{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,21]],"date-time":"2026-03-21T07:32:07Z","timestamp":1774078327131,"version":"3.50.1"},"reference-count":40,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2026]]},"DOI":"10.1109\/access.2026.3659061","type":"journal-article","created":{"date-parts":[[2026,1,28]],"date-time":"2026-01-28T21:00:22Z","timestamp":1769634022000},"page":"17264-17277","source":"Crossref","is-referenced-by-count":0,"title":["Seed Recovery From Probabilistic Leakage via Resource-Aware, Posterior-Guided Enumeration"],"prefix":"10.1109","volume":"14","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-0909-7091","authenticated-orcid":false,"given":"Val\u00e9rie","family":"Gauthier-Uma\u00f1a","sequence":"first","affiliation":[{"name":"Department of Systems and Computing Engineering, Universidad de los Andes, Bogot&#x00E1;, Colombia"}]},{"ORCID":"https:\/\/orcid.org\/0009-0008-6785-8972","authenticated-orcid":false,"given":"Andr\u00e9s M.","family":"Ochoa-Toro","sequence":"additional","affiliation":[{"name":"Department of Systems and Computing Engineering, Universidad de los Andes, Bogot&#x00E1;, Colombia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8682-4830","authenticated-orcid":false,"given":"Ricardo","family":"Villanueva-Polanco","sequence":"additional","affiliation":[{"name":"Department of Systems and Computing Engineering, Universidad del Norte, Barranquilla, Colombia"}]}],"member":"263","reference":[{"key":"ref1","volume-title":"PERK: Permuted Kernel Problem- Based Digital Signature Scheme Specification Version 2.0. Tech. Rep. Version 2.0. Submission To the NIST Post-Quantum Cryptography Standardization Process","author":"Aaraj","year":"2025"},{"key":"ref2","volume-title":"SQIsign","author":"Aardal","year":"2025"},{"key":"ref3","volume-title":"Mirath: Post-Quantum Digital Signature Scheme Specification","year":"2025"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-21554-4_4"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.46586\/tches.v2018.i3.173-213"},{"key":"ref6","volume-title":"RYDE: Rank Syndrome Decoding-Based Signature Scheme Specification","author":"Aragon","year":"2025"},{"key":"ref7","volume-title":"CROSS: Codes and Restricted Objects Signature Scheme\u2014Algorithm Specifications and Supporting Documentation","year":"2025"},{"key":"ref8","volume-title":"LESS: Linear Equivalence Signature Scheme Specification","author":"Baldi","year":"2025"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/s12095-022-00625-z"},{"key":"ref10","volume-title":"FAEST: Fast AES-Based Signatures With Tight Security","author":"Baum","year":"2025"},{"key":"ref11","volume-title":"MQOM: MQ on My Mind Algorithm Specifications and Supporting Documentation (Version 2.0). Tech. Rep. Version 2.0","author":"Benadjila","year":"2025"},{"key":"ref12","volume-title":"MAYO: Practical Post-Quantum Signatures From Oil-and-Vinegar Maps Specification","author":"Beullens","year":"2025"},{"key":"ref13","volume-title":"HAWK: Hash-and-Sign With Module LIP Specification","author":"Bos","year":"2025"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/s10623-025-01738-1"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.13053\/cys-28-4-5130"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-15982-4_12"},{"key":"ref17","volume-title":"QR-UOV: A Variant of Unbalanced Oil and Vinegar Using Quotient Ring","author":"Furue","year":"2025"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/1506409.1506429"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.62056\/aytxl86bm"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-14623-7_19"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-03356-8_1"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/securware.2010.42"},{"key":"ref23","volume-title":"UOV: Unbalanced Oil and Vinegar Signature Scheme","author":"Kipnis","year":"2025"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-14791-3_1"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-31912-9_6"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/ares.2015.28"},{"key":"ref27","volume-title":"The Syndrome Decoding in the Head (SD-in-the-Head) Signature Scheme Algorithm Specifications and Supporting Documentation","author":"Melchor","year":"2025"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-34961-4_24"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-71667-1_6"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-16715-2_24"},{"key":"ref31","doi-asserted-by":"crossref","DOI":"10.1007\/978-981-96-9098-5_6","volume-title":"Partial Key Exposure Attacks on UOV and Its Variants","author":"Seto","year":"2025"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.3390\/cryptography9010002"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-35999-6_25"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.3390\/e21100972"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-30530-7_3"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.3390\/app10124106"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-30530-7_3"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.3390\/app11010193"},{"key":"ref39","volume-title":"SNOVA: Simple Noncommutative Unbalanced Oil and Vinegar Scheme With Randomness Alignment","author":"Wang","year":"2025"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/ipfa49335.2020.9260613"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/6287639\/11323511\/11366684.pdf?arnumber=11366684","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,21]],"date-time":"2026-03-21T04:31:59Z","timestamp":1774067519000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11366684\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026]]},"references-count":40,"URL":"https:\/\/doi.org\/10.1109\/access.2026.3659061","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026]]}}}