{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,10]],"date-time":"2024-09-10T21:37:35Z","timestamp":1726004255946},"publisher-location":"Cham","reference-count":16,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030061517"},{"type":"electronic","value":"9783030061524"}],"license":[{"start":{"date-parts":[[2018,12,30]],"date-time":"2018-12-30T00:00:00Z","timestamp":1546128000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-06152-4_16","type":"book-chapter","created":{"date-parts":[[2018,12,29]],"date-time":"2018-12-29T14:32:55Z","timestamp":1546093975000},"page":"183-194","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Post-quantum Cryptoschemes: New Finite Non-commutative Algebras for Defining Hidden Logarithm Problem"],"prefix":"10.1007","author":[{"given":"Hieu Minh","family":"Nguyen","sequence":"first","affiliation":[]},{"given":"Nikolay Andreevich","family":"Moldovyan","sequence":"additional","affiliation":[]},{"given":"Alexandr Andreevich","family":"Moldovyan","sequence":"additional","affiliation":[]},{"given":"Nam Hai","family":"Nguyen","sequence":"additional","affiliation":[]},{"given":"Cong Manh","family":"Tran","sequence":"additional","affiliation":[]},{"given":"Ngoc Han","family":"Phieu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,12,30]]},"reference":[{"issue":"3\/4","key":"16_CR1","first-page":"1","volume":"6","author":"A Sirwan","year":"2016","unstructured":"Sirwan, A., Majeed, N.: New algorithm for wireless network communication security. Int. J. Cryptogr. Inf. Secur. 6(3\/4), 1\u20138 (2016)","journal-title":"Int. J. Cryptogr. Inf. Secur."},{"issue":"3","key":"16_CR2","doi-asserted-by":"publisher","first-page":"196","DOI":"10.1504\/IJACT.2017.086232","volume":"3","author":"Y Feng","year":"2017","unstructured":"Feng, Y., Yang, G., Liu, J.K.: A new public remote integrity checking scheme with user and data privacy. Int. J. Appl. Cryptogr. 3(3), 196\u2013209 (2017)","journal-title":"Int. J. Appl. Cryptogr."},{"issue":"3","key":"16_CR3","first-page":"295","volume":"10","author":"SY Chiou","year":"2016","unstructured":"Chiou, S.Y.: Novel digital signature schemes based on factoring and discrete logarithms. Int. J. Secur. Appl. 10(3), 295\u2013310 (2016)","journal-title":"Int. J. Secur. Appl."},{"issue":"1","key":"16_CR4","doi-asserted-by":"publisher","first-page":"99","DOI":"10.1007\/s10623-008-9246-y","volume":"51","author":"D Poulakis","year":"2009","unstructured":"Poulakis, D.: A variant of digital signature algorithm. Des. Codes Cryptogr. 51(1), 99\u2013104 (2009)","journal-title":"Des. Codes Cryptogr."},{"key":"16_CR5","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-25823-2","volume-title":"Quantum Computational Number Theory","author":"SY Yan","year":"2015","unstructured":"Yan, S.Y.: Quantum Computational Number Theory, 1st edn. Springer, Cham (2015). https:\/\/doi.org\/10.1007\/978-3-319-25823-2","edition":"1"},{"key":"16_CR6","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4419-7722-9","volume-title":"Quantum Attacks on Public-Key Cryptosystems","author":"SY Yan","year":"2013","unstructured":"Yan, S.Y.: Quantum Attacks on Public-Key Cryptosystems, 1st edn. Springer, Boston (2013). https:\/\/doi.org\/10.1007\/978-1-4419-7722-9","edition":"1"},{"key":"16_CR7","doi-asserted-by":"publisher","first-page":"1484","DOI":"10.1137\/S0097539795293172","volume":"26","author":"PW Shor","year":"1997","unstructured":"Shor, P.W.: Polynomial-time algorithms for prime factorization and discrete logarithms on quantum computer. SIAM J. Comput. 26, 1484\u20131509 (1997)","journal-title":"SIAM J. Comput."},{"issue":"7457","key":"16_CR8","doi-asserted-by":"publisher","first-page":"163","DOI":"10.1038\/nature12290","volume":"499","author":"JA Smolin","year":"2013","unstructured":"Smolin, J.A., Smith, G., Vargo, A.: Oversimplifying quantum factoring. Nature 499(7457), 163\u2013165 (2013)","journal-title":"Nature"},{"key":"16_CR9","unstructured":"Federal Register: Announcing Request for Nominations for Public-Key Post-Quantum Cryptographic Algorithms. The Daily journal of the United States Government. https:\/\/www.gpo.gov\/fdsys\/pkg\/FR-2016-12-20\/pdf\/2016-30615.pdf . Accessed 6 June 2018"},{"key":"16_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-29360-8","volume-title":"Post-Quantum Cryptography","year":"2016","unstructured":"Takagi, T. (ed.): PQCrypto 2016. LNCS, vol. 9606. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-29360-8"},{"issue":"1","key":"16_CR11","doi-asserted-by":"crossref","first-page":"115","DOI":"10.15388\/Informatica.2007.167","volume":"18","author":"E Sakalauskas","year":"2007","unstructured":"Sakalauskas, E., Tvarijonas, P., Raulynaitis, A.: Key Agreement Protocol (KAP) using conjugacy and discrete logarithm problems in group representation level. Informatica 18(1), 115\u2013124 (2007)","journal-title":"Informatica"},{"issue":"2","key":"16_CR12","first-page":"165","volume":"18","author":"DN Moldovyan","year":"2010","unstructured":"Moldovyan, D.N.: Non-commutative finite groups as primitive of public-key cryptoschemes. Quasigroups Relat. Syst. 18(2), 165\u2013176 (2010)","journal-title":"Quasigroups Relat. Syst."},{"issue":"2","key":"16_CR13","first-page":"177","volume":"18","author":"DN Moldovyan","year":"2010","unstructured":"Moldovyan, D.N., Moldovyan, N.A.: Cryptoschemes over hidden conjugacy search problem and attacks using homomorphisms. Quasigroups Relat. Syst. 18(2), 177\u2013186 (2010)","journal-title":"Quasigroups Relat. Syst."},{"issue":"5","key":"16_CR14","doi-asserted-by":"publisher","first-page":"629","DOI":"10.1007\/s10958-017-3371-y","volume":"223","author":"AS Kuz\u2019min","year":"2017","unstructured":"Kuz\u2019min, A.S., Markov, V.T., Mikhalev, A.A., Mikhalev, A.V., Nechaev, A.A.: Cryptographical algorithms on groups and algebras. J. Math. Sci. 223(5), 629\u2013641 (2017)","journal-title":"J. Math. Sci."},{"issue":"61","key":"16_CR15","first-page":"1","volume":"3","author":"NA Moldovyan","year":"2009","unstructured":"Moldovyan, N.A., Moldovyanu, P.A.: Vector form of the finite fields $$GF(p^m)$$. Bul. Acad. \u015etiin\u0163e Repub. Mold. Mat. 3(61), 1\u20137 (2009)","journal-title":"Bul. Acad. \u015etiin\u0163e Repub. Mold. Mat."},{"key":"16_CR16","doi-asserted-by":"publisher","first-page":"355","DOI":"10.1016\/S0747-7171(08)80017-X","volume":"9","author":"L Ronyai","year":"1990","unstructured":"Ronyai, L.: Computing the structure of finite algebras. J. Symb. Comput. 9, 355\u2013373 (1990)","journal-title":"J. Symb. Comput."}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Context-Aware Systems and Applications, and Nature of Computation and Communication"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-06152-4_16","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,20]],"date-time":"2020-11-20T20:47:40Z","timestamp":1605905260000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-06152-4_16"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,12,30]]},"ISBN":["9783030061517","9783030061524"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-06152-4_16","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2018,12,30]]},"assertion":[{"value":"ICTCC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Nature of Computation and Communication","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Viet Tri City","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Vietnam","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22 November 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23 November 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"4","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ictcc2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/iccasa.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}