{"id":"https://openalex.org/W2017083706","doi":"https://doi.org/10.1007/s11432-010-0025-9","title":"A new perturbation algorithm and enhancing security of SFLASH signature scheme","display_name":"A new perturbation algorithm and enhancing security of SFLASH signature scheme","publication_year":2010,"publication_date":"2010-02-05","ids":{"openalex":"https://openalex.org/W2017083706","doi":"https://doi.org/10.1007/s11432-010-0025-9","mag":"2017083706"},"language":"en","primary_location":{"id":"doi:10.1007/s11432-010-0025-9","is_oa":false,"landing_page_url":"https://doi.org/10.1007/s11432-010-0025-9","pdf_url":null,"source":{"id":"https://openalex.org/S4210218743","display_name":"Science China Information Sciences","issn_l":"1674-733X","issn":["1674-733X","1869-1919"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Science China Information Sciences","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5068117437","display_name":"Houzhen Wang","orcid":"https://orcid.org/0000-0003-2773-5050"},"institutions":[{"id":"https://openalex.org/I37461747","display_name":"Wuhan University","ror":"https://ror.org/033vjfk17","country_code":"CN","type":"education","lineage":["https://openalex.org/I37461747"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"HouZhen Wang","raw_affiliation_strings":["School of Computer, Wuhan University, Wuhan, 430079, China","The Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, Wuhan University, Wuhan, 430072, China","School of Computer, Wuhan University, Wuhan, China","The Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, Wuhan University, Wuhan, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"School of Computer, Wuhan University, Wuhan, 430079, China","institution_ids":["https://openalex.org/I37461747"]},{"raw_affiliation_string":"The Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, Wuhan University, Wuhan, 430072, China","institution_ids":["https://openalex.org/I37461747"]},{"raw_affiliation_string":"School of Computer, Wuhan University, Wuhan, China","institution_ids":["https://openalex.org/I37461747"]},{"raw_affiliation_string":"The Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, Wuhan University, Wuhan, China","institution_ids":["https://openalex.org/I37461747"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5026793623","display_name":"Huanguo Zhang","orcid":"https://orcid.org/0000-0001-5801-2897"},"institutions":[{"id":"https://openalex.org/I37461747","display_name":"Wuhan University","ror":"https://ror.org/033vjfk17","country_code":"CN","type":"education","lineage":["https://openalex.org/I37461747"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"HuanGuo Zhang","raw_affiliation_strings":["School of Computer, Wuhan University, Wuhan, 430079, China","The Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, Wuhan University, Wuhan, 430072, China","School of Computer, Wuhan University, Wuhan, China","The Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, Wuhan University, Wuhan, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"School of Computer, Wuhan University, Wuhan, 430079, China","institution_ids":["https://openalex.org/I37461747"]},{"raw_affiliation_string":"The Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, Wuhan University, Wuhan, 430072, China","institution_ids":["https://openalex.org/I37461747"]},{"raw_affiliation_string":"School of Computer, Wuhan University, Wuhan, China","institution_ids":["https://openalex.org/I37461747"]},{"raw_affiliation_string":"The Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, Wuhan University, Wuhan, China","institution_ids":["https://openalex.org/I37461747"]}]},{"author_position":"middle","author":{"id":null,"display_name":"HaiMing Guan","orcid":null},"institutions":[{"id":"https://openalex.org/I4210159156","display_name":"System Equipment (China)","ror":"https://ror.org/04m2bcn74","country_code":"CN","type":"company","lineage":["https://openalex.org/I4210159156"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"HaiMing Guan","raw_affiliation_strings":["Chinese Electronic Equipment System Corporation, Beijing, 100039, China","Chinese Electronic Equipment System Corporation, Beijing, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Chinese Electronic Equipment System Corporation, Beijing, 100039, China","institution_ids":["https://openalex.org/I4210159156"]},{"raw_affiliation_string":"Chinese Electronic Equipment System Corporation, Beijing, China","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100517930","display_name":"Haiqing Han","orcid":null},"institutions":[{"id":"https://openalex.org/I37461747","display_name":"Wuhan University","ror":"https://ror.org/033vjfk17","country_code":"CN","type":"education","lineage":["https://openalex.org/I37461747"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"HaiQing Han","raw_affiliation_strings":["School of Computer, Wuhan University, Wuhan, 430079, China","The Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, Wuhan University, Wuhan, 430072, China","The Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, Wuhan University, Wuhan, China","School of Computer, Wuhan University, Wuhan, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"School of Computer, Wuhan University, Wuhan, 430079, China","institution_ids":["https://openalex.org/I37461747"]},{"raw_affiliation_string":"The Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, Wuhan University, Wuhan, 430072, China","institution_ids":["https://openalex.org/I37461747"]},{"raw_affiliation_string":"The Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, Wuhan University, Wuhan, China","institution_ids":["https://openalex.org/I37461747"]},{"raw_affiliation_string":"School of Computer, Wuhan University, Wuhan, China","institution_ids":["https://openalex.org/I37461747"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5026793623"],"corresponding_institution_ids":["https://openalex.org/I37461747"],"apc_list":{"value":2390,"currency":"EUR","value_usd":2990},"apc_paid":null,"fwci":4.2014,"has_fulltext":false,"cited_by_count":11,"citation_normalized_percentile":{"value":0.93948959,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":94,"max":98},"biblio":{"volume":"53","issue":"4","first_page":"760","last_page":"768"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11130","display_name":"Coding theory and cryptography","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11130","display_name":"Coding theory and cryptography","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11435","display_name":"Polynomial and algebraic computation","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1703","display_name":"Computational Theory and Mathematics"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11797","display_name":"graph theory and CDMA systems","score":0.9983999729156494,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/cryptanalysis","display_name":"Cryptanalysis","score":0.8011908531188965},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.6014012694358826},{"id":"https://openalex.org/keywords/cryptosystem","display_name":"Cryptosystem","score":0.5810918807983398},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5581774115562439},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.5264217257499695},{"id":"https://openalex.org/keywords/perturbation","display_name":"Perturbation (astronomy)","score":0.5094686150550842},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.4438713788986206},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.42315444350242615},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.3853936195373535},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.36999887228012085},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.29926297068595886},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.26876765489578247},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.1087251603603363},{"id":"https://openalex.org/keywords/physics","display_name":"Physics","score":0.08719253540039062}],"concepts":[{"id":"https://openalex.org/C181149355","wikidata":"https://www.wikidata.org/wiki/Q897511","display_name":"Cryptanalysis","level":3,"score":0.8011908531188965},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.6014012694358826},{"id":"https://openalex.org/C6295992","wikidata":"https://www.wikidata.org/wiki/Q976521","display_name":"Cryptosystem","level":3,"score":0.5810918807983398},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5581774115562439},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.5264217257499695},{"id":"https://openalex.org/C177918212","wikidata":"https://www.wikidata.org/wiki/Q803623","display_name":"Perturbation (astronomy)","level":2,"score":0.5094686150550842},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.4438713788986206},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.42315444350242615},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.3853936195373535},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.36999887228012085},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.29926297068595886},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.26876765489578247},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.1087251603603363},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.08719253540039062},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1007/s11432-010-0025-9","is_oa":false,"landing_page_url":"https://doi.org/10.1007/s11432-010-0025-9","pdf_url":null,"source":{"id":"https://openalex.org/S4210218743","display_name":"Science China Information Sciences","issn_l":"1674-733X","issn":["1674-733X","1869-1919"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Science China Information Sciences","raw_type":"journal-article"},{"id":"mag:3145700520","is_oa":false,"landing_page_url":"http://en.cnki.com.cn/Article_en/CJFDTOTAL-JFXG201004009.htm","pdf_url":null,"source":{"id":"https://openalex.org/S4306542114","display_name":"\u4e2d\u56fd\u79d1\u5b66:\u4fe1\u606f\u79d1\u5b66(\u82f1\u6587\u7248)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":null,"raw_source_name":"\u4e2d\u56fd\u79d1\u5b66:\u4fe1\u606f\u79d1\u5b66(\u82f1\u6587\u7248)","raw_type":null}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/13","display_name":"Climate action","score":0.5400000214576721}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":19,"referenced_works":["https://openalex.org/W1505418321","https://openalex.org/W1525538022","https://openalex.org/W1532849667","https://openalex.org/W1568587963","https://openalex.org/W1618439507","https://openalex.org/W1628272610","https://openalex.org/W1675339804","https://openalex.org/W1821087317","https://openalex.org/W2011039300","https://openalex.org/W2083889349","https://openalex.org/W2119883816","https://openalex.org/W2128968394","https://openalex.org/W2138433952","https://openalex.org/W2168676717","https://openalex.org/W2476096155","https://openalex.org/W3011907935","https://openalex.org/W4285719527","https://openalex.org/W6631500350","https://openalex.org/W6677805605"],"related_works":["https://openalex.org/W4312813683","https://openalex.org/W1531522605","https://openalex.org/W2965484163","https://openalex.org/W2414747139","https://openalex.org/W4232705780","https://openalex.org/W2225318093","https://openalex.org/W2512006651","https://openalex.org/W4384027664","https://openalex.org/W2025209850","https://openalex.org/W1553510179"],"abstract_inverted_index":null,"counts_by_year":[{"year":2016,"cited_by_count":2},{"year":2013,"cited_by_count":4}],"updated_date":"2026-05-05T08:41:31.759640","created_date":"2025-10-10T00:00:00"}
