{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T23:00:39Z","timestamp":1773615639189,"version":"3.50.1"},"reference-count":20,"publisher":"Allerton Press","issue":"8","license":[{"start":{"date-parts":[[2024,12,1]],"date-time":"2024-12-01T00:00:00Z","timestamp":1733011200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,12,1]],"date-time":"2024-12-01T00:00:00Z","timestamp":1733011200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Aut. Control Comp. Sci."],"published-print":{"date-parts":[[2024,12]]},"DOI":"10.3103\/s0146411624700950","type":"journal-article","created":{"date-parts":[[2025,3,14]],"date-time":"2025-03-14T14:22:50Z","timestamp":1741962170000},"page":"1297-1302","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["On the Method of Masking in the Multiple Signature Protocol Based on Isogenies of Elliptic Curves"],"prefix":"10.3103","volume":"58","author":[{"given":"E. B.","family":"Aleksandrova","sequence":"first","affiliation":[]},{"given":"S. O.","family":"Kostin","sequence":"additional","affiliation":[]}],"member":"1627","published-online":{"date-parts":[[2025,3,14]]},"reference":[{"key":"7794_CR1","unstructured":"FIPS 203 (Draft): Module-lattice-based key-encapsulation mechanism standard. https:\/\/nvlpubs.nist.gov\/ nistpubs\/FIPS\/NIST.FIPS.203.ipd.pdf. Cited April 2, 2024."},{"key":"7794_CR2","unstructured":"FIPS 204 (Draft): Module-lattice-based digital signature standard. https:\/\/nvlpubs.nist.gov\/nistpubs\/ FIPS\/NIST.FIPS.204.ipd.pdf. Cited April 2, 2024."},{"key":"7794_CR3","unstructured":"FIPS 205 (Draft): Stateless hash-based digital signature standard. https:\/\/nvlpubs.nist.gov\/nistpubs\/FIPS\/ NIST.FIPS.205.ipd.pdf. Cited April 2, 2024."},{"key":"7794_CR4","doi-asserted-by":"publisher","unstructured":"Castryck, W. and Decru, T., An efficient key recovery attack on SIDH, Advances in Cryptology\u2013EUROCRYPT 2023, Hazay, C. and Stam, M., Eds., Lecture Notes in Computer Science, vol. 14008, Cham: Springer, 2023, pp. 423\u2013447. https:\/\/doi.org\/10.1007\/978-3-031-30589-4_15","DOI":"10.1007\/978-3-031-30589-4_15"},{"key":"7794_CR5","first-page":"277","volume":"22","author":"A.S. Konoplev","year":"2019","unstructured":"Konoplev, A.S. and Kalinin, M.O., Graphanalytical model of key distribution in networks with dynamic architecture, Nonlinear Phenom. Complex Syst., 2019, vol. 22, no. 3, pp. 277\u2013284.","journal-title":"Nonlinear Phenom. Complex Syst."},{"key":"7794_CR6","doi-asserted-by":"publisher","unstructured":"Robert, D., Breaking SIDH in polynomial time, Advances in Cryptology\u2013EUROCRYPT 2023, Hazay, C. and Stam, M., Eds., Lecture Notes in Computer Science, vol. 14008, Cham: Springer, 2023, pp. 472\u2013503. https:\/\/doi.org\/10.1007\/978-3-031-30589-4_17","DOI":"10.1007\/978-3-031-30589-4_17"},{"key":"7794_CR7","doi-asserted-by":"publisher","unstructured":"Jao, D., Azarderakhsh, R., Campagna, M., Costello, C., De Feo, L., Hess, B., Jao, D., Koziel, B., LaMacchia, B., Longa, P., Naehrig, M., Renes, J., and Soukharev, V., SIKE: Supersingular isogeny key encapsulation, 2017. https:\/\/doi.org\/10.13140\/RG.2.2.26543.07847","DOI":"10.13140\/RG.2.2.26543.07847"},{"key":"7794_CR8","doi-asserted-by":"publisher","unstructured":"Suprun, A., Anisimov, V., Anisimov, E., Saurenko, T., and Manciu, I., Models and method of decision support for the formation of cybersecurity systems, Algorithms and Solutions Based on Computer Technology, Jahn, C., Ungv\u00e1ri, L., and Ilin, I., Eds., Lecture Notes in Networks and Systems, vol. 387, Cham: Springer, 2022, pp.\u00a0357\u2013367. https:\/\/doi.org\/10.1007\/978-3-030-93872-7_29","DOI":"10.1007\/978-3-030-93872-7_29"},{"key":"7794_CR9","doi-asserted-by":"publisher","unstructured":"Vysotskaya, V.V. and Chizhov, I.V., The security of the code-based signature scheme based on the Stern identification protocol, Prikl. Diskretnaya Mat., 2022, no. 57, pp. 67\u201390. https:\/\/doi.org\/10.17223\/20710410\/57\/5","DOI":"10.17223\/20710410\/57\/5"},{"key":"7794_CR10","doi-asserted-by":"publisher","unstructured":"Basso, A., Maino, L., and Pope, G., FESTA: Fast encryption from supersingular torsion attacks, Advances in Cryptology\u2013ASIACRYPT 2023, Guo, J. and Steinfeld, R., Eds., Lecture Notes in Computer Science, vol. 14444, Singapore: Springer, 2023, pp. 98\u2013126. https:\/\/doi.org\/10.1007\/978-981-99-8739-9_4","DOI":"10.1007\/978-981-99-8739-9_4"},{"key":"7794_CR11","doi-asserted-by":"publisher","unstructured":"Nakagawa, K. and Onuki, H., QFESTA: Efficient algorithms and parameters for FESTA using quaternion algebras, vol. 14924, pp. 75\u2013106. https:\/\/doi.org\/10.1007\/978-3-031-68388-6_4","DOI":"10.1007\/978-3-031-68388-6_4"},{"key":"7794_CR12","unstructured":"Moriya, T., IS-CUBE: An isogeny-based compact KEM using a boxed SIDH diagram, Cryptology ePrint Archive, 2024. https:\/\/eprint.iacr.org\/2023\/1506. Cited April 2, 2024."},{"key":"7794_CR13","doi-asserted-by":"publisher","first-page":"665","DOI":"10.3103\/s0146411615080180","volume":"49","author":"P.D. Zegzhda","year":"2015","unstructured":"Zegzhda, P.D. and Kalinin, M.O., Automatic security management of computer systems, Autom. Control Comput. Sci., 2015, vol. 49, no. 8, pp. 665\u2013672. https:\/\/doi.org\/10.3103\/s0146411615080180","journal-title":"Autom. Control Comput. Sci."},{"key":"7794_CR14","doi-asserted-by":"publisher","first-page":"855","DOI":"10.3103\/s0146411617080090","volume":"51","author":"D.V. Ivanov","year":"2017","unstructured":"Ivanov, D.V., Moskvin, D.A., Myasnikov, A.V., and Suprun, A.F., Applying NFC for automated replication of user data, Autom. Control Comput. Sci., 2017, vol. 51, no. 8, pp. 855\u2013859. https:\/\/doi.org\/10.3103\/s0146411617080090","journal-title":"Autom. Control Comput. Sci."},{"key":"7794_CR15","doi-asserted-by":"publisher","unstructured":"Aleksandrova, E., Pendrikova, O., Shtyrkina, A., Shkorkina, E., Yarmak, A., and Tick, J., Threshold isogeny-based group authentication scheme, algorithms and solutions based on computer technology, Algorithms and Solutions Based on Computer Technology, Lecture Notes in Networks and Systems, vol. 387, Cham: Springer, 2022, pp. 117\u2013126. https:\/\/doi.org\/10.1007\/978-3-030-93872-7_10","DOI":"10.1007\/978-3-030-93872-7_10"},{"key":"7794_CR16","doi-asserted-by":"publisher","first-page":"2208","DOI":"10.3390\/sym14102208","volume":"14","author":"M. Kalinin","year":"2022","unstructured":"Kalinin, M., Ovasapyan, T., and Poltavtseva, M., Application of the learning automaton model for ensuring cyber resiliency, Symmetry, 2022, vol. 14, no. 10, p. 2208. https:\/\/doi.org\/10.3390\/sym14102208","journal-title":"Symmetry"},{"key":"7794_CR17","unstructured":"Fouque, P., Hoffstein, J., Kirchner, P., Lyubashevsky, V., Pornin, T., Prest, T., Ricosset, T., Seiler, G., Whyte, W., and Zhang, Zh., Falcon: Fast-Fourier Lattice-based Compact Signatures over NTRU. https:\/\/falcon-sign.info\/falcon.pdf. Cited April 2, 2024."},{"key":"7794_CR18","unstructured":"Zhou, G. and Xu, M., An efficient adaptive attack against FESTA, Cryptology ePrint Archive, 2024. https:\/\/eprint.iacr.org\/2024\/345.pdf. Cited April 2, 2024."},{"key":"7794_CR19","doi-asserted-by":"publisher","unstructured":"Castryck, W. and Vercauteren, F., A polynomial time attack on instances of M-SIDH and FESTA, Advances in Cryptology\u2013ASIACRYPT 2023, Guo, J. and Steinfeld, R., Eds., Lecture Notes in Computer Science, vol. 14444, Singapore: Springer, 2024, pp. 127\u2013156. https:\/\/doi.org\/10.1007\/978-981-99-8739-9_5","DOI":"10.1007\/978-981-99-8739-9_5"},{"key":"7794_CR20","unstructured":"Moriya, T. and Onuki, H., The wrong use of a FESTA trapdoor function leads to an adaptive attack, Cryptology ePrint Archive, 2023. https:\/\/eprint.iacr.org\/2023\/1092.pdf. Cited April 2, 2024."}],"container-title":["Automatic Control and Computer Sciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.3103\/S0146411624700950.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.3103\/S0146411624700950","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.3103\/S0146411624700950.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T22:02:38Z","timestamp":1773612158000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.3103\/S0146411624700950"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12]]},"references-count":20,"journal-issue":{"issue":"8","published-print":{"date-parts":[[2024,12]]}},"alternative-id":["7794"],"URL":"https:\/\/doi.org\/10.3103\/s0146411624700950","relation":{},"ISSN":["0146-4116","1558-108X"],"issn-type":[{"value":"0146-4116","type":"print"},{"value":"1558-108X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,12]]},"assertion":[{"value":"9 July 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"15 July 2024","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"18 July 2024","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"14 March 2025","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"The authors of this work declare that they have no conflicts of interest.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"CONFLICT OF INTEREST"}}]}}