{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T22:27:50Z","timestamp":1729636070274,"version":"3.28.0"},"reference-count":23,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1109\/itw.2006.1633775","type":"proceedings-article","created":{"date-parts":[[2006,5,25]],"date-time":"2006-05-25T20:26:01Z","timestamp":1148588761000},"page":"27-31","source":"Crossref","is-referenced-by-count":2,"title":["Inverting bijective polynomial maps over finite fields"],"prefix":"10.1109","author":[{"given":"A.","family":"Cafure","sequence":"first","affiliation":[]},{"given":"G.","family":"Matera","sequence":"additional","affiliation":[]},{"given":"A.","family":"Waissbein","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Modern Computer Algebra","year":"1999","author":"von zur gathen","key":"19"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4612-0129-8"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1006\/jcss.1995.1023"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1006\/jcom.2000.0571"},{"journal-title":"Finite Fields","year":"1983","author":"lidl","key":"18"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1016\/S0022-4049(97)00015-7"},{"key":"16","doi-asserted-by":"crossref","first-page":"593","DOI":"10.1016\/j.tcs.2004.01.009","article-title":"Deformation techniques to solve generalized Pham systems","volume":"315","author":"pardo","year":"2004","journal-title":"Theoret Comput Sci"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1016\/0304-3975(83)90002-6"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1007\/s10208-002-0065-7"},{"key":"11","first-page":"131","article-title":"A class of asymmetric crypto-systems based on polynomials over finite rings","author":"matsumoto","year":"1983","journal-title":"Abstracts IEEE Int Symp Inform Theory"},{"key":"12","article-title":"Taxonomy of public key schemes based on the problem of multivariate quadratic equations","volume":"2005","author":"wolf","year":"2005","journal-title":"Cryptology ePrint Archive Report"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1016\/0304-3975(83)90110-X"},{"journal-title":"Complexity of Gro?bner Basis Computation for Semi-regular Overdetermined Sequences over double-struck F sign2 with Solutions in double-struck F sign2","year":"2003","author":"bardet","key":"3"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4612-0265-3"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1007\/s000370050029"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1007\/978-94-011-1806-4"},{"key":"10","first-page":"71","article-title":"Efficient algorithms for solving overdefined systems of multivariate polynomial equations","volume":"1807","author":"courtois","year":"2000","journal-title":"Eurocrypt 2000"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1016\/j.ffa.2005.03.003"},{"key":"6","doi-asserted-by":"crossref","first-page":"64","DOI":"10.1007\/BF01202042","article-title":"Counting curves and their projections","volume":"6","author":"von zur gathen","year":"1997","journal-title":"Comput Complexity"},{"journal-title":"Computers and Intractability A Guide to the Theory of NP-Completeness","year":"1979","author":"garey","key":"5"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1090\/S0025-5718-06-01878-3"},{"key":"9","first-page":"19","article-title":"Cryptanalysis of the HFE Public Key Cryptosystem by relinearization","volume":"1666","author":"kipnis","year":"1999","journal-title":"Proc CrypTEC 99"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/FSCS.1990.89551"}],"event":{"name":"2006 IEEE Information Theory Workshop","location":"Punta del Este, Uruguay"},"container-title":["2006 IEEE Information Theory Workshop"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/10885\/34255\/01633775.pdf?arnumber=1633775","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,17]],"date-time":"2017-06-17T06:02:17Z","timestamp":1497679337000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1633775\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"references-count":23,"URL":"https:\/\/doi.org\/10.1109\/itw.2006.1633775","relation":{},"subject":[]}}