{"id":"https://openalex.org/W2023028568","doi":"https://doi.org/10.1007/s10207-003-0025-5","title":"An attack on the isomorphisms of polynomials problem with one secret","display_name":"An attack on the isomorphisms of polynomials problem with one secret","publication_year":2003,"publication_date":"2003-11-01","ids":{"openalex":"https://openalex.org/W2023028568","doi":"https://doi.org/10.1007/s10207-003-0025-5","mag":"2023028568"},"language":"en","primary_location":{"id":"doi:10.1007/s10207-003-0025-5","is_oa":false,"landing_page_url":"https://doi.org/10.1007/s10207-003-0025-5","pdf_url":null,"source":{"id":"https://openalex.org/S164062316","display_name":"International Journal of Information Security","issn_l":"1615-5262","issn":["1615-5262","1615-5270"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Information Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5066209159","display_name":"Willi Geiselmann","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Willi Geiselmann","raw_affiliation_strings":["IAKS, Arbeitsgruppe Systemsicherheit, Prof. Dr. Th. Beth, Fakult\u00e4t f\u00fcr Informatik, Universit\u00e4t Karlsruhe, Am Fasanengarten 5, 76131, Karlsruhe, Germany","IAKS, Arbeitsgruppe Systemsicherheit, Prof. Dr. Th. Beth, Fakult\u00e4t f\u00fcr Informatik, Universit\u00e4t Karlsruhe, Karlsruhe, Germany 76131#TAB#"],"affiliations":[{"raw_affiliation_string":"IAKS, Arbeitsgruppe Systemsicherheit, Prof. Dr. Th. Beth, Fakult\u00e4t f\u00fcr Informatik, Universit\u00e4t Karlsruhe, Am Fasanengarten 5, 76131, Karlsruhe, Germany","institution_ids":[]},{"raw_affiliation_string":"IAKS, Arbeitsgruppe Systemsicherheit, Prof. Dr. Th. Beth, Fakult\u00e4t f\u00fcr Informatik, Universit\u00e4t Karlsruhe, Karlsruhe, Germany 76131#TAB#","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5086309954","display_name":"Willi Meier","orcid":"https://orcid.org/0000-0003-4594-1501"},"institutions":[{"id":"https://openalex.org/I2972652528","display_name":"FHNW University of Applied Sciences and Arts","ror":"https://ror.org/04mq2g308","country_code":"CH","type":"education","lineage":["https://openalex.org/I2972652528"]}],"countries":["CH"],"is_corresponding":false,"raw_author_name":"Willi Meier","raw_affiliation_strings":["Fachhochschule Aargau, Klosterzelgstrasse, 5210, Windisch, Switzerland","Fachhochschule Aargau, Windisch, Switzerland 5210#TAB#"],"affiliations":[{"raw_affiliation_string":"Fachhochschule Aargau, Klosterzelgstrasse, 5210, Windisch, Switzerland","institution_ids":[]},{"raw_affiliation_string":"Fachhochschule Aargau, Windisch, Switzerland 5210#TAB#","institution_ids":["https://openalex.org/I2972652528"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5081329027","display_name":"Rainer Steinwandt","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Rainer Steinwandt","raw_affiliation_strings":["IAKS, Arbeitsgruppe Systemsicherheit, Prof. Dr. Th. Beth, Fakult\u00e4t f\u00fcr Informatik, Universit\u00e4t Karlsruhe, Am Fasanengarten 5, 76131, Karlsruhe, Germany","IAKS, Arbeitsgruppe Systemsicherheit, Prof. Dr. Th. Beth, Fakult\u00e4t f\u00fcr Informatik, Universit\u00e4t Karlsruhe, Karlsruhe, Germany 76131#TAB#"],"affiliations":[{"raw_affiliation_string":"IAKS, Arbeitsgruppe Systemsicherheit, Prof. Dr. Th. Beth, Fakult\u00e4t f\u00fcr Informatik, Universit\u00e4t Karlsruhe, Am Fasanengarten 5, 76131, Karlsruhe, Germany","institution_ids":[]},{"raw_affiliation_string":"IAKS, Arbeitsgruppe Systemsicherheit, Prof. Dr. Th. Beth, Fakult\u00e4t f\u00fcr Informatik, Universit\u00e4t Karlsruhe, Karlsruhe, Germany 76131#TAB#","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5066209159"],"corresponding_institution_ids":[],"apc_list":{"value":2590,"currency":"EUR","value_usd":3190},"apc_paid":null,"fwci":1.8328,"has_fulltext":false,"cited_by_count":30,"citation_normalized_percentile":{"value":0.84970911,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":99},"biblio":{"volume":"2","issue":"1","first_page":"59","last_page":"64"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11435","display_name":"Polynomial and algebraic computation","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1703","display_name":"Computational Theory and Mathematics"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11435","display_name":"Polynomial and algebraic computation","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1703","display_name":"Computational Theory and Mathematics"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11130","display_name":"Coding theory and cryptography","score":0.9965000152587891,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12069","display_name":"Commutative Algebra and Its Applications","score":0.9943000078201294,"subfield":{"id":"https://openalex.org/subfields/2602","display_name":"Algebra and Number Theory"},"field":{"id":"https://openalex.org/fields/26","display_name":"Mathematics"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6670840978622437},{"id":"https://openalex.org/keywords/basis","display_name":"Basis (linear algebra)","score":0.5574585199356079},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.5564193725585938},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.5419780015945435},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.5024197101593018},{"id":"https://openalex.org/keywords/signature","display_name":"Signature (topology)","score":0.49295568466186523},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.4867846667766571},{"id":"https://openalex.org/keywords/attack-model","display_name":"Attack model","score":0.4435098171234131},{"id":"https://openalex.org/keywords/algebra-over-a-field","display_name":"Algebra over a field","score":0.4305950701236725},{"id":"https://openalex.org/keywords/cryptanalysis","display_name":"Cryptanalysis","score":0.42676854133605957},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.3269902765750885},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3247881531715393},{"id":"https://openalex.org/keywords/pure-mathematics","display_name":"Pure mathematics","score":0.124948650598526}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6670840978622437},{"id":"https://openalex.org/C12426560","wikidata":"https://www.wikidata.org/wiki/Q189569","display_name":"Basis (linear algebra)","level":2,"score":0.5574585199356079},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.5564193725585938},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.5419780015945435},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.5024197101593018},{"id":"https://openalex.org/C2779696439","wikidata":"https://www.wikidata.org/wiki/Q7512811","display_name":"Signature (topology)","level":2,"score":0.49295568466186523},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.4867846667766571},{"id":"https://openalex.org/C65856478","wikidata":"https://www.wikidata.org/wiki/Q3991682","display_name":"Attack model","level":2,"score":0.4435098171234131},{"id":"https://openalex.org/C136119220","wikidata":"https://www.wikidata.org/wiki/Q1000660","display_name":"Algebra over a field","level":2,"score":0.4305950701236725},{"id":"https://openalex.org/C181149355","wikidata":"https://www.wikidata.org/wiki/Q897511","display_name":"Cryptanalysis","level":3,"score":0.42676854133605957},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.3269902765750885},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3247881531715393},{"id":"https://openalex.org/C202444582","wikidata":"https://www.wikidata.org/wiki/Q837863","display_name":"Pure mathematics","level":1,"score":0.124948650598526},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1007/s10207-003-0025-5","is_oa":false,"landing_page_url":"https://doi.org/10.1007/s10207-003-0025-5","pdf_url":null,"source":{"id":"https://openalex.org/S164062316","display_name":"International Journal of Information Security","issn_l":"1615-5262","issn":["1615-5262","1615-5270"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Information Security","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":8,"referenced_works":["https://openalex.org/W1492604485","https://openalex.org/W1543638401","https://openalex.org/W1568587963","https://openalex.org/W1821087317","https://openalex.org/W1976677460","https://openalex.org/W3023478445","https://openalex.org/W3111297213","https://openalex.org/W4243098353"],"related_works":["https://openalex.org/W1671124163","https://openalex.org/W2104321465","https://openalex.org/W4250384982","https://openalex.org/W1604915031","https://openalex.org/W3089223619","https://openalex.org/W4288849478","https://openalex.org/W4288674537","https://openalex.org/W2940752727","https://openalex.org/W1561797008","https://openalex.org/W2516549250"],"abstract_inverted_index":null,"counts_by_year":[{"year":2022,"cited_by_count":1},{"year":2019,"cited_by_count":3},{"year":2018,"cited_by_count":2},{"year":2013,"cited_by_count":6},{"year":2012,"cited_by_count":5}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
