{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T20:28:45Z","timestamp":1725481725572},"publisher-location":"Berlin, Heidelberg","reference-count":12,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540502517"},{"type":"electronic","value":"9783540459613"}],"license":[{"start":{"date-parts":[[1988,1,1]],"date-time":"1988-01-01T00:00:00Z","timestamp":567993600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1988]]},"DOI":"10.1007\/3-540-45961-8_39","type":"book-chapter","created":{"date-parts":[[2007,3,5]],"date-time":"2007-03-05T16:43:15Z","timestamp":1173112995000},"page":"419-453","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":287,"title":["Public Quadratic Polynomial-Tuples for Efficient Signature-Verification and Message-Encryption"],"prefix":"10.1007","author":[{"given":"Tsutomu","family":"Matsumoto","sequence":"first","affiliation":[]},{"given":"Hideki","family":"Imai","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2000,12,1]]},"reference":[{"issue":"6","key":"39_CR1","doi-asserted-by":"publisher","first-page":"644","DOI":"10.1109\/TIT.1976.1055638","volume":"IT-22","author":"W. Diffie","year":"1976","unstructured":"Diffie, W. and Hellman, M.E., \u201cNew directions in cryptography,\u201d IEEE Transactions on Information Theorey, IT-22,6, pp.644\u2013654, (Nov. 1976).","journal-title":"IEEE Transactions on Information Theorey"},{"key":"39_CR2","doi-asserted-by":"crossref","unstructured":"Cardoza, E., Lipton, R. and Meyer, A.R., \u201cExponential space complete problems for Petri nets and commutative semigroups,\u201d Conf. Record of the 8th Annual ACM Symposium on Theory of Computing, pp.50\u201354, (1976).","DOI":"10.1145\/800113.803630"},{"key":"39_CR3","unstructured":"Garey, M.R. and Johnson, D.S., Computer and Intractability: A guide to the theory of NP-comptleteness, Freeman, (1979)."},{"key":"39_CR4","unstructured":"Matsumoto, T., Imai, H., Harashima, H. and Miyakawa, H., \u201cA class of asymmetric cryptosystems using obscure representations of enciphering functions,\u201d 1983 National Convention Record on Information Systems, IECE Japan, S8\u20135, (Sept. 1983) (in Japanese)."},{"key":"39_CR5","unstructured":"Matsumoto, T., Harashima, H. and Imai, H., \u201cA theory of constructing multivariate-polynomial-tuple asymmetric cryptosystems,\u201d Proceedings of 1986 Symposium on Cryptography and Information Security, E2, Susono, Japan, (Feb. 1986) (in Japanese)."},{"key":"39_CR6","doi-asserted-by":"crossref","unstructured":"Fell, H. and Diffie, W., \u201cAnalysis of a public key approach based on polynomial substitution,\u201d Advances in Cryptology \u2014 CRYPTO\u2019 85, Springer, pp.340\u2013349, (1986).","DOI":"10.1007\/3-540-39799-X_24"},{"issue":"3","key":"39_CR7","first-page":"30","volume":"5","author":"T. Zhou","year":"1984","unstructured":"Zhou, T., \u201cBoolean public key cryptosystem of the second order,\u201d Journal of China Institute of Communications, Vo1.5, No.3, pp.30\u201337, (July 1984) (in Chinese).","journal-title":"Journal of China Institute of Communications"},{"issue":"1","key":"39_CR8","first-page":"85","volume":"7","author":"T. Zhou","year":"1986","unstructured":"Zhou, T., \u201cA note on boolean public key cryptosystem of the second order,\u201d Journal of China Institute of Communications, Vol.7, No.1, pp.85\u201392, (Jan. 1986) (in Chinese).","journal-title":"Journal of China Institute of Communications"},{"key":"39_CR9","unstructured":"Lidle, R. and Niederreiter, H., Finite Fields, Addison-Wesley (1983)."},{"issue":"2","key":"39_CR10","doi-asserted-by":"publisher","first-page":"120","DOI":"10.1145\/359340.359342","volume":"21","author":"R.L. Rivest","year":"1978","unstructured":"Rivest, R.L., Shamir, A. and Adleman, L., \u201cA mehtod of obtaing digital signatures and public key cryptosystems,\u201d Communications of ACM, Vol.21, No.2, pp.120\u2013126, (Feb.1978).","journal-title":"Communications of ACM"},{"key":"39_CR11","doi-asserted-by":"publisher","first-page":"95","DOI":"10.1016\/S0019-9958(81)90629-X","volume":"48","author":"I. Takahashi","year":"1983","unstructured":"Takahashi, I., \u201cSwitching functions constructed by Galois extension fields,\u201d Information and Control, Vol.48, pp.95\u2013108, (1983).","journal-title":"Information and Control"},{"issue":"3","key":"39_CR12","first-page":"139","volume":"E68","author":"T. Matsumoto","year":"1985","unstructured":"Matsumoto, T., Imai, H., Harashima, H. and Miyakawa, H., \u201cA cryptographically useful theorem on the connection between uni and multivariate polynomials,\u201d Transactions of the Institute of Electronics and Communication Engineers, Vol.E68, No.3, pp.139\u2013146, (March 1985).","journal-title":"Transactions of the Institute of Electronics and Communication Engineers"}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2014 EUROCRYPT \u201988"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-45961-8_39","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,19]],"date-time":"2019-05-19T13:27:10Z","timestamp":1558272430000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-45961-8_39"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1988]]},"ISBN":["9783540502517","9783540459613"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/3-540-45961-8_39","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[1988]]},"assertion":[{"value":"1 December 2000","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}