{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,24]],"date-time":"2026-01-24T14:29:42Z","timestamp":1769264982571,"version":"3.49.0"},"reference-count":34,"publisher":"Informa UK Limited","issue":"2","funder":[{"DOI":"10.13039\/100000161","name":"NIST","doi-asserted-by":"publisher","award":["60NANB17D184"],"award-info":[{"award-number":["60NANB17D184"]}],"id":[{"id":"10.13039\/100000161","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000001","name":"NSF","doi-asserted-by":"publisher","award":["183980,1906360"],"award-info":[{"award-number":["183980,1906360"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["www.tandfonline.com"],"crossmark-restriction":true},"short-container-title":["International Journal of Computer Mathematics: Computer Systems Theory"],"published-print":{"date-parts":[[2022,4,3]]},"DOI":"10.1080\/23799927.2022.2048206","type":"journal-article","created":{"date-parts":[[2022,3,2]],"date-time":"2022-03-02T05:33:15Z","timestamp":1646199195000},"page":"112-128","update-policy":"https:\/\/doi.org\/10.1080\/tandf_crossmark_01","source":"Crossref","is-referenced-by-count":21,"title":["Advanced signature functionalities from the code equivalence problem"],"prefix":"10.1080","volume":"7","author":[{"given":"Alessandro","family":"Barenghi","sequence":"first","affiliation":[{"name":"Politecnico di Milano, Milano, Italy"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8591-8408","authenticated-orcid":false,"given":"Jean-Fran\u00e7ois","family":"Biasse","sequence":"additional","affiliation":[{"name":"University of South Florida, Tampa, FL, USA"}]},{"given":"Tran","family":"Ngo","sequence":"additional","affiliation":[{"name":"Florida Atlantic University, Boca Raton, FL, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1895-377X","authenticated-orcid":false,"given":"Edoardo","family":"Persichetti","sequence":"additional","affiliation":[{"name":"Florida Atlantic University, Boca Raton, FL, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0631-3668","authenticated-orcid":false,"given":"Paolo","family":"Santini","sequence":"additional","affiliation":[{"name":"Universit\u00e0 Politecnica delle Marche, Ancona, Italy"}]}],"member":"301","published-online":{"date-parts":[[2022,3,24]]},"reference":[{"key":"CIT0001","unstructured":"Available at https:\/\/csrc.nist.gov\/Projects\/Post-Quantum-Cryptography, 2017."},{"key":"CIT0002","unstructured":"Available at https:\/\/csrc.nist.gov\/Presentations\/2021\/status-update-on-the-3rd-round, 2021."},{"key":"CIT0003","doi-asserted-by":"crossref","unstructured":"S.M.E.Y. Alaoui, P.L. Cayrel, and M. Mohammed, Improved identity-based identification and signature schemes using quasi-dyadic goppa codes, International Conference on Information Security and Assurance, Springer, Berlin, 2011, pp. 146\u2013155.","DOI":"10.1007\/978-3-642-23141-4_14"},{"key":"CIT0004","doi-asserted-by":"publisher","DOI":"10.1016\/j.sysarc.2019.101692"},{"key":"CIT0005","doi-asserted-by":"crossref","unstructured":"N. Aragon, O. Blazy, P. Gaborit, A. Hauteville, and G. Z\u00e9mor, Durandal: A rank metric based signature scheme, in Advances in Cryptology \u2013 EUROCRYPT 2019, Y. Ishai and V. Rijmen, eds., Springer International Publishing, Cham, 2019, pp. 728\u2013758.","DOI":"10.1007\/978-3-030-17659-4_25"},{"key":"CIT0006","doi-asserted-by":"crossref","unstructured":"F. Bao, R.H. Deng, and H. Zhu, Variations of diffie-hellman problem, International Conference on Information and Communications Security, Springer, Berlin, 2003, pp. 301\u2013312.","DOI":"10.1007\/978-3-540-39927-8_28"},{"key":"CIT0007","doi-asserted-by":"crossref","unstructured":"A. Barenghi, J.F. Biasse, E. Persichetti, and P. Santini, LESS-FM: Fine-tuning signatures from the code equivalence problem, International Conference on Post-Quantum Cryptography, Springer, Berlin, 2021, pp. 23\u201343.","DOI":"10.1007\/978-3-030-81293-5_2"},{"key":"CIT0008","doi-asserted-by":"crossref","unstructured":"A. Barenghi, J.F. Biasse, E. Persichetti, and P. Santini, LESS-FM: Fine-tuning signatures from the code equivalence problem, Cryptology ePrint Archive, Report 2021\/396, 2021, Available at https:\/\/eprint.iacr.org\/2021\/396.","DOI":"10.1007\/978-3-030-81293-5_2"},{"key":"CIT0009","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-008-9028-8"},{"key":"CIT0010","doi-asserted-by":"crossref","unstructured":"W. Beullens, Not enough LESS: An improved algorithm for solving code equivalence problems over  Fq, International Conference on Selected Areas in Cryptography, Springer, Berlin, 2020, pp. 387\u2013403.","DOI":"10.1007\/978-3-030-81652-0_15"},{"key":"CIT0011","first-page":"183","volume":"12107","author":"Beullens W.","year":"2020","journal-title":"EUROCRYPT (3)"},{"key":"CIT0012","doi-asserted-by":"crossref","unstructured":"W. Beullens, S. Katsumata, and F. Pintore, Calamari and falafl: Logarithmic (linkable) ring signatures from isogenies and lattices, International Conference on the Theory and Application of Cryptology and Information Security, Springer, Berlin, 2020, pp. 464\u2013492.","DOI":"10.1007\/978-3-030-64834-3_16"},{"key":"CIT0013","doi-asserted-by":"crossref","unstructured":"J.F. Biasse, G. Micheli, E. Persichetti, and P. Santini, LESS is more: Code-based signatures without syndromes, in AFRICACRYPT, A. Nitaj and A. Youssef, eds., Springer, Berlin, 2020, pp. 45\u201365.","DOI":"10.1007\/978-3-030-51938-4_3"},{"key":"CIT0014","doi-asserted-by":"crossref","unstructured":"P. Branco and P. Mateus, A code-based linkable ring signature scheme, International Conference on Provable Security, Springer, Berlin, 2018, pp. 203\u2013219.","DOI":"10.1007\/978-3-030-01446-9_12"},{"key":"CIT0015","doi-asserted-by":"crossref","unstructured":"P.L. Cayrel, P. Gaborit, and M. Girault, Identity-based identification and signature schemes using correcting codes, WCC, Vol. 2007, 2007, pp. 69\u201378.","DOI":"10.1109\/ISIT.2007.4557225"},{"key":"CIT0016","doi-asserted-by":"crossref","unstructured":"P.L. Cayrel, P. V\u00e9ron, and S.M. El Yousfi Alaoui, A zero-knowledge identification scheme based on the q-ary syndrome decoding problem, in Selected Areas in Cryptography, Springer, Berlin, 2011, pp. 171\u2013186.","DOI":"10.1007\/978-3-642-19574-7_12"},{"key":"#cr-split#-CIT0017.1","doi-asserted-by":"crossref","unstructured":"S. Chen, P. Zeng, K.K.R. Choo, and Q. Wang, An efficient ring signature scheme based on syndrome decoding problem, 2016 12th International Conference on Computational Intelligence and Security (CIS)","DOI":"10.1109\/CIS.2016.0060"},{"key":"#cr-split#-CIT0017.2","unstructured":"Wuxi, China, IEEE, 2016, pp. 228-232."},{"key":"CIT0018","doi-asserted-by":"crossref","unstructured":"N.T. Courtois, M. Finiasz, and N. Sendrier, How to achieve a McEliece-based digital signature scheme, in Advances in Cryptology \u2013 ASIACRYPT 2001, Lecture Notes in Computer Science, Vol. 2248, 2001, pp. 157\u2013174.","DOI":"10.1007\/3-540-45682-1_10"},{"key":"CIT0019","doi-asserted-by":"crossref","unstructured":"T. Debris-Alazard, N. Sendrier, and J.P. Tillich, Wave: A new family of trapdoor one-way preimage sampleable functions based on codes, ASIACRYPT, Springer, Berlin, 2019, pp. 21\u201351.","DOI":"10.1007\/978-3-030-34578-5_2"},{"key":"CIT0020","unstructured":"L. Ducas, E. Kiltz, T. Lepoint, V. Lyubashevsky, P. Schwabe, G. Seiler, and D. Stehl\u00e9, CRYSTALS-Dilithium, 2017. Available at https:\/\/pq-crystals.org\/dilithium\/."},{"key":"CIT0021","doi-asserted-by":"crossref","unstructured":"M. Finiasz and N. Sendrier, Security bounds for the design of code-based cryptosystems, International Conference on the Theory and Application of Cryptology and Information Security, Springer, Berlin, 2009, pp. 88\u2013105.","DOI":"10.1007\/978-3-642-10366-7_6"},{"key":"CIT0022","unstructured":"P.A. Fouque, J. Hoffstein, P. Kirchner, V. Lyubashevsky, T. Pornin, T. Prest, T. Ricosset, G. Seiler, W. Whyte, and Z. Zhang, FALCON: fast-Fourier lattice-based compact signatures over NTRU, 2017. Available at https:\/\/falcon-sign.info\/."},{"issue":"31","key":"CIT0023","first-page":"75","volume":"2","author":"Joye M.","year":"2009","journal-title":"Identity-based Cryptography"},{"key":"CIT0024","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1982.1056498"},{"key":"CIT0025","first-page":"114","volume":"44","author":"McEliece R.","year":"1978","journal-title":"Deep Space Network Progress Report"},{"key":"CIT0026","doi-asserted-by":"crossref","unstructured":"R.C. Merkle, A digital signature based on a conventional encryption function, Conference on the Theory and Application of Cryptographic Techniques, Springer, Berlin, 1987, pp. 369\u2013378.","DOI":"10.1007\/3-540-48184-2_32"},{"key":"CIT0027","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2967789"},{"key":"CIT0028","unstructured":"M.A. Saeed, Ph.D. diss., 2017."},{"key":"CIT0029","doi-asserted-by":"crossref","unstructured":"N. Sendrier, The support splitting algorithm, IEEE Trans. Inf. Theory (Aug 2000), pp. 1193\u20131203.","DOI":"10.1109\/18.850662"},{"key":"CIT0030","doi-asserted-by":"publisher","DOI":"10.1137\/S0097539795293172"},{"key":"CIT0031","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0182894"},{"key":"CIT0032","doi-asserted-by":"crossref","unstructured":"J. Stern, A new identification scheme based on syndrome decoding, in Advances in Cryptology \u2013 CRYPTO' 93, D.R. Stinson, eds., Springer, Berlin, 1994, pp. 13\u201321.","DOI":"10.1007\/3-540-48329-2_2"},{"issue":"2","key":"CIT0033","first-page":"154","volume":"5","author":"Zheng D.","year":"2007","journal-title":"Int. J. Netw. Secur."}],"container-title":["International Journal of Computer Mathematics: Computer Systems Theory"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.tandfonline.com\/doi\/pdf\/10.1080\/23799927.2022.2048206","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,25]],"date-time":"2022-05-25T09:41:50Z","timestamp":1653471710000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.tandfonline.com\/doi\/full\/10.1080\/23799927.2022.2048206"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,3,24]]},"references-count":34,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2022,4,3]]}},"alternative-id":["10.1080\/23799927.2022.2048206"],"URL":"https:\/\/doi.org\/10.1080\/23799927.2022.2048206","relation":{},"ISSN":["2379-9927","2379-9935"],"issn-type":[{"value":"2379-9927","type":"print"},{"value":"2379-9935","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,3,24]]},"assertion":[{"value":"The publishing and review policy for this title is described in its Aims & Scope.","order":1,"name":"peerreview_statement","label":"Peer Review Statement"},{"value":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=tcom20","URL":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=tcom20","order":2,"name":"aims_and_scope_url","label":"Aim & Scope"},{"value":"2021-11-10","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2022-02-17","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2022-03-24","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}