CSIDH: an efficient post-quantum commutative group action. In: Peyrin, T., Galbraith, S. (eds.) Advances in Cryptology\u2013ASIACRYPT 2018. Lecture Notes in Computer Science, vol. 11274. Springer, Cham (2018)"},{"key":"150_CR8","doi-asserted-by":"publisher","first-page":"209","DOI":"10.1515\/jmc-2012-0015","volume":"8","author":"L De Feo","year":"2014","unstructured":"De Feo, L., Jao, D., Pl\u00fbt, J.: Towards quantum-resistant cryptosystems from supersingular elliptic curve isogenies. J. Math. Cryptol. 8, 209\u2013247 (2014)","journal-title":"J. Math. Cryptol."},{"key":"150_CR9","doi-asserted-by":"publisher","first-page":"418","DOI":"10.1112\/S1461157014000151","volume":"17A","author":"D Kohel","year":"2014","unstructured":"Kohel, D., Lauter, K., Petit, C., Tignol, J.P.: On the quaternion $$l$$-isogeny path problem. LMS J. Comput. Math. 17A, 418\u2013432 (2014)","journal-title":"LMS J. Comput. Math."},{"key":"150_CR10","series-title":"LNCS","first-page":"164","volume-title":"ACNS 2005","author":"J Ding","year":"2005","unstructured":"Ding, J., Schmidt, D.: Rainbow, a new multivariate polynomial signature scheme. In: Ioannidis, J., Keromytis, A.D., Yung, M. (eds.) ACNS 2005. LNCS, vol. 3531, pp. 164\u2013175. Springer, Heidelberg (2005)"},{"key":"150_CR11","unstructured":"The National Institute of Standards and Technology (NIST), PQC Standardization Process: Third Round Candidate Announcement (2020)"},{"key":"150_CR12","series-title":"Lecture Notes in Computer Science","first-page":"2022","volume-title":"Advances in Cryptology\u2013CRYPTO 2022","author":"W Beullens","year":"2022","unstructured":"Beullens, W.: Breaking rainbow takes a weekend on a laptop. In: Dodis, Y., Shrimpton, T. (eds.) Advances in Cryptology\u2013CRYPTO 2022. Lecture Notes in Computer Science, vol. 13508, p. 2022. Springer, Cham. (2022)"},{"key":"150_CR13","series-title":"Lecture Notes in Computer Science","volume-title":"Selected Areas in Cryptography. SAC 2021","author":"W Beullens","year":"2022","unstructured":"Beullens, W.: MAYO: Practical post-quantum signatures from oil-and-vinegar maps. In: AlTawy, R., H\u00fclsing, A. (eds.) Selected Areas in Cryptography. SAC 2021. Lecture Notes in Computer Science, vol. 13203. Springer, Cham (2022)"},{"key":"150_CR14","unstructured":"Beullens, W., Chen, M., Hung, S., Kannwischer, M.J., Peng, B., Shih, C., Yang, B.: Oil and Vinegar: Modern Parameters and Implementations, Cryptology. ePrint Archive 2023\/059 (2023). https:\/\/eprint.iacr.org\/archive\/2023\/059\/20230410:075128"},{"key":"150_CR15","unstructured":"Omar, S., Padhye, S., Dey, D.: A new identity-based multivariate signature scheme. In: Giri, D., Raymond Choo, K.K., Ponnusamy, S., Meng, W., Akleylek, S., Prasad Maity, S. (eds) Proceedings of the Seventh International Conference on Mathematics and Computing. Advances in Intelligent Systems and Computing, vol 1412 (2022)"},{"key":"150_CR16","doi-asserted-by":"publisher","first-page":"13168","DOI":"10.1038\/s41598-022-15843-x","volume":"12","author":"R Kuang","year":"2022","unstructured":"Kuang, R., Perepechaenko, M., Barbeau, M.: A new quantum-safe multivariate polynomial public key digital signature algorithm. Sci. Rep. 12, 13168 (2022)","journal-title":"Sci. Rep."},{"key":"150_CR17","volume":"58","author":"N Kundu","year":"2021","unstructured":"Kundu, N., Debnath, S.K., Mishra, D.: A secure and efficient group signature scheme based on multivariate public key cryptography. J. Inf. Secur. Appl. 58, 102776 (2021)","journal-title":"J. Inf. Secur. Appl."},{"key":"150_CR18","series-title":"Lecture Notes in Computer Science","volume-title":"Post-Quantum Cryptography. PQCrypto 2022","author":"D Smith-Tone","year":"2022","unstructured":"Smith-Tone, D.: $$2$$F-a new method for constructing efficient multivariate encryption schemes. In: Cheon, J.H., Johansson, T. (eds.) Post-Quantum Cryptography. PQCrypto 2022. Lecture Notes in Computer Science, vol. 13512. Springer, Cham (2022)"},{"issue":"246","key":"150_CR19","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3571071","volume":"55","author":"J Dey","year":"2023","unstructured":"Dey, J., Dutta, R.: Progress in multivariate cryptography: systematic review, challenges, and research directions. ACM Comput. Surv. 55(246), 1\u201334 (2023)","journal-title":"ACM Comput. Surv."},{"key":"150_CR20","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511615436","volume-title":"Lectures on Invariant Theory","author":"I Dolgachev","year":"2003","unstructured":"Dolgachev, I.: Lectures on Invariant Theory. CUP, Cambridge (2003)"},{"key":"150_CR21","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-38010-5","volume-title":"Basic Algebraic Geometry 1","author":"IR Shafarevich","year":"2013","unstructured":"Shafarevich, I.R.: Basic Algebraic Geometry 1, 3rd edn. Springer, New York (2013)","edition":"3"},{"key":"150_CR22","unstructured":"Vakil, R.: The Rising Sea\u2014Foundations of Algebraic Geometry. http:\/\/math.stanford.edu\/~vakil\/216blog\/FOAGnov1817public.pdf"},{"key":"150_CR23","unstructured":"Salmon, G.: Higher Algebra, 5th edn. 1885. Reprinted by Chelsea, New York. https:\/\/archive.org\/details\/lessonsintroduc00salmgoog\/page\/n210\/mode\/2up (1964)"},{"key":"150_CR24","unstructured":"Abdelkerim, R.J.: Geometry of the Dual Grassmannian. PhD thesis, University of Illinois at Chicago (2011)"},{"key":"150_CR25","doi-asserted-by":"publisher","first-page":"771","DOI":"10.1016\/j.jalgebra.2006.01.015","volume":"303","author":"A Abdesselam","year":"2006","unstructured":"Abdesselam, A.: A computational solution to a question by Beauville on the invariants of the binary quintic. J. Algebra 303, 771\u2013788 (2006)","journal-title":"J. Algebra"},{"key":"150_CR26","volume-title":"Parametrizing Algebraic Varieties Using Lie Algebras","author":"J P\u00edlnikov\u00e1","year":"2006","unstructured":"P\u00edlnikov\u00e1, J.: Parametrizing Algebraic Varieties Using Lie Algebras. Research Institute for Symbolic Computations Johannes Kepler University Linz, Austria (2006)"},{"issue":"2","key":"150_CR27","doi-asserted-by":"publisher","first-page":"514","DOI":"10.1016\/j.jalgebra.2005.06.022","volume":"303","author":"WAD Graaf","year":"2006","unstructured":"Graaf, W.A.D., Harrison, M., P\u00edlnikov\u00e1, J., Schicho, J.: A Lie algebra method for rational parametrization of Severi\u2013Brauer surfaces. J. Algebra 303(2), 514\u2013529 (2006)","journal-title":"J. Algebra"},{"key":"150_CR28","unstructured":"Cannon, J., Bosma, W., Fieker, C., Steel, A. (eds.) Handbook of Magma Functions, Version 2.19. (2013). https:\/\/www.math.uzh.ch\/sepp\/magma-2.19.8-cr\/Handbook.pdf"}],"container-title":["Iran Journal of Computer Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s42044-023-00150-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s42044-023-00150-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s42044-023-00150-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T20:04:25Z","timestamp":1729713865000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s42044-023-00150-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,7,7]]},"references-count":28,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2023,12]]}},"alternative-id":["150"],"URL":"https:\/\/doi.org\/10.1007\/s42044-023-00150-z","relation":{},"ISSN":["2520-8438","2520-8446"],"issn-type":[{"value":"2520-8438","type":"print"},{"value":"2520-8446","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,7,7]]},"assertion":[{"value":"14 February 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"11 June 2023","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"7 July 2023","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"Authors declare that they have no financial or personal conflict of interest for the work completed in this paper.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}