{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,11]],"date-time":"2026-03-11T20:46:41Z","timestamp":1773262001489,"version":"3.50.1"},"reference-count":30,"publisher":"American Institute of Mathematical Sciences (AIMS)","issue":"2","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["AMC"],"published-print":{"date-parts":[[2019]]},"DOI":"10.3934\/amc.2019023","type":"journal-article","created":{"date-parts":[[2019,2,19]],"date-time":"2019-02-19T00:20:38Z","timestamp":1550535638000},"page":"343-371","source":"Crossref","is-referenced-by-count":4,"title":["Efficient public-key operation in multivariate schemes"],"prefix":"10.3934","volume":"13","author":[{"given":"Felipe","family":"Cabarcas","sequence":"first","affiliation":[]},{"given":"Daniel","family":"Cabarcas","sequence":"additional","affiliation":[{"name":"Universidad Nacional de Colombia Sede Medell\u00edn, Calle 59 A N 63-20, Medell\u00edn, Colombia"}]},{"given":"John","family":"Baena","sequence":"additional","affiliation":[{"name":"Universidad Nacional de Colombia Sede Medell\u00edn, Calle 59 A N 63-20, Medell\u00edn, Colombia"}]}],"member":"2321","reference":[{"key":"key-10.3934\/amc.2019023-1","doi-asserted-by":"crossref","unstructured":"<p>C. Berbain, O. Billet and H. Gilbert, Efficient implementations of multivariate quadratic systems, in <i>Selected Areas in Cryptography<\/i> (eds. E. Biham and A. Youssef), vol. 4356 of Lecture Notes in Computer Science, Springer Berlin Heidelberg, 2007,174\u2013187.<\/p>","DOI":"10.1007\/978-3-540-74462-7_13"},{"key":"key-10.3934\/amc.2019023-2","doi-asserted-by":"crossref","unstructured":"<p>D. J. Bernstein, J. Buchmann and E. Dahmen, <i>Post-Quantum Cryptography<\/i>, Springer-Verlag, Berlin, 2009.<\/p>","DOI":"10.1007\/978-3-540-88702-7"},{"key":"key-10.3934\/amc.2019023-3","doi-asserted-by":"crossref","unstructured":"<p>L. Bettale, J.-C. Faug\u00e8re and L. Perret, Cryptanalysis of the TRMS Signature Scheme of PKC'05, <i>Progress in cryptology \u2013 AFRICACRYPT 2008<\/i>, Springer Berlin Heidelberg, Berlin, Heidelberg, 2008,143\u2013155.<\/p>","DOI":"10.1007\/978-3-540-68164-9_10"},{"key":"key-10.3934\/amc.2019023-4","doi-asserted-by":"publisher","DOI":"10.1515\/JMC.2009.009"},{"key":"key-10.3934\/amc.2019023-5","doi-asserted-by":"crossref","unstructured":"<p>L. Bettale, J.-C. Faug\u00e8re and L. Perret, Solving polynomial systems over finite fields: Improved analysis of the hybrid approach, in <i>ISSAC 2012 - 37th International Symposium on Symbolic and Algebraic Computation<\/i>, ACM, Grenoble, France, 2012, 67\u201374.<\/p>","DOI":"10.1145\/2442829.2442843"},{"key":"key-10.3934\/amc.2019023-6","doi-asserted-by":"publisher","DOI":"10.1007\/s10623-012-9617-2"},{"key":"key-10.3934\/amc.2019023-7","doi-asserted-by":"publisher","DOI":"10.1006\/jsco.1996.0125"},{"key":"key-10.3934\/amc.2019023-8","doi-asserted-by":"crossref","unstructured":"<p>C. Bouillaguet, H.-C. Chen, C.-M. Cheng, T. Chou, R. Niederhagen, A. Shamir and B.-Y. Yang, Fast exhaustive search for polynomial systems in <inline-formula><tex-math id=\"M436\">$\\mathbb{F}_2$<\/tex-math><\/inline-formula>, in <i>Cryptographic Hardware and Embedded Systems, CHES 2010<\/i> (eds. S. Mangard and F.-X. Standaert), Springer Berlin Heidelberg, Berlin, Heidelberg, 2010, 203\u2013218.<\/p>","DOI":"10.1007\/978-3-642-15031-9_14"},{"key":"key-10.3934\/amc.2019023-9","doi-asserted-by":"crossref","unstructured":"<p>A.-T. Chen, M.-S. Chen, T.-R. Chen, C.-M. Cheng, J. Ding, E.-H. Kuo, F.-S. Lee and B.-Y. Yang, Sse implementation of multivariate pkcs on modern x86 cpus, in <i>Cryptographic Hardware and Embedded Systems - CHES 2009<\/i> (eds. C. Clavier and K. Gaj), vol. 5747 of Lecture Notes in Computer Science, Springer Berlin Heidelberg, 2009, 33\u201348.<\/p>","DOI":"10.1007\/978-3-642-04138-9_3"},{"key":"key-10.3934\/amc.2019023-10","unstructured":"<p>J. Ding, A. Petzoldt and L.-c. Wang, The cubic simple matrix encryption scheme, in <i>Post-Quantum Cryptography: 6th International Workshop, PQCrypto 2014, Waterloo, ON, Canada, October 1-3, 2014. Proceedings<\/i> (ed. M. Mosca), Springer International Publishing, Cham, 2014, 76\u201387.<\/p>"},{"key":"key-10.3934\/amc.2019023-11","doi-asserted-by":"crossref","unstructured":"<p>J. Ding and D. Schmidt, Rainbow, a new multivariable polynomial signature scheme, in <i>Applied Cryptography and Network Security<\/i> (eds. J. Ioannidis, A. Keromytis and M. Yung), vol. 3531 of Lecture Notes in Computer Science, Springer Berlin Heidelberg, 2005,164\u2013175.<\/p>","DOI":"10.1007\/11496137_12"},{"key":"key-10.3934\/amc.2019023-12","unstructured":"<p>J. Ding, D. Schmidt and F. Werner, Algebraic attack on HFE revisited, in <i>Information Security, 11th International Conference, ISC 2008, Taipei, Taiwan, September 15-18, 2008. Proceedings<\/i> (eds. T.-C. Wu, C.-L. Lei, V. Rijmen and D.-T. Lee), vol. 5222 of Lecture Notes in Computer Science, Springer, 2008,215\u2013227.<\/p>"},{"key":"key-10.3934\/amc.2019023-13","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-74143-5_1"},{"key":"key-10.3934\/amc.2019023-14","doi-asserted-by":"crossref","unstructured":"<p>J.-C. Faug\u00e8re and A. Joux, Algebraic cryptanalysis of hidden field equation (HFE) cryptosystems using Gr\u00f6bner bases, in <i>Advances in cryptology\u2013-CRYPTO 2003<\/i>, vol. 2729 of Lecture Notes in Comput. Sci., Springer, Berlin, 2003, 44\u201360.<\/p>","DOI":"10.1007\/978-3-540-45146-4_3"},{"key":"key-10.3934\/amc.2019023-15","unstructured":"<p>S. Gueron and M. E. Kounavis, <i>White Paper: Intel Carry-Less Multiplication Instruction and its Usage for Computing the GCM Mode<\/i>, Technical report, Intel, 2010.<\/p>"},{"key":"key-10.3934\/amc.2019023-16","doi-asserted-by":"crossref","unstructured":"<p>N. Howgrave-Graham, A hybrid lattice-reduction and meet-in-the-middle attack against ntru, in <i>Advances in Cryptology - CRYPTO 2007<\/i> (ed. A. Menezes), vol. 4622 of Lecture Notes in Computer Science, Springer Berlin Heidelberg, 2007,150\u2013169.<\/p>","DOI":"10.1007\/978-3-540-74143-5_9"},{"key":"key-10.3934\/amc.2019023-17","unstructured":"<p>Intel\u00ae, <i>Intel<\/i>\u00ae<i>64 and IA-32 Architectures Optimization Reference Manual<\/i>, Technical report, Intel\u00ae, 2015.<\/p>"},{"key":"key-10.3934\/amc.2019023-18","doi-asserted-by":"crossref","unstructured":"<p>A. Kipnis, J. Patarin and L. Goubin, Unbalanced oil and vinegar signature schemes, in <i>Advances in cryptology\u2013-EUROCRYPT '99 (Prague)<\/i>, vol. 1592 of Lecture Notes in Comput. Sci., Springer, Berlin, 1999,206\u2013222.<\/p>","DOI":"10.1007\/3-540-48910-X_15"},{"key":"key-10.3934\/amc.2019023-19","doi-asserted-by":"crossref","unstructured":"<p>A. Kipnis and A. Shamir, Cryptanalysis of the HFE public key cryptosystem by relinearization, in <i>Advances in cryptology\u2013-CRYPTO '99 (Santa Barbara, CA)<\/i>, vol. 1666 of Lecture Notes in Comput. Sci., Springer, Berlin, 1999, 19\u201330.<\/p>","DOI":"10.1007\/3-540-48405-1_2"},{"key":"key-10.3934\/amc.2019023-20","doi-asserted-by":"crossref","unstructured":"<p>T. Matsumoto and H. Imai, Public quadratic polynomial-tuples for efficient signature-verification and message-encryption, in <i>Advances in cryptology\u2013-EUROCRYPT '88 (Davos, 1988)<\/i>, vol. 330 of Lecture Notes in Comput. Sci., Springer, Berlin, 1988,419\u2013453.<\/p>","DOI":"10.1007\/3-540-45961-8_39"},{"key":"key-10.3934\/amc.2019023-21","unstructured":"<p>NIST, Proposed submission requirements and evaluation criteria for the post-quantum cryptography standardization process, <a href=\"http:\/\/csrc.nist.gov\/groups\/ST\/post-quantum-crypto\/call-for-proposals-2016.html\" target=\"_blank\">http:\/\/csrc.nist.gov\/groups\/ST\/post-quantum-crypto\/call-for-proposals-2016.html<\/a>, 2016, Accessed: 08\/26\/2016.<\/p>"},{"key":"key-10.3934\/amc.2019023-22","doi-asserted-by":"crossref","unstructured":"<p>J. Patarin, Hidden Field Equations (HFE) and Isomorphisms of Polynomials (IP): Twonew families of asymmetric algorithms, in <i>Advances in Cryptology\u2014EUROCRYPT 96<\/i> (ed.U. Maurer), vol. 1070 of Lecture Notes in Computer Science, Springer-Verlag, 1996, 33\u201348.<\/p>","DOI":"10.1007\/3-540-68339-9_4"},{"key":"key-10.3934\/amc.2019023-23","doi-asserted-by":"crossref","unstructured":"<p>J. Patarin, N. Courtois and L. Goubin, FLASH, a fast multivariate signature algorithm, in <i>Topics in Cryptology\u2013-CT-RSA 2001 (San Francisco, CA)<\/i>, vol. 2020 of Lecture Notes in Comput. Sci., Springer, Berlin, 2001,298\u2013307.<\/p>","DOI":"10.1007\/3-540-45353-9_22"},{"key":"key-10.3934\/amc.2019023-24","doi-asserted-by":"crossref","unstructured":"<p>J. Patarin, N. Courtois and L. Goubin, QUARTZ, 128-bit long digital signatures, in <i>Topics in cryptology\u2013-CT-RSA 2001 (San Francisco, CA)<\/i>, vol. 2020 of Lecture Notes in Comput. Sci., Springer, Berlin, 2001,282\u2013297.<\/p>","DOI":"10.1007\/3-540-45353-9_21"},{"key":"key-10.3934\/amc.2019023-25","doi-asserted-by":"crossref","unstructured":"<p>J. Patarin, L. Goubin and N. Courtois, C<i>*<\/i>-+ and HM: Variations around two schemes of T. Matsumoto and H. Imai, in <i>ASIACRYPT '98: Proceedings of the International Conference on the Theory and Applications of Cryptology and Information Security<\/i>, Springer-Verlag, London, UK, 1998, 35\u201350.<\/p>","DOI":"10.1007\/3-540-49649-1_4"},{"key":"key-10.3934\/amc.2019023-26","doi-asserted-by":"crossref","unstructured":"<p>J. Porras, J. Baena and J. Ding, ZHFE, a new multivariate public key encryption scheme, in <i>Post-Quantum Cryptography<\/i> (ed. M. Mosca), vol. 8772 of Lecture Notes in Computer Science, Springer International Publishing, 2014,229\u2013245.<\/p>","DOI":"10.1007\/978-3-319-11659-4_14"},{"key":"key-10.3934\/amc.2019023-27","doi-asserted-by":"crossref","unstructured":"<p>K. Sakumoto, T. Shirai and H. Hiwatari, Public-key identification schemes based on multivariate quadratic polynomials, in <i>Advances in Cryptology - CRYPTO 2011<\/i> (ed. P. Rogaway), vol. 6841 of Lecture Notes in Computer Science, Springer Berlin \/ Heidelberg, 2011,706\u2013723.<\/p>","DOI":"10.1007\/978-3-642-22792-9_40"},{"key":"key-10.3934\/amc.2019023-28","doi-asserted-by":"crossref","unstructured":"<p>C. Tao, A. Diene, S. Tang and J. Ding, Simple matrix scheme for encryption, in <i>Post-Quantum Cryptography: 5th International Workshop, PQCrypto 2013, Limoges, France, June 4-7, 2013. Proceedings<\/i> (ed. P. Gaborit), Springer Berlin Heidelberg, Berlin, Heidelberg, <b>6841<\/b> (2013), 231\u2013242.<\/p>","DOI":"10.1007\/978-3-642-38616-9_16"},{"key":"key-10.3934\/amc.2019023-29","doi-asserted-by":"crossref","unstructured":"<p>E. Thomae and C. Wolf, Solving underdetermined systems of multivariate quadratic equations revisited, in <i>Public Key Cryptography \u2013 PKC 2012<\/i> (eds. M. Fischlin, J. Buchmann and M. Manulis), <b>7293<\/b> (2012), 156\u2013171.<\/p>","DOI":"10.1007\/978-3-642-30057-8_10"},{"key":"key-10.3934\/amc.2019023-30","doi-asserted-by":"publisher","DOI":"10.1002\/spe.626"}],"container-title":["Advances in Mathematics of Communications"],"original-title":[],"link":[{"URL":"https:\/\/aimsciences.org\/download\/files\/1930-5346_2019_2_343.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,6]],"date-time":"2026-03-06T10:01:34Z","timestamp":1772791294000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.aimsciences.org\/\/article\/doi\/10.3934\/amc.2019023"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"references-count":30,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2019]]}},"URL":"https:\/\/doi.org\/10.3934\/amc.2019023","relation":{},"ISSN":["1930-5346","1930-5338"],"issn-type":[{"value":"1930-5346","type":"print"},{"value":"1930-5338","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019]]}}}