1. [1] D. Bernstein, J. Buchmann, and E. Dahmen, eds., Post-Quantum Cryptography, Springer, 2009.
2. [2] O. Billet and H. Gilbert, “Cryptanalysis of rainbow,” Security and Cryptography for Networks — SCN 2006, Lect. Notes Comput. Sci., vol.4116, pp.336-347, Springer, 2006.
3. [3] N. Courtois, A. Klimov, J. Patarin, and A. Shamir, “Efficient algorithms for solving overdefined systems of multivariate polynomial equations,” Advances in cryptology, Eurocrypt 2000, Lect. Notes Comput. Sci., vol.1807, pp.392-407, Springer, 2000.
4. [4] J. Ding, “A new variant of the Matsumoto-Imai cryptosystem through perturbation,” Public key Cryptography — PKC'04, Lect. Notes Comput. Sci., vol.2947, pp.305-318, Springer, 2004.
5. [5] J. Ding, J. Buchmann, M.S.E. Mohamed, W.S.A. Mohamed, and R.P. Weinmann, “MutantXL,” The First International Conference on Symbolic Computation and Cryptography — SCC 2008, pp.16-22, 2008.