{"response":{"docs":[{"system_create_dtsi":"2020-01-26T13:35:25Z","system_modified_dtsi":"2020-01-28T13:32:17Z","has_model_ssim":["Document"],"id":"2801ph54m","accessControl_ssim":["a097464e-be79-42b2-818e-20097724a9f6"],"hasRelatedMediaFragment_ssim":["k930bz38z"],"hasRelatedImage_ssim":["k930bz38z"],"depositor_ssim":["schmiddr@ucmail.uc.edu"],"depositor_tesim":["schmiddr@ucmail.uc.edu"],"title_tesim":["Chapter 8"],"date_uploaded_dtsi":"2020-01-26T13:35:24Z","date_modified_dtsi":"2020-01-28T13:32:09Z","isPartOf_ssim":["admin_set/default"],"genre_tesim":["Document"],"college_tesim":["Engineering and Applied Science"],"department_tesim":["- Electrical Engineering and Computer Science"],"creator_tesim":["Petzoldt, Albrecht","Schmidt, Dieter Sam","Ding, Jintai"],"subject_tesim":["Computing"],"description_tesim":["Programs for solving  univariate and multivariate polynomials.\r\n\r\nload \"Univariate\";   will load a collection of routines for polynomials in one variable.\r\nThe file main_univariate shows how to call the different routines.\r\n\r\nload \"solve_overdetermined.txt\";  will generate an overdetermined system and the uses the relinearization method to solve it.  Delete the first part of the program in order to run it with your own system of equations."],"license_tesim":["http://www.opendatacommons.org/licenses/pddl/1.0/"],"date_created_tesim":["2020-01"],"thumbnail_path_ss":"/assets/work-ff055336041c3f7d310ad69109eda4a887b16ec501f35afc0a547c4adb97ee72.png","suppressed_bsi":false,"actionable_workflow_roles_ssim":["admin_set/default-default-depositing"],"workflow_state_name_ssim":["deposited"],"member_ids_ssim":["2r36v0001","8c97kr88j","k930bz38z","df65v9429","cj82k861w"],"file_set_ids_ssim":["2r36v0001","8c97kr88j","k930bz38z","df65v9429","cj82k861w"],"visibility_ssi":"open","admin_set_tesim":["Default Admin Set"],"sort_title_ssi":"CHAPTER 8","human_readable_type_tesim":["Document"],"read_access_group_ssim":["public"],"edit_access_group_ssim":["admin"],"edit_access_person_ssim":["schmiddr@ucmail.uc.edu"],"nesting_collection__pathnames_ssim":["2801ph54m"],"nesting_collection__deepest_nested_depth_isi":1,"_version_":1697112575657902080,"timestamp":"2021-04-15T13:17:55.455Z","score":0.00049999997},{"system_create_dtsi":"2019-03-14T20:50:28Z","system_modified_dtsi":"2019-03-14T20:50:50Z","has_model_ssim":["Document"],"id":"pn89d7644","accessControl_ssim":["6bf9b849-2658-4265-b690-ff3b1352b116"],"hasRelatedMediaFragment_ssim":["3f4626587"],"hasRelatedImage_ssim":["3f4626587"],"depositor_ssim":["schmiddr@ucmail.uc.edu"],"depositor_tesim":["schmiddr@ucmail.uc.edu"],"title_tesim":["Multivariate-Quadratic-Digital-Signature-Scheme"],"date_uploaded_dtsi":"2019-03-14T20:50:28Z","date_modified_dtsi":"2019-03-14T20:50:28Z","isPartOf_ssim":["admin_set/default"],"college_tesim":["Engineering and Applied Science"],"department_tesim":["- Computing Sciences \u0026 Informatics"],"creator_tesim":["Petzoldt, Albrecht","Schmidt, Dieter Sam","Ding, Jintai"],"description_tesim":["Magma programs related to chapter 6 of the book by Ding, Petzoldt and Schmidt..  a 3-pass version and a 5-pass version is given.  After downloading the files use \r\n\r\nload \"MQident3.txt\";\r\n\r\nor\r\n\r\nload \"MQident5.txt\";"],"license_tesim":["http://creativecommons.org/publicdomain/mark/1.0/"],"thumbnail_path_ss":"/assets/work-ff055336041c3f7d310ad69109eda4a887b16ec501f35afc0a547c4adb97ee72.png","suppressed_bsi":false,"actionable_workflow_roles_ssim":["admin_set/default-default-depositing"],"workflow_state_name_ssim":["deposited"],"member_ids_ssim":["3f4626587","fn107016z"],"file_set_ids_ssim":["3f4626587","fn107016z"],"visibility_ssi":"open","admin_set_tesim":["Default Admin Set"],"sort_title_ssi":"MULTIVARIATEQUADRATICDIGITALSIGNATURESCHEME","human_readable_type_tesim":["Document"],"read_access_group_ssim":["public"],"edit_access_group_ssim":["admin"],"edit_access_person_ssim":["schmiddr@ucmail.uc.edu"],"nesting_collection__pathnames_ssim":["pn89d7644"],"nesting_collection__deepest_nested_depth_isi":1,"_version_":1697104629468233728,"timestamp":"2021-04-15T11:11:37.378Z","score":0.00049999997},{"system_create_dtsi":"2019-03-14T20:36:01Z","system_modified_dtsi":"2019-03-14T20:36:23Z","has_model_ssim":["Document"],"id":"z316q254f","accessControl_ssim":["4e9bb36c-0eb1-4ccf-8a6a-2f8cef5a73db"],"hasRelatedMediaFragment_ssim":["r207tq36q"],"hasRelatedImage_ssim":["r207tq36q"],"depositor_ssim":["schmiddr@ucmail.uc.edu"],"depositor_tesim":["schmiddr@ucmail.uc.edu"],"title_tesim":["PMI (perturbed Matsumoto_Imai)"],"date_uploaded_dtsi":"2019-03-14T20:36:01Z","date_modified_dtsi":"2019-03-14T20:36:01Z","isPartOf_ssim":["admin_set/default"],"college_tesim":["Engineering and Applied Science"],"department_tesim":["- Computing Sciences \u0026 Informatics"],"creator_tesim":["Petzoldt, Albrecht","Schmidt, Dieter Sam","Ding, Jintai"],"description_tesim":["Programs related to the perturbed Matsumoto Imai methods.\r\n\r\nload \"keygen.txt\";\r\nload \"encrypt.txt\";\r\nload \"decrypt.txt\";\r\n\r\nFeel free to change the parameters\r\n"],"license_tesim":["http://creativecommons.org/publicdomain/mark/1.0/"],"thumbnail_path_ss":"/assets/work-ff055336041c3f7d310ad69109eda4a887b16ec501f35afc0a547c4adb97ee72.png","suppressed_bsi":false,"actionable_workflow_roles_ssim":["admin_set/default-default-depositing"],"workflow_state_name_ssim":["deposited"],"member_ids_ssim":["12579t447","0v838176w","r207tq36q"],"file_set_ids_ssim":["12579t447","0v838176w","r207tq36q"],"visibility_ssi":"open","admin_set_tesim":["Default Admin Set"],"sort_title_ssi":"PMI PERTURBED MATSUMOTO_IMAI","human_readable_type_tesim":["Document"],"read_access_group_ssim":["public"],"edit_access_group_ssim":["admin"],"edit_access_person_ssim":["schmiddr@ucmail.uc.edu"],"nesting_collection__pathnames_ssim":["z316q254f"],"nesting_collection__deepest_nested_depth_isi":1,"_version_":1697129371803844608,"timestamp":"2021-04-15T17:44:53.508Z","score":0.00049999997},{"system_create_dtsi":"2019-03-14T20:30:36Z","system_modified_dtsi":"2021-04-16T14:56:50Z","has_model_ssim":["Document"],"id":"gf06g394h","accessControl_ssim":["1e0d4805-4a8d-49e4-be49-31d4c068a43b"],"hasRelatedMediaFragment_ssim":["pk02cb73m"],"hasRelatedImage_ssim":["pk02cb73m"],"depositor_ssim":["schmiddr@ucmail.uc.edu"],"depositor_tesim":["schmiddr@ucmail.uc.edu"],"title_tesim":["MI (original Matsumoto-Imai method)"],"date_uploaded_dtsi":"2019-03-14T20:30:36Z","date_modified_dtsi":"2019-03-14T20:31:40Z","isPartOf_ssim":["admin_set/default"],"college_tesim":["Engineering and Applied Science"],"department_tesim":["- Computing Sciences \u0026 Informatics"],"creator_tesim":["Schmidt, Dieter Sam","Petzoldt, Albrecht","Ding, Jintai"],"description_tesim":["Magma programs for the original method of Matsumoto-Imai.  Download the files and then in Magma use\r\n\r\nload \"keygen.txt\";\r\nload \"encrypt.txt\";\r\nload \"decrypt.txt\";\r\n\r\nThe first program will generate the files private_key.txt and public_key.txt.   \r\n\r\n\r\nWith  load \"LinearizationEquations.txt\";.    the equations are produced to break this method.\r\n\r\nExperiment by changing the parameters."],"license_tesim":["http://creativecommons.org/publicdomain/mark/1.0/"],"source_tesim":["gf06g394h"],"thumbnail_path_ss":"/assets/work-ff055336041c3f7d310ad69109eda4a887b16ec501f35afc0a547c4adb97ee72.png","suppressed_bsi":false,"actionable_workflow_roles_ssim":["admin_set/default-default-depositing"],"workflow_state_name_ssim":["deposited"],"member_ids_ssim":["pk02cb73m","7h149q97x","8k71nj16s","jm214q447"],"file_set_ids_ssim":["pk02cb73m","7h149q97x","8k71nj16s","jm214q447"],"visibility_ssi":"open","admin_set_tesim":["Default Admin Set"],"sort_title_ssi":"MI ORIGINAL MATSUMOTOIMAI METHOD","human_readable_type_tesim":["Document"],"read_access_group_ssim":["public"],"edit_access_group_ssim":["admin"],"edit_access_person_ssim":["schmiddr@ucmail.uc.edu"],"nesting_collection__pathnames_ssim":["gf06g394h"],"nesting_collection__deepest_nested_depth_isi":1,"_version_":1697209396921106432,"timestamp":"2021-04-16T14:56:51.407Z","score":0.00049999997},{"system_create_dtsi":"2019-03-09T13:23:42Z","system_modified_dtsi":"2019-03-09T13:23:56Z","has_model_ssim":["Document"],"id":"j38607987","accessControl_ssim":["a8350d8a-7df7-4474-9362-f9cc177e993c"],"hasRelatedMediaFragment_ssim":["6m311q27t"],"hasRelatedImage_ssim":["6m311q27t"],"depositor_ssim":["schmiddr@ucmail.uc.edu"],"depositor_tesim":["schmiddr@ucmail.uc.edu"],"title_tesim":["Rectangular Simple Matrix "],"date_uploaded_dtsi":"2019-03-09T13:23:42Z","date_modified_dtsi":"2019-03-09T13:23:42Z","isPartOf_ssim":["admin_set/default"],"college_tesim":["Engineering and Applied Science"],"department_tesim":["- Computing Sciences \u0026 Informatics"],"creator_tesim":["Petzoldt, Albrecht","Schmidt, Dieter Sam","Ding, Jintai"],"description_tesim":["Magma programs to chapter 7 pf the book \"Multivariate Public Key Cryptosystems\" by Ding, Petzoldt and Schmidt  using the rectangular simple matrix scheme.\r\n\r\nload \"keygen.txt\" will generate the file public_key.txt and private_key.txt\r\n\r\nload \"encrypt.txt\"; will generate the file \"ciphertexrt.txt\"   by encrypting a randomly generated file\r\n\r\nload \"decrypt.txt\"  will then decrypt that file.\r\n"],"license_tesim":["http://creativecommons.org/publicdomain/mark/1.0/"],"thumbnail_path_ss":"/assets/work-ff055336041c3f7d310ad69109eda4a887b16ec501f35afc0a547c4adb97ee72.png","suppressed_bsi":false,"actionable_workflow_roles_ssim":["admin_set/default-default-depositing"],"workflow_state_name_ssim":["deposited"],"member_ids_ssim":["6m311q283","6m311q27t","7h149q96n"],"file_set_ids_ssim":["6m311q283","6m311q27t","7h149q96n"],"visibility_ssi":"open","admin_set_tesim":["Default Admin Set"],"sort_title_ssi":"RECTANGULAR SIMPLE MATRIX ","human_readable_type_tesim":["Document"],"read_access_group_ssim":["public"],"edit_access_group_ssim":["admin"],"edit_access_person_ssim":["schmiddr@ucmail.uc.edu"],"nesting_collection__pathnames_ssim":["j38607987"],"nesting_collection__deepest_nested_depth_isi":1,"_version_":1697124567922769920,"timestamp":"2021-04-15T16:28:32.170Z","score":0.00049999997},{"system_create_dtsi":"2019-03-09T13:14:54Z","system_modified_dtsi":"2019-03-09T13:15:12Z","has_model_ssim":["Document"],"id":"5h73px125","accessControl_ssim":["f09da45a-19ff-4b10-95de-b2d23e5074a5"],"hasRelatedMediaFragment_ssim":["j3860797z"],"hasRelatedImage_ssim":["j3860797z"],"depositor_ssim":["schmiddr@ucmail.uc.edu"],"depositor_tesim":["schmiddr@ucmail.uc.edu"],"title_tesim":["Simple Matrix  (ABC scheme)"],"date_uploaded_dtsi":"2019-03-09T13:14:54Z","date_modified_dtsi":"2019-03-09T13:14:54Z","isPartOf_ssim":["admin_set/default"],"college_tesim":["Engineering and Applied Science"],"department_tesim":["- Computing Sciences \u0026 Informatics"],"creator_tesim":["Petzoldt, Albrecht","Ding, Jintai"],"description_tesim":["Magma programs to the book \"Multivariate Public Key Cryptosystems\" by Ding, Petzoldt and Schmidt using the simple ABC scheme.\r\n\r\nload \"keygen.txt\";   will generate the public and private keys in the files public_key.txt and private_key.txt\r\n\r\nload \"encrypt.txt\";  will encrypt a randomly generated text and put the result into ciphertext.txt\r\n\r\nload \"decrypt.txt\";   will decrypt that file"],"license_tesim":["http://creativecommons.org/publicdomain/mark/1.0/"],"thumbnail_path_ss":"/assets/work-ff055336041c3f7d310ad69109eda4a887b16ec501f35afc0a547c4adb97ee72.png","suppressed_bsi":false,"actionable_workflow_roles_ssim":["admin_set/default-default-depositing"],"workflow_state_name_ssim":["deposited"],"member_ids_ssim":["dn39x266f","j3860797z","h128nf95d"],"file_set_ids_ssim":["dn39x266f","j3860797z","h128nf95d"],"visibility_ssi":"open","admin_set_tesim":["Default Admin Set"],"sort_title_ssi":"SIMPLE MATRIX ABC SCHEME","human_readable_type_tesim":["Document"],"read_access_group_ssim":["public"],"edit_access_group_ssim":["admin"],"edit_access_person_ssim":["schmiddr@ucmail.uc.edu"],"nesting_collection__pathnames_ssim":["5h73px125"],"nesting_collection__deepest_nested_depth_isi":1,"_version_":1697100079875227648,"timestamp":"2021-04-15T09:59:18.548Z","score":0.00049999997},{"system_create_dtsi":"2019-03-09T12:57:37Z","system_modified_dtsi":"2019-03-09T13:23:44Z","has_model_ssim":["Document"],"id":"vm40xs59m","accessControl_ssim":["24943604-a34c-49ba-8ec3-521b6863f58f"],"depositor_ssim":["schmiddr@ucmail.uc.edu"],"depositor_tesim":["schmiddr@ucmail.uc.edu"],"title_tesim":["Simple Matrix"],"date_uploaded_dtsi":"2019-03-09T12:57:37Z","date_modified_dtsi":"2019-03-09T12:57:37Z","isPartOf_ssim":["admin_set/default"],"college_tesim":["Engineering and Applied Science"],"department_tesim":["- Computing Sciences \u0026 Informatics"],"creator_tesim":["Petzoldt, Albrecht","Schmidt, Dieter Sam","Ding, Jintai"],"description_tesim":["Programs to chapter 7 of the book \"Multivariate Public Key Cryptosystems\" by Ding, Petzoldt and Schmidt.\r\n\r\nTwo methods are attached, one for the standard ABC method, the other for the rectangular ABC method"],"license_tesim":["http://creativecommons.org/publicdomain/mark/1.0/"],"thumbnail_path_ss":"/assets/work-ff055336041c3f7d310ad69109eda4a887b16ec501f35afc0a547c4adb97ee72.png","suppressed_bsi":false,"actionable_workflow_roles_ssim":["admin_set/default-default-depositing"],"workflow_state_name_ssim":["deposited"],"member_ids_ssim":["5h73px125","j38607987"],"file_set_ids_ssim":["5h73px125","j38607987"],"visibility_ssi":"open","admin_set_tesim":["Default Admin Set"],"sort_title_ssi":"SIMPLE MATRIX","human_readable_type_tesim":["Document"],"read_access_group_ssim":["public"],"edit_access_group_ssim":["admin"],"edit_access_person_ssim":["schmiddr@ucmail.uc.edu"],"nesting_collection__pathnames_ssim":["vm40xs59m"],"nesting_collection__deepest_nested_depth_isi":1,"_version_":1697083852569182208,"timestamp":"2021-04-15T05:41:22.983Z","score":0.00049999997},{"system_create_dtsi":"2019-03-09T12:30:49Z","system_modified_dtsi":"2019-03-09T12:31:05Z","has_model_ssim":["Dataset"],"id":"r207tq35f","accessControl_ssim":["e81ace25-e7e1-465f-9841-b42f2f249f66"],"hasRelatedMediaFragment_ssim":["0p096783v"],"hasRelatedImage_ssim":["0p096783v"],"depositor_ssim":["schmiddr@ucmail.uc.edu"],"depositor_tesim":["schmiddr@ucmail.uc.edu"],"title_tesim":["Rainbow"],"date_uploaded_dtsi":"2019-03-09T12:30:49Z","date_modified_dtsi":"2019-03-09T12:30:49Z","isPartOf_ssim":["admin_set/default"],"college_tesim":["Engineering and Applied Science"],"department_tesim":["- Computing Sciences \u0026 Informatics"],"creator_tesim":["Petzoldt, Albrecht","Schmidt, Dieter Sam","Ding, Jintai"],"description_tesim":["Magma programs to chapter 5 of the book \"Multivariate Public Key Cryptosystems\"  by Ding, Petzoldt and Schmidt.\r\nFor the rainbow cryptosystems\r\nload \"keygen.txt';  will generate the files public_key.txt and private_key.txt, which are then used via\r\n\r\nload \"sign.txt\"; to genertate the signature of a randomly generated document,  and by\r\n\r\nload \"verify.txt\";  to chack that it is a valid signature\r\n"],"license_tesim":["http://creativecommons.org/publicdomain/mark/1.0/"],"thumbnail_path_ss":"/assets/work-ff055336041c3f7d310ad69109eda4a887b16ec501f35afc0a547c4adb97ee72.png","suppressed_bsi":false,"actionable_workflow_roles_ssim":["admin_set/default-default-depositing"],"workflow_state_name_ssim":["deposited"],"member_ids_ssim":["0p096783v","6h440t51n","z316q2535"],"file_set_ids_ssim":["0p096783v","6h440t51n","z316q2535"],"visibility_ssi":"open","admin_set_tesim":["Default Admin Set"],"sort_title_ssi":"RAINBOW","human_readable_type_tesim":["Dataset"],"read_access_group_ssim":["public"],"edit_access_group_ssim":["admin"],"edit_access_person_ssim":["schmiddr@ucmail.uc.edu"],"nesting_collection__pathnames_ssim":["r207tq35f"],"nesting_collection__deepest_nested_depth_isi":1,"_version_":1697114446233600000,"timestamp":"2021-04-15T13:47:39.375Z","score":0.00049999997},{"system_create_dtsi":"2019-03-06T17:28:06Z","system_modified_dtsi":"2021-04-16T14:56:47Z","has_model_ssim":["Document"],"id":"b5644s654","accessControl_ssim":["5862c667-fa75-4e0e-8ef3-19af03d61462"],"hasRelatedMediaFragment_ssim":["3t945r88s"],"hasRelatedImage_ssim":["3t945r88s"],"depositor_ssim":["schmiddr@ucmail.uc.edu"],"depositor_tesim":["schmiddr@ucmail.uc.edu"],"title_tesim":["Multivariate Public Key Cryptosystems"],"date_uploaded_dtsi":"2019-03-06T17:28:06Z","date_modified_dtsi":"2020-08-12T19:17:25Z","isPartOf_ssim":["admin_set/default"],"doi_tesim":["doi:10.7945/5sqr-g734"],"college_tesim":["Engineering and Applied Science"],"department_tesim":["- Computing Sciences \u0026 Informatics"],"creator_tesim":["Schmidt, Dieter Sam","Petzoldt, Albrecht","Ding, Jintai"],"publisher_tesim":["University of Cincinnati"],"description_tesim":["Programs used and described in the book \"Multivariate Public Key Cryptosystems\" by Ding, Petzoldt and Schmidt.   All programs can be downloaded via the attached zip file.  Modify the file \"startup.txt\"  so that the base directory  matches your setup. Put this file where magma can find it. \r\n After starting magma  run:  load \"startup.txt\";   It will then allow you to select the method on which you want to work.\r\n\r\n\r\nFiles can be downloaded individually by clicking on a chapter name and then selecting the scheme of interest.\r\n"],"license_tesim":["http://creativecommons.org/publicdomain/mark/1.0/"],"source_tesim":["b5644s654"],"thumbnail_path_ss":"/assets/work-ff055336041c3f7d310ad69109eda4a887b16ec501f35afc0a547c4adb97ee72.png","suppressed_bsi":false,"actionable_workflow_roles_ssim":["admin_set/default-default-depositing"],"workflow_state_name_ssim":["deposited"],"member_ids_ssim":["0k225b94v","0g354g08r","0c483m090","2801ph54m","6t053g89c","3t945r88s","vm40xs59m","pn89d7644","sf268653c"],"file_set_ids_ssim":["0k225b94v","0g354g08r","0c483m090","2801ph54m","6t053g89c","3t945r88s","vm40xs59m","pn89d7644","sf268653c"],"visibility_ssi":"open","admin_set_tesim":["Default Admin Set"],"sort_title_ssi":"MULTIVARIATE PUBLIC KEY CRYPTOSYSTEMS","human_readable_type_tesim":["Document"],"read_access_group_ssim":["public"],"edit_access_group_ssim":["admin"],"edit_access_person_ssim":["schmiddr@ucmail.uc.edu"],"nesting_collection__pathnames_ssim":["b5644s654"],"nesting_collection__deepest_nested_depth_isi":1,"_version_":1697209393578246144,"timestamp":"2021-04-16T14:56:48.219Z","score":0.00049999997}],"facets":[{"name":"human_readable_type_sim","items":[{"value":"Document","hits":8,"label":"Document"},{"value":"Dataset","hits":1,"label":"Dataset"}],"label":"Human Readable Type Sim"},{"name":"creator_sim","items":[{"value":"Ding, Jintai","hits":9,"label":"Ding, Jintai"},{"value":"Petzoldt, Albrecht","hits":9,"label":"Petzoldt, Albrecht"},{"value":"Schmidt, Dieter Sam","hits":8,"label":"Schmidt, Dieter Sam"}],"label":"Creator Sim"},{"name":"subject_sim","items":[{"value":"Computing","hits":1,"label":"Computing"}],"label":"Subject Sim"},{"name":"college_sim","items":[{"value":"Engineering and Applied Science","hits":9,"label":"Engineering and Applied Science"}],"label":"College Sim"},{"name":"department_sim","items":[{"value":"- Computing Sciences \u0026 Informatics","hits":8,"label":"- Computing Sciences \u0026 Informatics"},{"value":"- Electrical Engineering and Computer Science","hits":1,"label":"- Electrical Engineering and Computer Science"}],"label":"Department Sim"},{"name":"language_sim","items":[],"label":"Language Sim"},{"name":"publisher_sim","items":[{"value":"University of Cincinnati","hits":1,"label":"University of Cincinnati"}],"label":"Publisher Sim"},{"name":"date_created_sim","items":[{"value":"2020-01","hits":1,"label":"2020-01"}],"label":"Date Created Sim"},{"name":"member_of_collection_ids_ssim","items":[],"label":"Member Of Collection Ids Ssim"},{"name":"generic_type_sim","items":[{"value":"Work","hits":9,"label":"Work"}],"label":"Generic Type Sim"}],"pages":{"current_page":1,"next_page":null,"prev_page":null,"total_pages":1,"limit_value":10,"offset_value":0,"total_count":9,"first_page?":true,"last_page?":true}}}