{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,5]],"date-time":"2025-10-05T04:25:19Z","timestamp":1759638319063,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":15,"publisher":"ACM","license":[{"start":{"date-parts":[[2013,5,8]],"date-time":"2013-05-08T00:00:00Z","timestamp":1367971200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2013,5,8]]},"DOI":"10.1145\/2484389.2484401","type":"proceedings-article","created":{"date-parts":[[2013,5,14]],"date-time":"2013-05-14T12:15:27Z","timestamp":1368533727000},"page":"57-62","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":5,"title":["A variant of rainbow with shorter secret key and faster signature generation"],"prefix":"10.1145","author":[{"given":"Takanori","family":"Yasuda","sequence":"first","affiliation":[{"name":"Institute of Systems, Information Technologies and Nanotechnologies, Fukuoka, Japan"}]},{"given":"Jintai","family":"Ding","sequence":"additional","affiliation":[{"name":"Chongqing University, Chongqing, China"}]},{"given":"Tsuyoshi","family":"Takagi","sequence":"additional","affiliation":[{"name":"Kyushu University, Fukuoka, Japan"}]},{"given":"Kouichi","family":"Sakurai","sequence":"additional","affiliation":[{"name":"Institute of Systems, Information Technologies and Nanotechnologies, Fukuoka, Japan"}]}],"member":"320","published-online":{"date-parts":[[2013,5,8]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-540-88702-7","volume-title":"Post Quantum Cryptography","author":"Bernstein D.J.","year":"2009","unstructured":"Bernstein , D.J. , Buchmann , J. and Dahmen , E. , \" Post Quantum Cryptography \", Springer , Heidelberg 2009 . Bernstein, D.J., Buchmann, J. and Dahmen, E., \"Post Quantum Cryptography\", Springer, Heidelberg 2009."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1006\/jsco.1996.0125"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-30574-3_4"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1007\/11496137_12"},{"key":"e_1_3_2_1_5_1","first-page":"242","volume":"5037","author":"Ding J.","year":"2008","unstructured":"Ding , J. Yang , B.-Y. , Chen , C.-H. O. , Chen , M.-S. and Cheng , C. M. , \" New Differential-Algebraic Attacks and Reparametrization of Rainbow\", ACN S' 08 , Springer LNCS vol. 5037 , pp. 242 -- 257 , 2008 . Ding, J. Yang, B.-Y., Chen, C.-H. O., Chen, M.-S. and Cheng, C. M., \"New Differential-Algebraic Attacks and Reparametrization of Rainbow\", ACNS'08, Springer LNCS vol. 5037, pp. 242--257, 2008.","journal-title":"Springer LNCS"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0022-4049(99)00005-5"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.5555\/647096.716863"},{"key":"e_1_3_2_1_8_1","first-page":"206","volume":"1592","author":"Kipnis A.","year":"1999","unstructured":"Kipnis , A. , Patarin , J. and Goubin , L. , \" Unbalanced Oil and Vinegar Schemes\", EUROCRYP T' 99 , Springer LNCS vol. 1592 , pp. 206 -- 222 , 1999 . Kipnis, A., Patarin, J. and Goubin, L., \"Unbalanced Oil and Vinegar Schemes\", EUROCRYPT'99, Springer LNCS vol. 1592, pp. 206--222, 1999.","journal-title":"Springer LNCS"},{"key":"e_1_3_2_1_9_1","first-page":"257","volume":"1462","author":"Kipnis A.","year":"1998","unstructured":"Kipnis , A. and Shamir , A. , \" Cryptanalysis of the Oil and Vinegar Signature Scheme\", CRYPT O' 98 , Springer LNCS vol. 1462 , pp. 257 -- 266 , 1998 . Kipnis, A. and Shamir, A., \"Cryptanalysis of the Oil and Vinegar Signature Scheme\", CRYPTO'98, Springer LNCS vol. 1462, pp. 257--266, 1998.","journal-title":"Springer LNCS"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-12929-2_16"},{"key":"e_1_3_2_1_11_1","first-page":"33","volume":"6498","author":"Petzoldt A.","year":"2010","unstructured":"Petzoldt , A. , Bulygin , S. and Buchmann , J. , \" CyclicRainbow - A multivariate Signature Scheme with a Partially Cyclic Public Key based on Rainbow\", INDOCRYP T' 1 0 , Springer LNCS vol. 6498 , pp. 33 -- 48 , 2010 . Petzoldt, A., Bulygin, S. and Buchmann, J., \"CyclicRainbow - A multivariate Signature Scheme with a Partially Cyclic Public Key based on Rainbow\", INDOCRYPT'10, Springer LNCS vol. 6498, pp. 33--48, 2010.","journal-title":"Springer LNCS"},{"key":"e_1_3_2_1_12_1","first-page":"475","volume":"6917","author":"Petzoldt A.","year":"2011","unstructured":"Petzoldt , A. , Thomae , E. , Bulygin , S. , and Wolf , C. , \" Small Public Keys and Fast Verification for Multivariate Quadratic Public Key Systems\", CHE S' 11 , Springer LNCS vol. 6917 , pp. 475 -- 490 , 2011 . Petzoldt, A., Thomae, E., Bulygin, S., and Wolf, C., \"Small Public Keys and Fast Verification for Multivariate Quadratic Public Key Systems\", CHES'11, Springer LNCS vol. 6917, pp. 475--490, 2011.","journal-title":"Springer LNCS"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1007\/11506157_43"},{"key":"e_1_3_2_1_16_1","first-page":"371","volume":"3156","author":"Yang B.-Y.","year":"2004","unstructured":"Yang , B.-Y. , Chen , J.-M. and Chen Y.-H. , \"TTS: High -speed Signatureson a Low-Cost Smart Card\", CHE S' 04 , Springer LNCS vol. 3156 , pp. 371 -- 385 , 2004 . Yang, B.-Y., Chen, J.-M. and Chen Y.-H., \"TTS: High-speed Signatureson a Low-Cost Smart Card\", CHES'04, Springer LNCS vol. 3156, pp. 371--385, 2004.","journal-title":"Springer LNCS"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-27954-6_5"}],"event":{"name":"ASIA CCS '13: 8th ACM Symposium on Information, Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Hangzhou China","acronym":"ASIA CCS '13"},"container-title":["Proceedings of the first ACM workshop on Asia public-key cryptography"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2484389.2484401","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2484389.2484401","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T08:39:19Z","timestamp":1750235959000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2484389.2484401"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,5,8]]},"references-count":15,"alternative-id":["10.1145\/2484389.2484401","10.1145\/2484389"],"URL":"https:\/\/doi.org\/10.1145\/2484389.2484401","relation":{},"subject":[],"published":{"date-parts":[[2013,5,8]]},"assertion":[{"value":"2013-05-08","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}