{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,5]],"date-time":"2025-10-05T04:33:50Z","timestamp":1759638830248,"version":"3.37.3"},"reference-count":56,"publisher":"Oxford University Press (OUP)","issue":"4","funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["U1135004, 61170080"],"award-info":[{"award-number":["U1135004, 61170080"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100003453","name":"Guangdong Provincial Natural Science Foundation","doi-asserted-by":"crossref","award":["2014A030308006"],"award-info":[{"award-number":["2014A030308006"]}],"id":[{"id":"10.13039\/501100003453","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["The Computer Journal"],"published-print":{"date-parts":[[2016,4]]},"DOI":"10.1093\/comjnl\/bxv056","type":"journal-article","created":{"date-parts":[[2015,8,8]],"date-time":"2015-08-08T01:22:32Z","timestamp":1438996952000},"page":"439-451","source":"Crossref","is-referenced-by-count":4,"title":["RGB, a Mixed Multivariate Signature Scheme"],"prefix":"10.1093","volume":"59","author":[{"given":"Wuqiang","family":"Shen","sequence":"first","affiliation":[]},{"given":"Shaohua","family":"Tang","sequence":"additional","affiliation":[]}],"member":"286","published-online":{"date-parts":[[2015,8,7]]},"reference":[{"key":"2016032809071874000_59.4.439.1","doi-asserted-by":"publisher","DOI":"10.1137\/S0097539795293172"},{"key":"2016032809071874000_59.4.439.2","unstructured":"Ding J. , Gower J.E. and Schmidt D.S. (2006) Multivariate Public Key Cryptosystems. Springer Science & Business Media, New York, USA."},{"key":"2016032809071874000_59.4.439.3","doi-asserted-by":"crossref","unstructured":"Berbain C. , Gilbert H. and Patarin J. (2006) QUAD: A Practical Stream Cipher with Provable Security. Proc. 25th Annual Int. Conf. Theory and Applications of Cryptographic Techniques (EUROCRYPT 2006), Saint Petersburg, Russia, May 28\u2013June 1, pp. 109\u2013128. Springer, Berlin.","DOI":"10.1007\/11761679_8"},{"key":"2016032809071874000_59.4.439.4","doi-asserted-by":"crossref","unstructured":"Bulygin S. , Petzoldt A. and Buchmann J. (2010) Towards Provable Security of the Unbalanced Oil and Vinegar Signature Scheme under Direct Attacks. Proc. 11th Int. Conf. Cryptology in India (INDOCRYPT 2010), Hyderabad, India, December 12\u201315, pp. 17\u201332. Springer, Berlin.","DOI":"10.1007\/978-3-642-17401-8_3"},{"key":"2016032809071874000_59.4.439.5","doi-asserted-by":"crossref","unstructured":"Sakumoto K. , Shirai T. and Hiwatari H. (2011) On Provable Security of UOV and HFE Signature Schemes against Chosen-Message Attack. Proc. 4th Int. Conf. Post-Quantum Cryptography (PQCrypto 2011), Taipei, Taiwan, November 29\u2013December 2, pp. 68\u201382. Springer, Berlin.","DOI":"10.1007\/978-3-642-25405-5_5"},{"key":"2016032809071874000_59.4.439.6","doi-asserted-by":"crossref","unstructured":"Sakumoto K. , Shirai T. and Hiwatari H. (2011) Public-Key Identification Schemes Based on Multivariate Quadratic Polynomials. Proc. 31st Annual Int. Cryptology Conf. (CRYPTO 2011), Santa Barbara, CA, USA, August 14\u201318, pp. 706\u2013723. Springer, Berlin.","DOI":"10.1007\/978-3-642-22792-9_40"},{"key":"2016032809071874000_59.4.439.7","doi-asserted-by":"crossref","unstructured":"Shen W. , Tang S. and Xu L. (2013) IBUOV, a Provably Secure Identity-Based UOV Signature Scheme. Proc. IEEE 16th Int. Conf. Computational Science and Engineering (CSE 2013), Sydney, Australia, December 3\u20135, pp. 388\u2013395. IEEE Press, Piscataway, NJ.","DOI":"10.1109\/CSE.2013.66"},{"key":"2016032809071874000_59.4.439.8","doi-asserted-by":"crossref","unstructured":"Matsumoto T. and Imai H. (1988) Public Quadratic Polynomial-Tuples for Efficient Signature-Verification and Message-Encryption. Proc. Workshop on the Theory and Application of Cryptographic Techniques (EUROCRYPT'88), Davos, Switzerland, May 25\u201327, pp. 419\u2013453. Springer, Berlin.","DOI":"10.1007\/3-540-45961-8_39"},{"key":"2016032809071874000_59.4.439.9","doi-asserted-by":"crossref","unstructured":"Patarin J. (1996) Hidden Fields Equations (HFE) and Isomorphisms of Polynomials (IP): Two New Families of Asymmetric Algorithms. Proc. 15th Annual Int. Conf. Theory and Application of Cryptographic Techniques(EUROCRYPT'96), Saragossa, Spain, May 12\u201316, pp. 33\u201348. Springer, Berlin.","DOI":"10.1007\/3-540-68339-9_4"},{"key":"2016032809071874000_59.4.439.10","doi-asserted-by":"crossref","unstructured":"Kipnis A. and Shamir A. (1999) Cryptanalysis of the HFE Public Key Cryptosystem by Relinearization. Proc. 19th Annual Int. Cryptology Conf. (CRYPTO'99), Santa Barbara, CA, USA, August 15\u201319, pp. 19\u201330. Springer, Berlin.","DOI":"10.1007\/3-540-48405-1_2"},{"key":"2016032809071874000_59.4.439.11","doi-asserted-by":"crossref","unstructured":"Kipnis A. and Shamir A. (1998) Cryptanalysis of the Oil and Vinegar Signature Scheme. Proc. 18th Annual Int. Cryptology Conf. (CRYPTO'98), Santa Barbara, CA, USA, August 23\u201327, pp. 257\u2013266. Springer, Berlin.","DOI":"10.1007\/BFb0055733"},{"key":"2016032809071874000_59.4.439.12","doi-asserted-by":"crossref","unstructured":"Kipnis A. , Patarin J. and Goubin L. (1999) Unbalanced Oil and Vinegar Signature Schemes. Proc. 18th Annual Int. Conf. Theory and Application of Cryptographic Techniques (EUROCRYPT'99), Prague, Czech Republic, May 2\u20136, pp. 206\u2013222. Springer, Berlin.","DOI":"10.1007\/3-540-48910-X_15"},{"key":"2016032809071874000_59.4.439.13","doi-asserted-by":"crossref","unstructured":"Akkar M.-L. , Courtois N.T. , Duteuil R. and Goubin L. (2003) A Fast and Secure Implementation of Sflash. Proc. 6th Int. Workshop on Practice and Theory in Public Key Cryptography (PKC 2003), Miami, FL, USA, January 6\u20138, pp. 267\u2013278. Springer, Berlin.","DOI":"10.1007\/3-540-36288-6_20"},{"key":"2016032809071874000_59.4.439.14","doi-asserted-by":"crossref","unstructured":"Patarin J. , Goubin L. and Courtois N. (1998) $C_{-+}^*$ and HM: Variations Around Two Schemes of T. Matsumoto and H. Imai. Proc. 4th Annual Int. Conf. Theory and Application of Cryptology and Information Security (ASIACRYPT'98), Beijing, China, October 18\u201322, pp. 35\u201350. Springer, Berlin.","DOI":"10.1007\/3-540-49649-1_4"},{"key":"2016032809071874000_59.4.439.15","doi-asserted-by":"crossref","unstructured":"Ding J. (2004) A New Variant of the Matsumoto\u2013Imai Cryptosystem through Perturbation. Proc. 7th Int. Workshop on Practice and Theory in Public Key Cryptography (PKC 2004), Singapore, March 1\u20134, pp. 305\u2013318. Springer, Berlin.","DOI":"10.1007\/978-3-540-24632-9_22"},{"key":"2016032809071874000_59.4.439.16","doi-asserted-by":"crossref","unstructured":"Ding J. and Gower J.E. (2006) Inoculating Multivariate Schemes Against Differential Attacks. Proc. 9th Int. Conf. Theory and Practice of Public Key Cryptography (PKC 2006), New York, NY, USA, April 24\u201326, pp. 290\u2013301. Springer, Berlin.","DOI":"10.1007\/11745853_19"},{"key":"2016032809071874000_59.4.439.17","doi-asserted-by":"crossref","unstructured":"Ding J. and Schmidt D. (2005) Cryptanalysis of HFEv and Internal Perturbation of HFE. Proc. 8th Int. Workshop on Practice and Theory in Public Key Cryptography (PKC 2005), Les Diablerets, Switzerland, January 23\u201326, pp. 288\u2013301. Springer, Berlin.","DOI":"10.1007\/978-3-540-30580-4_20"},{"key":"2016032809071874000_59.4.439.18","doi-asserted-by":"crossref","unstructured":"Patarin J. , Courtois N. and Goubin L. (2001) Quartz, 128-Bit Long Digital Signatures. Proc. Cryptographers' Track at RSA Conf. 2001 (CT-RSA 2001), San Francisco, CA, USA, April 8\u201312, pp. 282\u2013297. Springer, Berlin.","DOI":"10.1007\/3-540-45353-9_21"},{"key":"2016032809071874000_59.4.439.19","doi-asserted-by":"crossref","unstructured":"Huang Y.-J. , Liu F.-H. and Yang B.-Y. (2012) Public-Key Cryptography from New Multivariate Quadratic Assumptions. Proc. 15th Int. Conf. Theory and Practice of Public Key Cryptography (PKC 2012), Darmstadt, Germany, May 21\u201323, pp. 190\u2013205. Springer, Berlin.","DOI":"10.1007\/978-3-642-30057-8_12"},{"key":"2016032809071874000_59.4.439.20","doi-asserted-by":"crossref","unstructured":"Yasuda T. , Takagi T. and Sakurai K. (2013) Multivariate Signature Scheme Using Quadratic Forms. Proc. 5th Int. Conf. Post-Quantum Cryptography (PQCrypto 2013), Limoges, France, June 4\u20137, pp. 243\u2013258. Springer, Berlin.","DOI":"10.1007\/978-3-642-38616-9_17"},{"key":"2016032809071874000_59.4.439.21","doi-asserted-by":"publisher","DOI":"10.1007\/s10623-011-9582-1"},{"key":"2016032809071874000_59.4.439.22","doi-asserted-by":"crossref","unstructured":"Tao C. , Diene A. , Tang S. and Ding J. (2013) Simple Matrix Scheme for Encryption. Proc. 5th Int. Conf. Post-Quantum Cryptography (PQCrypto 2013), Limoges, France, June 4\u20137, pp. 231\u2013242. Springer, Berlin.","DOI":"10.1007\/978-3-642-38616-9_16"},{"key":"2016032809071874000_59.4.439.23","doi-asserted-by":"crossref","unstructured":"Yasuda T. , Ding J. , Takagi T. and Sakurai K. (2013) A Variant of Rainbow with Shorter Secret Key and Faster Signature Generation. Proc. 1st ACM Workshop on ASIA Public-Key Cryptography (ASIAPKC'13), Hangzhou, China, May 7, pp. 57\u201362. ACM, New York.","DOI":"10.1145\/2484389.2484401"},{"key":"2016032809071874000_59.4.439.24","doi-asserted-by":"crossref","unstructured":"Zhang W. and Tan C.H. (2014) A New Perturbed Matsumoto\u2013Imai Signature Scheme. Proc. 2nd ACM Workshop on ASIA Public-Key Cryptography (ASIAPKC'14), Kyoto, Japan, June 3, pp. 43\u201348. ACM, New York.","DOI":"10.1145\/2600694.2600698"},{"key":"2016032809071874000_59.4.439.25","doi-asserted-by":"crossref","unstructured":"Yasuda T. , Takagi T. and Sakurai K. (2014) Efficient Variant of Rainbow without Triangular Matrix Representation. Proc. Information and Communication Technology \u2013 EURASIA Conf. (ICT-EURASIA 2014), Bali, Indonesia, April 14\u201317, pp. 532\u2013541. Springer, Berlin.","DOI":"10.1007\/978-3-642-55032-4_55"},{"key":"2016032809071874000_59.4.439.26","first-page":"3","article-title":"Efficient variant of rainbow using sparse secret keys","volume":"5","author":"Yasuda","year":"2014","journal-title":"J. Wirel. Mob. Netw. Ubiquit. Comput. Dependable Appl."},{"key":"2016032809071874000_59.4.439.27","doi-asserted-by":"crossref","unstructured":"Ding J. , Petzoldt A. and Wang L.-C. (2014) The Cubic Simple Matrix Encryption Scheme. Proc. 6th Int. Conf. Post-Quantum Cryptography (PQCrypto 2014), Waterloo, ON, Canada, October 1\u20133, pp. 76\u201387. Springer International Publishing, Switzerland.","DOI":"10.1007\/978-3-319-11659-4_5"},{"key":"2016032809071874000_59.4.439.28","doi-asserted-by":"crossref","unstructured":"Porras J. , Baena J. and Ding J. (2014) ZHFE, a New Multivariate Public Key Encryption Scheme. Proc. 6th Int. Conf. Post-Quantum Cryptography (PQCrypto 2014), Waterloo, ON, Canada, October 1\u20133, pp. 229\u2013245. Springer International Publishing, Switzerland.","DOI":"10.1007\/978-3-319-11659-4_14"},{"key":"2016032809071874000_59.4.439.29","doi-asserted-by":"crossref","unstructured":"Patarin J. (1996) Asymmetric Cryptography with a Hidden Monomial. Proc. 16th Annual Int. Cryptology Conf. (CRYPTO'96), Santa Barbara, CA, USA, August 18\u201322, pp. 45\u201360. Springer, Berlin.","DOI":"10.1007\/3-540-68697-5_4"},{"key":"2016032809071874000_59.4.439.30","first-page":"1","article-title":"Little dragon two: an efficient multivariate public key cryptosystem","volume":"2","author":"Singh","year":"2010","journal-title":"Int. J. Netw. Secur. Appl."},{"key":"2016032809071874000_59.4.439.31","doi-asserted-by":"crossref","first-page":"349","DOI":"10.1515\/jmc.2011.002","article-title":"Poly-dragon: an efficient multivariate public key cryptosystem","volume":"4","author":"Singh","year":"2011","journal-title":"J. Math. Cryptol."},{"key":"2016032809071874000_59.4.439.32","doi-asserted-by":"crossref","first-page":"80","DOI":"10.1016\/S1005-8885(09)60492-1","article-title":"Cryptanalysis of dragon scheme","volume":"17","author":"Yuan","year":"2010","journal-title":"J. China Univ. Posts Telecommun."},{"key":"2016032809071874000_59.4.439.33","doi-asserted-by":"crossref","unstructured":"Buchmann J. , Bulygin S. , Ding J. , Mohamed W.S.A.E. and Werner F. (2010) Practical Algebraic Cryptanalysis for Dragon-Based Cryptosystems. Proc. 9th Int. Conf. Cryptology And Network Security (CANS 2010), Kuala Lumpur, Malaysia, December 12\u201314, pp. 140\u2013155. Springer, Berlin.","DOI":"10.1007\/978-3-642-17619-7_11"},{"key":"2016032809071874000_59.4.439.34","doi-asserted-by":"publisher","DOI":"10.1007\/s00200-013-0190-3"},{"key":"2016032809071874000_59.4.439.35","doi-asserted-by":"crossref","unstructured":"Buss J.F. , Frandsen G.S. and Shallit J.O. (1997) The Computational Complexity of Some Problems of Linear Algebra. Proc. 14th Annual Symp. Theoretical Aspects of Computer Science (STACS 97), L\u00fcbeck, Germany, February 27\u2013March 1, pp. 451\u2013462. Springer, Berlin.","DOI":"10.1007\/BFb0023480"},{"key":"2016032809071874000_59.4.439.36","doi-asserted-by":"crossref","unstructured":"Faug\u00e8re J.-C. , Levy-Dit-Vehel F. and Perret L. (2008) Cryptanalysis of MinRank. Proc. 28th Int. Cryptology Conf. (CRYPTO 2008), Santa Barbara, CA, USA, August 17\u201321, pp. 280\u2013296. Springer, Berlin.","DOI":"10.1007\/978-3-540-85174-5_16"},{"key":"2016032809071874000_59.4.439.37","doi-asserted-by":"crossref","unstructured":"Buchberger B. (1979) A Criterion for Detecting Unnecessary Reductions in the Construction of Gr\u00f6bner\u2013Bases. Proc. Int. Symp. Symbolic and Algebraic Manipulation (EUROSM '79), Marseille, France, June 1\u20132, pp. 3\u201321. Springer, Berlin.","DOI":"10.1007\/3-540-09519-5_52"},{"key":"2016032809071874000_59.4.439.38","doi-asserted-by":"publisher","DOI":"10.1016\/S0022-4049(99)00005-5"},{"key":"2016032809071874000_59.4.439.39","doi-asserted-by":"crossref","unstructured":"Faug\u00e8re J.C. (2002) A New Efficient Algorithm for Computing Gr\u00f6bner Bases without Reduction to Zero ( ${F}_5$ ). Proc. 2002 Int. Symp. Symbolic and Algebraic Computation (ISSAC 2002), Lille, France, July 7\u201310, pp. 75\u201383. ACM, New York.","DOI":"10.1145\/780506.780516"},{"key":"2016032809071874000_59.4.439.40","doi-asserted-by":"crossref","unstructured":"Courtois N. , Klimov A. , Patarin J. and Shamir A. (2000) Efficient Algorithms for Solving Overdefined Systems of Multivariate Polynomial Equations. Proc. 19th Annual Int. Conf. Theory and Applications of Cryptographic Techniques (EUROCRYPT 2000), Bruges, Belgium, May 14\u201318, pp. 392\u2013407. Springer, Berlin.","DOI":"10.1007\/3-540-45539-6_27"},{"key":"2016032809071874000_59.4.439.41","doi-asserted-by":"crossref","unstructured":"Thomae E. and Wolf C. (2012) Cryptanalysis of Enhanced TTS, STS and All Its Variants, or: Why Cross-Terms Are Important. Proc. 5th Annual Int. Conf. Cryptology in Africa (AFRICACRYPT 2012), Ifrance, Morocco, July 10\u201312, pp. 188\u2013202. Springer, Berlin.","DOI":"10.1007\/978-3-642-31410-0_12"},{"key":"2016032809071874000_59.4.439.42","doi-asserted-by":"crossref","unstructured":"Ding J. , Yang B.-Y. , Chen C.-H.O. , Chen M.-S. and Cheng C.-M. (2008) New Differential-Algebraic Attacks and Reparametrization of Rainbow. Proc. 6th Int. Conf. Applied Cryptography and Network Security (ACNS 2008), New York, USA, June 3\u20136, pp. 242\u2013257. Springer, Berlin.","DOI":"10.1007\/978-3-540-68914-0_15"},{"key":"2016032809071874000_59.4.439.43","doi-asserted-by":"crossref","unstructured":"Petzoldt A. , Bulygin S. and Buchmann J. (2010) CyclicRainbow\u2013a Multivariate Signature Scheme with a Partially Cyclic Public Key. Proc. 11th Int. Conf. Cryptology in India (INDOCRYPT 2010), Hyderabad, India, December 12\u201315, pp. 33\u201348. Springer, Berlin.","DOI":"10.1007\/978-3-642-17401-8_4"},{"key":"2016032809071874000_59.4.439.44","doi-asserted-by":"crossref","unstructured":"Patarin J. (1995) Cryptanalysis of the Matsumoto and Imai Public Key Scheme of Eurocrypt'88. Proc. 15th Annual Int. Cryptology Conf. (CRYPTO'99), Santa Barbara, CA, USA, August 27\u201331, pp. 248\u2013261. Springer, Berlin.","DOI":"10.1007\/3-540-44750-4_20"},{"key":"2016032809071874000_59.4.439.45","doi-asserted-by":"crossref","unstructured":"Fouque P.-A. , Granboulan L. and Stern J. (2005) Differential Cryptanalysis for Multivariate Schemes. Proc. 24th Annual Int. Conf. Theory and Applications of Cryptographic Techniques (EUROCRYPT 2005), Aarhus, Denmark, May 22\u201326, pp. 341\u2013353. Springer, Berlin.","DOI":"10.1007\/11426639_20"},{"key":"2016032809071874000_59.4.439.46","doi-asserted-by":"crossref","unstructured":"Courtois N.T. (2001) The Security of Hidden Field Equations (HFE). Proc. Cryptographers' Track at RSA Conf. 2001 (CT-RSA 2001), San Francisco, CA, USA, April 8\u201312, pp. 266\u2013281. Springer, Berlin.","DOI":"10.1007\/3-540-45353-9_20"},{"key":"2016032809071874000_59.4.439.47","doi-asserted-by":"crossref","unstructured":"Ars G. , Faug\u00e8re J.-C. , Imai H. , Kawazoe M. and Sugita M. (2004) Comparison between XL and Gr\u00f6bner Basis Algorithms. Proc. 10th Int. Conf. Theory and Application of Cryptology and Information Security (ASIACRYPT 2004), Jeju Island, Korea, December 5\u20139, pp. 338\u2013353. Springer, Berlin.","DOI":"10.1007\/978-3-540-30539-2_24"},{"key":"2016032809071874000_59.4.439.48","doi-asserted-by":"crossref","unstructured":"Jiang X. , Ding J. and Hu L. (2008) Kipnis\u2013Shamir Attack on HFE Revisited. Proc. 3rd Int. SKLOIS Conf. Information Security and Cryptology (Inscrypt 2007), Xining, China, August 31\u2013September 5, pp. 399\u2013411. Springer, Berlin.","DOI":"10.1007\/978-3-540-79499-8_31"},{"key":"2016032809071874000_59.4.439.49","doi-asserted-by":"crossref","unstructured":"Ding J. , Gower J.E. , Schmidt D. , Wolf C. and Yin Z. (2005) Complexity Estimates for the $F_4$ Attack on the Perturbed Matsumoto\u2013Imai Cryptosystem. Proc. 10th IMA Int. Conf. Cryptography and Coding, Cirencester, UK, December 19\u201321, pp. 262\u2013277. Springer, Berlin.","DOI":"10.1007\/11586821_18"},{"key":"2016032809071874000_59.4.439.50","doi-asserted-by":"crossref","first-page":"177","DOI":"10.1515\/JMC.2009.009","article-title":"Hybrid approach for solving multivariate systems over finite fields","volume":"3","author":"Bettale","year":"2009","journal-title":"J. Math. Cryptol."},{"key":"2016032809071874000_59.4.439.51","doi-asserted-by":"crossref","unstructured":"Thomae E. and Wolf C. (2012) Solving Underdetermined Systems of Multivariate Quadratic Equations Revisited. Proc. 15th Int. Conf. Practice and Theory of Public Key Cryptography (PKC 2012), Darmstadt, Germany, May 21\u201323, pp. 156\u2013171. Springer, Berlin.","DOI":"10.1007\/978-3-642-30057-8_10"},{"key":"2016032809071874000_59.4.439.52","doi-asserted-by":"crossref","unstructured":"Courtois N.T. (2004) Algebraic Attacks over $GF(2^k)$ , Application to HFE Challenge 2 and Sflash-v2. Proc. 7th Int. Workshop on Practice and Theory in Public Key Cryptography (PKC 2004), Singapore, March 1\u20134, pp. 201\u2013217. Springer, Berlin.","DOI":"10.1007\/978-3-540-24632-9_15"},{"key":"2016032809071874000_59.4.439.53","doi-asserted-by":"crossref","unstructured":"Hoffstein J. , Howgrave-Graham N. , Pipher J. , Silverman J.H. and Whyte W. (2003) NTRUSign: Digital Signatures Using the NTRU Lattice. Proc. Cryptographers' Track at RSA Conf. 2003 (CT-RSA 2003), San Francisco, CA, USA, April 13\u201317, pp. 122\u2013140. Springer, Berlin.","DOI":"10.1007\/3-540-36563-X_9"},{"key":"2016032809071874000_59.4.439.54","doi-asserted-by":"publisher","DOI":"10.1145\/359340.359342"},{"key":"2016032809071874000_59.4.439.55","doi-asserted-by":"crossref","first-page":"41","DOI":"10.1145\/129902.129905","article-title":"Responses to NIST's proposal","volume":"35","author":"Rivest","year":"1992","journal-title":"Commun. ACM"},{"key":"2016032809071874000_59.4.439.56","doi-asserted-by":"publisher","DOI":"10.1007\/s102070100002"}],"container-title":["The Computer Journal"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/academic.oup.com\/comjnl\/article-pdf\/59\/4\/439\/7902542\/bxv056.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,5,15]],"date-time":"2020-05-15T17:20:28Z","timestamp":1589563228000},"score":1,"resource":{"primary":{"URL":"https:\/\/academic.oup.com\/comjnl\/article-lookup\/doi\/10.1093\/comjnl\/bxv056"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,8,7]]},"references-count":56,"journal-issue":{"issue":"4","published-online":{"date-parts":[[2016,3,28]]},"published-print":{"date-parts":[[2016,4]]}},"alternative-id":["10.1093\/comjnl\/bxv056"],"URL":"https:\/\/doi.org\/10.1093\/comjnl\/bxv056","relation":{},"ISSN":["0010-4620","1460-2067"],"issn-type":[{"type":"print","value":"0010-4620"},{"type":"electronic","value":"1460-2067"}],"subject":[],"published":{"date-parts":[[2015,8,7]]}}}