{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,6]],"date-time":"2026-03-06T14:45:45Z","timestamp":1772808345759,"version":"3.50.1"},"reference-count":35,"publisher":"American Institute of Mathematical Sciences (AIMS)","issue":"2","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["AMC"],"published-print":{"date-parts":[[2016]]},"DOI":"10.3934\/amc.2016002","type":"journal-article","created":{"date-parts":[[2016,5,2]],"date-time":"2016-05-02T17:06:13Z","timestamp":1462208773000},"page":"221-228","source":"Crossref","is-referenced-by-count":0,"title":["On tameness of Matsumoto-Imai central maps in three variables over the finite field $\\mathbb F_2$"],"prefix":"10.3934","volume":"10","author":[{"given":"Keisuke","family":"Hakuta","sequence":"first","affiliation":[]},{"given":"Hisayoshi","family":"Sato","sequence":"additional","affiliation":[]},{"given":"Tsuyoshi","family":"Takagi","sequence":"additional","affiliation":[]}],"member":"2321","reference":[{"key":"key-10.3934\/amc.2016002-1","unstructured":"available at <a href=\"http:\/\/eprint.iacr.org\/2001\/072\" target=\"_blank\">http:\/\/eprint.iacr.org\/2001\/072<\/a>"},{"key":"key-10.3934\/amc.2016002-2","doi-asserted-by":"publisher","unstructured":"N. Courtois, The security of hidden field equations (HFE), in <em>Progr. Crypt., CT-RSA '01<\/em>, Springer-Verlag, 2001, 266-281.","DOI":"10.1007\/3-540-45353-9_20"},{"key":"key-10.3934\/amc.2016002-3","doi-asserted-by":"crossref","unstructured":"J. Ding, J. E. Gower and D. S. Schmidt, <em>Multivariate Public Key Cryptosystems<\/em>, Springer, 2006.","DOI":"10.1090\/conm\/419\/07997"},{"key":"key-10.3934\/amc.2016002-4","doi-asserted-by":"publisher","unstructured":"J. Ding and T. Hodges, Cryptanalysis of an implementation scheme of TTM, <em>J. Algebra Appl.<\/em>, <strong>3<\/strong> (2004), 273-282.","DOI":"10.1142\/S0219498804000861"},{"key":"key-10.3934\/amc.2016002-5","doi-asserted-by":"crossref","unstructured":"J. Ding and D. Schmidt, The new TTM implementation is not secure, in <em>Workshop Coding Crypt. Combin., CCC2003<\/em>, Birkhauser Verlag, 2004, 113-128.","DOI":"10.1007\/978-3-0348-7865-4_6"},{"key":"key-10.3934\/amc.2016002-6","doi-asserted-by":"publisher","unstructured":"V. Dubois, P.-A. Fouque, A. Shamir and J. Stern, Practical cryptanalysis of SFLASH, in <em>Adv. Crypt. - CRYPTO 2007<\/em>, Springer-Verlag, 2007, 1-12.","DOI":"10.1007\/978-3-540-74143-5_1"},{"key":"key-10.3934\/amc.2016002-7","doi-asserted-by":"publisher","unstructured":"V. Dubois, P.-A. Fouque and J. Stern, Cryptanalysis of SFLASH with slightly modified parameters, in <em>Adv. Crypt. - EUROCRYPT 2007<\/em>, Springer-Verlag, 2007, 264-275.","DOI":"10.1007\/978-3-540-72540-4_15"},{"key":"key-10.3934\/amc.2016002-8","doi-asserted-by":"publisher","unstructured":"A. van den Essen, <em>Polynomial Automorphisms and the Jacobian Conjecture<\/em>, Birkhauser Verlag, Basel, 2000.","DOI":"10.1007\/978-3-0348-8440-2"},{"key":"key-10.3934\/amc.2016002-9","unstructured":"M. R. Garey and D. S. Johnson, <em>Computer and Intractability: A Guide to the Theory of NP-completeness<\/em>, Freeman, New York, 1979."},{"key":"key-10.3934\/amc.2016002-10","doi-asserted-by":"publisher","unstructured":"L. Goubin and N. Courtois, Cryptanalysis of the TTM cryptosystem, in <em>Adv. Crypt. - ASIACRYPT 2000<\/em>, Springer-Verlag, 2000, 44-57.","DOI":"10.1007\/3-540-44448-3_4"},{"key":"key-10.3934\/amc.2016002-11","unstructured":"E.-M. G. M. Hubbers, <em>Nilpotent Jacobians<\/em>, Ph.D thesis, Univ. Nijmegen, 1998."},{"key":"key-10.3934\/amc.2016002-12","doi-asserted-by":"crossref","unstructured":"H. W. E. Jung, \u00dcber ganze birationale transformationen der ebene, <em>J. Reine Angew. Math.<\/em>, <strong>184<\/strong> (1942), 161-174.","DOI":"10.1515\/crll.1942.184.161"},{"key":"key-10.3934\/amc.2016002-13","doi-asserted-by":"publisher","unstructured":"A. Kipnis and A. Shamir, Cryptanalysis of the HFE public key cryptosystem, in <em>Adv. Crypt. - CRYPTO '99<\/em>, Springer-Verlag, 1999, 19-30.","DOI":"10.1007\/3-540-48405-1_2"},{"key":"key-10.3934\/amc.2016002-14","doi-asserted-by":"publisher","unstructured":"T. Kishimoto, A new proof of the non-tameness of the Nagata automorphism from the point of view of the Sarkisov program, <em>Compositio Math.<\/em>, <strong>144<\/strong> (2008), 963-977.","DOI":"10.1112\/S0010437X07003399"},{"key":"key-10.3934\/amc.2016002-15","unstructured":"W. van der Kulk, On polynomial rings in two variables, <em>Nieuw Archief voor Wiskunde<\/em>, <strong>3<\/strong> (1953), 33-41."},{"key":"key-10.3934\/amc.2016002-16","doi-asserted-by":"publisher","unstructured":"available at <a href=\"http:\/\/eprint.iacr.org\/2011\/055\" target=\"_blank\">http:\/\/eprint.iacr.org\/2011\/055<\/a>","DOI":"10.1016\/j.ffa.2011.09.001"},{"key":"key-10.3934\/amc.2016002-17","doi-asserted-by":"publisher","unstructured":"T. Matsumoto and H. Imai, Public quadratic polynominal-tuples for efficient signature-verification and message-encryption, in <em>Adv. Crypt. - EUROCRYPT '88<\/em>, Springer-Verlag, 1988, 419-453.","DOI":"10.1007\/3-540-45961-8_39"},{"key":"key-10.3934\/amc.2016002-18","unstructured":"S. Maubach, Polynomial automorphisms over finite fields, <em>Serdica Math. J.<\/em>, <strong>27<\/strong> (2001), 343-350."},{"key":"key-10.3934\/amc.2016002-19","doi-asserted-by":"publisher","unstructured":"T. T. Moh, A fast public key system with signature and master key functions, <em>Comm. Algebra<\/em>, <strong>27<\/strong> (1999), 2207-2222.","DOI":"10.1080\/00927879908826559"},{"key":"key-10.3934\/amc.2016002-20","doi-asserted-by":"publisher","unstructured":"T. T. Moh, An application of algebraic geometry to encryption: tame transformation method, <em>Rev. Mat. Iberoamericana<\/em>, <strong>19<\/strong> (2003), 667-685.","DOI":"10.4171\/RMI\/364"},{"key":"key-10.3934\/amc.2016002-21","unstructured":"available at <a href=\"http:\/\/eprint.iacr.org\/2004\/168\" target=\"_blank\">http:\/\/eprint.iacr.org\/2004\/168<\/a>"},{"key":"key-10.3934\/amc.2016002-22","unstructured":"M. Nagata, <em>On Automorphism Group of $k[x, y]$<\/em>, Kinokuniya, Tokyo, 1972."},{"key":"key-10.3934\/amc.2016002-23","doi-asserted-by":"publisher","unstructured":"J. Patarin, Cryptanalysis of the Matsumoto and Imai public key scheme of Eurocrypt '88, in <em>Adv. Crypt. - CRYPTO '95<\/em>, Springer-Verlag, 1995, 248-261.","DOI":"10.1007\/3-540-44750-4_20"},{"key":"key-10.3934\/amc.2016002-24","doi-asserted-by":"crossref","unstructured":"J. Patarin, Hidden field equations (HFE) and isomorphism of polynomials (IP): two new families of asymmetric algorithms, in <em>Adv. Crypt. - EUROCRYPT '96<\/em>, Springer-Verlag, 1996, 33-48.","DOI":"10.1007\/3-540-68339-9_4"},{"key":"key-10.3934\/amc.2016002-25","unstructured":"J. Patarin, The oil and vinegar signature scheme, in <em>Dagstuhl Workshop on Cryptography<\/em>, 1997."},{"key":"key-10.3934\/amc.2016002-26","doi-asserted-by":"publisher","unstructured":"J. Patarin, Cryptanalysis of the Matsumoto and Imai public key scheme of Eurocrypt '88, <em>Des. Codes Crypt.<\/em>, <strong>20<\/strong> (2000), 175-209.","DOI":"10.1023\/A:1008341625464"},{"key":"key-10.3934\/amc.2016002-27","doi-asserted-by":"crossref","unstructured":"J. Patarin, N. Courtois and L. Goubin, $C_{-+}^{*}$ and HM: variations around two schemes of T. Matsumoto and H. Imai, in <em>Adv. Crypt. - ASIACRYPT '98<\/em>, Springer-Verlag, 1998, 35-50.","DOI":"10.1007\/3-540-49649-1_4"},{"key":"key-10.3934\/amc.2016002-28","doi-asserted-by":"publisher","unstructured":"J. Patarin, N. Courtois and L. Goubin, FLASH, a fast multivariate signature algorithm, in <em>Progr. Crypt., CT-RSA '01<\/em>, Springer-Verlag, 2001, 297-307.","DOI":"10.1007\/3-540-45353-9_22"},{"key":"key-10.3934\/amc.2016002-29","doi-asserted-by":"crossref","unstructured":"J. Patarin and L. Goubin, Asymmetric cryptography with S-boxes, in <em>1st Int. Conf. Inf. Sec. Crypt. - ICISC '97<\/em>, Springer-Verlag, 1997, 369-380.","DOI":"10.1007\/BFb0028492"},{"key":"key-10.3934\/amc.2016002-30","unstructured":"K. Rusek, <em>Polynomial Automorphisms<\/em>, Preprint 456, Inst. Math., Polish Acad. Sci., IMPAN, Warsaw, 1989."},{"key":"key-10.3934\/amc.2016002-31","doi-asserted-by":"publisher","unstructured":"I. P. Shestakov and U. U. Umirbaev, Poisson brackets and two-generated subalgebras of rings of polynomials, <em>J. Amer. Math. Soc.<\/em>, <strong>17<\/strong> (2004), 181-196.","DOI":"10.1090\/S0894-0347-03-00438-7"},{"key":"key-10.3934\/amc.2016002-32","doi-asserted-by":"publisher","unstructured":"I. P. Shestakov and U. U. Umirbaev, The tame and the wild automorphisms of polynomial rings in three variables, <em>J. Amer. Math. Soc.<\/em>, <strong>17<\/strong> (2004), 197-227.","DOI":"10.1090\/S0894-0347-03-00440-5"},{"key":"key-10.3934\/amc.2016002-33","doi-asserted-by":"publisher","unstructured":"P. W. Shor, Algorithms for quantum computation: discrete logarithms and factoring, in <em>35th Ann. Symp. Found. Comp. Sci.<\/em>, IEEE, 1994, 124-134.","DOI":"10.1109\/SFCS.1994.365700"},{"key":"key-10.3934\/amc.2016002-34","doi-asserted-by":"publisher","unstructured":"M. K. Smith, Stably tame automorphisms, <em>J. Pure Appl. Algebra<\/em>, <strong>58<\/strong> (1989), 209-212.","DOI":"10.1016\/0022-4049(89)90158-8"},{"key":"key-10.3934\/amc.2016002-35","unstructured":"S. Spodzieja, On the Nagata automorphism, <em>Univ. Iagell. Acta Math.<\/em>, <strong>1298<\/strong> (2007), 131-136."}],"container-title":["Advances in Mathematics of Communications"],"original-title":[],"link":[{"URL":"http:\/\/www.aimsciences.org\/journals\/displayArticlesnew.jsp?paperID=12516","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,6]],"date-time":"2026-03-06T10:05:19Z","timestamp":1772791519000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.aimsciences.org\/\/article\/doi\/10.3934\/amc.2016002"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"references-count":35,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2016]]}},"URL":"https:\/\/doi.org\/10.3934\/amc.2016002","relation":{},"ISSN":["1930-5346","1930-5338"],"issn-type":[{"value":"1930-5346","type":"print"},{"value":"1930-5338","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016]]}}}