{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,7]],"date-time":"2026-04-07T13:42:34Z","timestamp":1775569354951,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":25,"publisher":"ACM","license":[{"start":{"date-parts":[[2009,7,28]],"date-time":"2009-07-28T00:00:00Z","timestamp":1248739200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2009,7,28]]},"DOI":"10.1145\/1576702.1576732","type":"proceedings-article","created":{"date-parts":[[2009,7,28]],"date-time":"2009-07-28T12:45:28Z","timestamp":1248785128000},"page":"207-214","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":9,"title":["High order derivatives and decomposition of multivariate polynomials"],"prefix":"10.1145","author":[{"given":"Jean-Charles","family":"Faug\u00e8re","sequence":"first","affiliation":[{"name":"LIP6\/INRIA, Paris, France"}]},{"given":"Ludovic","family":"Perret","sequence":"additional","affiliation":[{"name":"LIP6\/INRIA, Paris, France"}]}],"member":"320","published-online":{"date-parts":[[2009,7,28]]},"reference":[{"key":"e_1_3_2_1_1_1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"150","DOI":"10.1007\/3-540-15984-3_249","volume-title":"Proc. EUROCAL85","author":"Alagar V. S.","year":"1985","unstructured":"V. S. Alagar and M. Thanh . Fast Polynomial Decomposition Algorithms . In Proc. EUROCAL85 , Lecture Notes in Computer Science , vol. 204 , pp. 150 -- 153 , Springer--Verlag , 1985 . V. S. Alagar and M. Thanh. Fast Polynomial Decomposition Algorithms. In Proc. EUROCAL85, Lecture Notes in Computer Science, vol. 204, pp. 150--153, Springer--Verlag, 1985."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0747-7171(85)80012-2"},{"key":"e_1_3_2_1_4_1","unstructured":"B. Buchberger. Ein algorithmisches Kriterium fur die L&amp;#353;&amp;#199;ssbarkeit eines algebraischen Gleichungssystems (An Algorithmical Criterion for the Solvability of Algebraic Systems of Equations) Aequationes mathematicae 4\/3 1970 pp. 374--383. (English translation in: B. Buchberger F. Winkler (eds.) Gr&amp;#246;bner Bases and Applications Proc. of the International Conference \"33 Years of Gr&amp;#246;bner Bases\" 1998 RISC Austria London Mathematical Society Lecture Note Series Vol. 251 Cambridge University Press 1998 pp. 535--545.).  B. Buchberger. Ein algorithmisches Kriterium fur die L&amp;#353;&amp;#199;ssbarkeit eines algebraischen Gleichungssystems (An Algorithmical Criterion for the Solvability of Algebraic Systems of Equations) Aequationes mathematicae 4\/3 1970 pp. 374--383. (English translation in: B. Buchberger F. Winkler (eds.) Gr&amp;#246;bner Bases and Applications Proc. of the International Conference \"33 Years of Gr&amp;#246;bner Bases\" 1998 RISC Austria London Mathematical Society Lecture Note Series Vol. 251 Cambridge University Press 1998 pp. 535--545.)."},{"key":"e_1_3_2_1_5_1","volume-title":"Bose","author":"Buchberger B.","year":"1985","unstructured":"B. Buchberger . Gr&amp;#246;bner Bases : an Algorithmic Method in Polynomial Ideal Theory. Recent trends in multidimensional systems theory. Reider ed . Bose , 1985 . B. Buchberger. Gr&amp;#246;bner Bases: an Algorithmic Method in Polynomial Ideal Theory. Recent trends in multidimensional systems theory. Reider ed. Bose, 1985."},{"key":"e_1_3_2_1_6_1","volume-title":"Computer Algebra Symbolic and Algebraic Computation","author":"Buchberger B.","year":"1982","unstructured":"B. Buchberger , G.-E. Collins , and R. Loos . Computer Algebra Symbolic and Algebraic Computation . Springer-Verlag , second edition, 1982 . B. Buchberger, G.-E. Collins, and R. Loos. Computer Algebra Symbolic and Algebraic Computation. Springer-Verlag, second edition, 1982."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.5555\/1648393.1648497"},{"key":"e_1_3_2_1_8_1","volume-title":"an Introduction to Computational Algebraic Geometry and Commutative Algebra. Undergraduate Texts in Mathematics","author":"Cox D. A.","year":"1992","unstructured":"D. A. Cox , J. B. Little , and D. O'Shea . Ideals, Varieties, and Algorithms : an Introduction to Computational Algebraic Geometry and Commutative Algebra. Undergraduate Texts in Mathematics . Springer-Verlag . New York, 1992 . D. A. Cox, J. B. Little, and D. O'Shea. Ideals, Varieties, and Algorithms: an Introduction to Computational Algebraic Geometry and Commutative Algebra. Undergraduate Texts in Mathematics. Springer-Verlag. New York, 1992."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1142\/S0129054193000109"},{"key":"e_1_3_2_1_11_1","first-page":"88","author":"Dorey F.","year":"1974","unstructured":"F. Dorey and G. Whaples . Prime and composite polynomials. J. Algebra,(28) , pp. 88 -- 101 , 1974 . F. Dorey and G. Whaples. Prime and composite polynomials. J. Algebra,(28), pp. 88--101, 1974.","journal-title":"Prime and composite polynomials. J. Algebra,(28)"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/780506.780516"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"crossref","unstructured":"J.-C.\n      Faug\n    &amp;#232;re L.\n      Perret\n    .\n  Cryptanalysis of 2R- schemes. Advances in Cryptology - CRYPTO\n  2006 Lecture Notes in Computer Science vol. \n  4117 pp. \n  357\n  --\n  372 Springer-Verlag 2006.  J.-C. Faug&amp;#232;re L. Perret. Cryptanalysis of 2R- schemes. Advances in Cryptology - CRYPTO 2006 Lecture Notes in Computer Science vol. 4117 pp. 357--372 Springer-Verlag 2006.","DOI":"10.1007\/11818175_21"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jsc.2008.02.005"},{"key":"e_1_3_2_1_15_1","first-page":"369","volume-title":"First International Conference (ICICS'97)","volume":"1334","author":"Goubin L.","year":"1997","unstructured":"L. Goubin , and J. Patarin . Asymmetric Cryptography with S-Boxes. Information and Communication Security , First International Conference (ICICS'97) , Lecture Notes in Computer Science vol. 1334 , Springer-Verlag, pp. 369 -- 380 , 1997 . L. Goubin, and J. Patarin. Asymmetric Cryptography with S-Boxes. Information and Communication Security, First International Conference (ICICS'97), Lecture Notes in Computer Science vol. 1334, Springer-Verlag, pp. 369--380, 1997."},{"key":"e_1_3_2_1_16_1","unstructured":"L. Goubin and J. Patarin. Asymmetric Cryptography with S-Boxes (Exentended version). http:\/\/citeseer.ist.psu.edu\/patarin97asymmetric.html 1997.  L. Goubin and J. Patarin. Asymmetric Cryptography with S-Boxes (Exentended version). http:\/\/citeseer.ist.psu.edu\/patarin97asymmetric.html 1997."},{"issue":"1","key":"e_1_3_2_1_17_1","first-page":"11","volume":"14","author":"Gutierrez J.","unstructured":"J. Gutierrez , R. Rubio , J. von zur Gathen . Multivariate Polynomial Decomposition . Algebra in Engineering , Communication and Computing , 14 ( 1 ), pp. 11 -- 31 . J. Gutierrez, R. Rubio, J. von zur Gathen. Multivariate Polynomial Decomposition. Algebra in Engineering, Communication and Computing, 14 (1), pp. 11--31.","journal-title":"Communication and Computing"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jsc.2005.05.009"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1006\/jsco.2000.0529"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0747-7171(89)80027-6"},{"key":"e_1_3_2_1_21_1","author":"Ritt J. F.","year":"1922","unstructured":"J. F. Ritt . Prime and Composite Polynomials. Trans. Amer. Math. Soc., (23), pp 51--66 , 1922 . J. F. Ritt. Prime and Composite Polynomials. Trans. Amer. Math. Soc., (23), pp 51--66, 1922.","journal-title":"Polynomials. Trans. Amer. Math. Soc., (23), pp 51--66"},{"key":"e_1_3_2_1_22_1","volume-title":"Determine the Algebraic and Transcendental Nature of Field Extensions: Return of the Killer Tag Variables. Proc. AAECC, 66--75","author":"Sweedler M.","year":"1993","unstructured":"M. Sweedler . Using Gr &amp;#246;bner Bases to Determine the Algebraic and Transcendental Nature of Field Extensions: Return of the Killer Tag Variables. Proc. AAECC, 66--75 , 1993 . M. Sweedler. Using Gr&amp;#246;bner Bases to Determine the Algebraic and Transcendental Nature of Field Extensions: Return of the Killer Tag Variables. Proc. AAECC, 66--75, 1993."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0747-7171(08)80014-4"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0747-7171(08)80054-5"},{"key":"e_1_3_2_1_25_1","first-page":"353","volume-title":"Functional Decomposition of Symbolic Polynomials. In Proc. International Conference on Computational Sciences and its Applications, (ICCSA","author":"Watt S. M.","year":"2008","unstructured":"S. M. Watt . Functional Decomposition of Symbolic Polynomials. In Proc. International Conference on Computational Sciences and its Applications, (ICCSA 2008 ), IEEE Computer Society , pp. 353 -- 362 . S. M. Watt. Functional Decomposition of Symbolic Polynomials. In Proc. International Conference on Computational Sciences and its Applications, (ICCSA 2008), IEEE Computer Society, pp. 353--362."},{"key":"e_1_3_2_1_26_1","first-page":"315","volume-title":"CRYPTO 1999","volume":"1666","author":"Ye D.F.","year":"1999","unstructured":"D.F. Ye , K.Y. Lam , Z.D. Dai . Cryptanalysis of \"2R\" Schemes , Advances in Cryptology - CRYPTO 1999 , Lecture Notes in Computer Science , vol. 1666 , Springer-Verlag, pp. 315 -- 325 , 1999 . D.F. Ye, K.Y. Lam, Z.D. Dai. Cryptanalysis of \"2R\" Schemes, Advances in Cryptology - CRYPTO 1999, Lecture Notes in Computer Science, vol. 1666, Springer-Verlag, pp. 315--325, 1999."},{"key":"e_1_3_2_1_27_1","first-page":"137","author":"Ye D. F.","year":"2001","unstructured":"D. F. Ye , Z. D. Dai and K. Y. Lam . Decomposing Attacks on Asymmetric Cryptography Based on Mapping Compositions, Journal of Cryptology (14) , pp. 137 -- 150 , 2001 . D. F. Ye, Z. D. Dai and K. Y. Lam. Decomposing Attacks on Asymmetric Cryptography Based on Mapping Compositions, Journal of Cryptology (14), pp. 137--150, 2001.","journal-title":"Decomposing Attacks on Asymmetric Cryptography Based on Mapping Compositions, Journal of Cryptology (14)"}],"event":{"name":"ISSAC '09: International Symposium on Symbolic and Algebraic Computation","location":"Seoul Republic of Korea","acronym":"ISSAC '09","sponsor":["ACM Association for Computing Machinery","SIGSAM ACM Special Interest Group on Symbolic and Algebraic Manipulation"]},"container-title":["Proceedings of the 2009 international symposium on Symbolic and algebraic computation"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1576702.1576732","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1576702.1576732","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T12:23:09Z","timestamp":1750249389000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1576702.1576732"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,7,28]]},"references-count":25,"alternative-id":["10.1145\/1576702.1576732","10.1145\/1576702"],"URL":"https:\/\/doi.org\/10.1145\/1576702.1576732","relation":{},"subject":[],"published":{"date-parts":[[2009,7,28]]},"assertion":[{"value":"2009-07-28","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}