{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:17:15Z","timestamp":1750306635533,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":16,"publisher":"ACM","license":[{"start":{"date-parts":[[2014,6,3]],"date-time":"2014-06-03T00:00:00Z","timestamp":1401753600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2014,6,3]]},"DOI":"10.1145\/2600694.2600698","type":"proceedings-article","created":{"date-parts":[[2014,5,30]],"date-time":"2014-05-30T18:18:31Z","timestamp":1401473911000},"page":"43-48","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["A new perturbed matsumoto-imai signature scheme"],"prefix":"10.1145","author":[{"given":"Wenbin","family":"Zhang","sequence":"first","affiliation":[{"name":"National University of Singapore, Singapore, Singapore"}]},{"given":"Chi How","family":"Tan","sequence":"additional","affiliation":[{"name":"National University of Singapore, Singapore, Singapore"}]}],"member":"320","published-online":{"date-parts":[[2014,6,3]]},"reference":[{"key":"e_1_3_2_1_1_1","series-title":"LNCS","first-page":"305","volume-title":"F. B. et al","author":"Ding J.","year":"2004","unstructured":"J. Ding . A new variant of the Mausomoto-Imai cryptosystem through perturbation . In F. B. et al , editor, PKC 2004 , volume 2947 of LNCS , pages 305 -- 318 . Springer , 2004. J. Ding. A new variant of the Mausomoto-Imai cryptosystem through perturbation. In F. B. et al, editor, PKC 2004, volume 2947 of LNCS, pages 305--318. Springer, 2004."},{"key":"e_1_3_2_1_2_1","series-title":"Advances in Information Security","volume-title":"Multivariate public key cryptosystems","author":"Ding J.","year":"2006","unstructured":"J. Ding , J. E. Gower , and D. S. Schmidt . Multivariate public key cryptosystems , volume 25 of Advances in Information Security . Springer , 2006 . J. Ding, J. E. Gower, and D. S. Schmidt. Multivariate public key cryptosystems, volume 25 of Advances in Information Security. Springer, 2006."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-30580-4_20"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1007\/11426639_20"},{"key":"e_1_3_2_1_5_1","volume-title":"Computers and intractability: A guide to the theory of NP-completeness","author":"Garey M. R.","year":"1979","unstructured":"M. R. Garey and D. S. Johnson . Computers and intractability: A guide to the theory of NP-completeness . W. H. Freeman , 1979 . M. R. Garey and D. S. Johnson. Computers and intractability: A guide to the theory of NP-completeness. W. H. Freeman, 1979."},{"key":"e_1_3_2_1_6_1","author":"Gotaishi M.","year":"2010","unstructured":"M. Gotaishi , K. Tadaki , R. Fujita , and S. Tsujii . Dually-Perturbed Matsumoto-Imai Signature (DPMS) Scheme. IEICE Trans. Fundamentals, E93-A(6) , June 2010 . M. Gotaishi, K. Tadaki, R. Fujita, and S. Tsujii. Dually-Perturbed Matsumoto-Imai Signature (DPMS) Scheme. IEICE Trans. Fundamentals, E93-A(6), June 2010.","journal-title":"Dually-Perturbed Matsumoto-Imai Signature (DPMS) Scheme. IEICE Trans. Fundamentals, E93-A(6)"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"crossref","unstructured":"A.\n      Kipnis J.\n      Patarin and \n      L.\n      Goubin\n  . \n  Unbalanced oil and vinegar signature schemes\n  . In J. Stern editor EUROCRYPT'99 volume \n  1592\n   of \n  LNCS pages \n  206\n  --\n  222\n  . \n  Springer 1999\n  .   A. Kipnis J. Patarin and L. Goubin. Unbalanced oil and vinegar signature schemes. In J. Stern editor EUROCRYPT'99 volume 1592 of LNCS pages 206--222. Springer 1999.","DOI":"10.1007\/3-540-48910-X_15"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"crossref","unstructured":"A.\n      Kipnis\n     and \n      A.\n      Shamir\n  . \n  Cryptanalysis of the HFE public key cryptosystem by relinearization\n  . In M. Wiener editor CRYPTO'99 volume \n  1666\n   of \n  LNCS pages \n  19\n  --\n  30\n  . \n  Springer 1999\n  .   A. Kipnis and A. Shamir. Cryptanalysis of the HFE public key cryptosystem by relinearization. In M. Wiener editor CRYPTO'99 volume 1666 of LNCS pages 19--30. Springer 1999.","DOI":"10.1007\/3-540-48405-1_2"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"crossref","unstructured":"T.\n      Matsumoto\n     and \n      H.\n      Imai\n  . \n  Public quadratic polynomial-tuples for efficient signature verification and message encryption\n  . In C. G. Guenther editor EUROCRYPT'00 volume \n  330\n   of \n  LNCS pages \n  419\n  --\n  453\n  . \n  Springer 1988\n  .   T. Matsumoto and H. Imai. Public quadratic polynomial-tuples for efficient signature verification and message encryption. In C. G. Guenther editor EUROCRYPT'00 volume 330 of LNCS pages 419--453. Springer 1988.","DOI":"10.1007\/3-540-45961-8_39"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"crossref","unstructured":"J.\n      Patarin\n    .\n  Hidden field equations (HFE) and isomorphism of polynomials (IP): Two new families of asymmetric algorithms\n  . In U. Maurer editor EUROCRYPT'96 volume \n  1070\n   of \n  LNCS pages \n  33\n  --\n  48\n  . \n  Springer 1996\n  .   J. Patarin. Hidden field equations (HFE) and isomorphism of polynomials (IP): Two new families of asymmetric algorithms. In U. Maurer editor EUROCRYPT'96 volume 1070 of LNCS pages 33--48. Springer 1996.","DOI":"10.1007\/3-540-68339-9_4"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"crossref","unstructured":"J.\n      Patarin L.\n      Goubin and \n      N.\n      Courtois\n  . \n  C*- and HM: variations around two schemes of T. Matsumoto and H. Imai\n  . In K. Ohta and D. Pei editors ASIACRYPT'98 volume \n  1514\n   of \n  LNCS pages \n  35\n  --\n  50\n  . \n  Springer 1998\n  .   J. Patarin L. Goubin and N. Courtois. C*- and HM: variations around two schemes of T. Matsumoto and H. Imai. In K. Ohta and D. Pei editors ASIACRYPT'98 volume 1514 of LNCS pages 35--50. Springer 1998.","DOI":"10.1007\/3-540-49649-1_4"},{"key":"e_1_3_2_1_12_1","volume-title":"A generalization of the rainbow band separation attack and its applications to multivariate schemes.hrefhttp:\/\/eprint.iacr.org\/2012\/223.pdfhttp:\/\/eprint.iacr.org\/2012\/223.pdf","author":"Thomae E.","year":"2012","unstructured":"E. Thomae . A generalization of the rainbow band separation attack and its applications to multivariate schemes.hrefhttp:\/\/eprint.iacr.org\/2012\/223.pdfhttp:\/\/eprint.iacr.org\/2012\/223.pdf , 2012 . E. Thomae. A generalization of the rainbow band separation attack and its applications to multivariate schemes.hrefhttp:\/\/eprint.iacr.org\/2012\/223.pdfhttp:\/\/eprint.iacr.org\/2012\/223.pdf, 2012."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-31410-0_12"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-30598-9_21"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10623-006-0015-5"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"crossref","unstructured":"T.\n      Yasuda T.\n      Takagi and \n      K.\n      Sakurai\n  . \n  Multivariate signature scheme using quadratic forms\n  . In P. Gaborit editor PQCrypto \n  2013 volume \n  7932\n   of \n  LNCS pages \n  243\n  --\n  258\n  . \n  Springer 2013.  T. Yasuda T. Takagi and K. Sakurai. Multivariate signature scheme using quadratic forms. In P. Gaborit editor PQCrypto 2013 volume 7932 of LNCS pages 243--258. Springer 2013.","DOI":"10.1007\/978-3-642-38616-9_17"}],"event":{"name":"ASIA CCS '14: 9th ACM Symposium on Information, Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Kyoto Japan","acronym":"ASIA CCS '14"},"container-title":["Proceedings of the 2nd ACM workshop on ASIA public-key cryptography"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2600694.2600698","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2600694.2600698","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T06:55:52Z","timestamp":1750229752000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2600694.2600698"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,6,3]]},"references-count":16,"alternative-id":["10.1145\/2600694.2600698","10.1145\/2600694"],"URL":"https:\/\/doi.org\/10.1145\/2600694.2600698","relation":{},"subject":[],"published":{"date-parts":[[2014,6,3]]},"assertion":[{"value":"2014-06-03","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}