{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,10]],"date-time":"2025-12-10T12:47:47Z","timestamp":1765370867014,"version":"3.46.0"},"publisher-location":"Cham","reference-count":17,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783032133007","type":"print"},{"value":"9783032133014","type":"electronic"}],"license":[{"start":{"date-parts":[[2025,12,11]],"date-time":"2025-12-11T00:00:00Z","timestamp":1765411200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,12,11]],"date-time":"2025-12-11T00:00:00Z","timestamp":1765411200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026]]},"DOI":"10.1007\/978-3-032-13301-4_1","type":"book-chapter","created":{"date-parts":[[2025,12,10]],"date-time":"2025-12-10T09:12:28Z","timestamp":1765357948000},"page":"3-20","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["On the\u00a0Classical Hardness of\u00a0the\u00a0Semidirect Discrete Logarithm Problem in\u00a0Finite Groups"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0009-0004-4965-9380","authenticated-orcid":false,"given":"Mohammad Ferry","family":"Husnil Arif","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0776-2644","authenticated-orcid":false,"given":"Muhammad","family":"Imran","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,12,11]]},"reference":[{"key":"1_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"330","DOI":"10.1007\/978-981-96-0944-4_11","volume-title":"Advances in Cryptology \u2013 ASIACRYPT 2024","author":"C Battarbee","year":"2024","unstructured":"Battarbee, C., et al.: On the semidirect discrete logarithm problem in finite groups. In: Chung, K.M., Sasaki, Y. (eds.) ASIACRYPT 2024. LNCS, vol. 15491, pp. 330\u2013357. Springer, Singapore (2024). https:\/\/doi.org\/10.1007\/978-981-96-0944-4_11"},{"key":"1_CR2","doi-asserted-by":"crossref","unstructured":"Battarbee, C., Kahrobaei, D., Perret, L., Shahandashti, S.F.: SPDH-sign: towards efficient, post-quantum group-based signatures. Cryptology ePrint Archive (2023)","DOI":"10.1007\/978-3-031-40003-2_5"},{"key":"1_CR3","doi-asserted-by":"publisher","unstructured":"Buhler, J.P., Lenstra, H.W., Pomerance, C.: Factoring integers with the number field sieve. In: Lenstra, A.K., Lenstra, H.W. (eds.) The development of the number field sieve. LNM, vol. 1554, pp. 50\u201394. Springer, Heidelberg (1993). https:\/\/doi.org\/10.1007\/BFb0091539","DOI":"10.1007\/BFb0091539"},{"key":"1_CR4","doi-asserted-by":"publisher","unstructured":"Castryck, W., Lange, T., Martindale, C., Panny, L., Renes, J.: CSIDH: an efficient post-quantum commutative group action. In: Peyrin, T., Galbraith, S. (eds.) ASIACRYPT 2018. LNCS, vol. 11274, pp. 395\u2013427. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-030-03332-3_15","DOI":"10.1007\/978-3-030-03332-3_15"},{"issue":"4","key":"1_CR5","doi-asserted-by":"publisher","first-page":"405","DOI":"10.1515\/jmc-2013-0038","volume":"8","author":"AM Childs","year":"2014","unstructured":"Childs, A.M., Ivanyos, G.: Quantum computation of discrete logarithms in semigroups. J. Math. Cryptol. 8(4), 405\u2013416 (2014)","journal-title":"J. Math. Cryptol."},{"key":"1_CR6","unstructured":"Couveignes, J.M.: Hard homogeneous spaces. Cryptology ePrint Archive (2006)"},{"key":"1_CR7","doi-asserted-by":"publisher","unstructured":"Darafsheh, M.: Order of elements in the groups related to the general linear group. Finite Fields Appl. 11(4), 738\u2013747 (2005). https:\/\/doi.org\/10.1016\/j.ffa.2004.12.003, https:\/\/www.sciencedirect.com\/science\/article\/pii\/S1071579704000760","DOI":"10.1016\/j.ffa.2004.12.003"},{"issue":"1","key":"1_CR8","doi-asserted-by":"publisher","first-page":"124","DOI":"10.1137\/0406010","volume":"6","author":"DM Gordon","year":"1993","unstructured":"Gordon, D.M.: Discrete logarithms in $gf ( p )$ using the number field sieve. SIAM J. Discret. Math. 6(1), 124\u2013138 (1993). https:\/\/doi.org\/10.1137\/0406010","journal-title":"SIAM J. Discret. Math."},{"issue":"6","key":"1_CR9","doi-asserted-by":"publisher","first-page":"2624","DOI":"10.1080\/00927872.2013.766827","volume":"42","author":"D Grigoriev","year":"2014","unstructured":"Grigoriev, D., Shpilrain, V.: Tropical cryptography. Comm. Algebra 42(6), 2624\u20132632 (2014)","journal-title":"Comm. Algebra"},{"key":"1_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"475","DOI":"10.1007\/978-3-642-38980-1_30","volume-title":"Applied Cryptography and Network Security","author":"M Habeeb","year":"2013","unstructured":"Habeeb, M., Kahrobaei, D., Koupparis, C., Shpilrain, V.: Public key exchange using semidirect product of (semi)groups. In: Jacobson, M., Locasto, M., Mohassel, P., Safavi-Naini, R. (eds.) ACNS 2013. LNCS, vol. 7954, pp. 475\u2013486. Springer, Heidelberg (2013). https:\/\/doi.org\/10.1007\/978-3-642-38980-1_30"},{"key":"1_CR11","doi-asserted-by":"crossref","unstructured":"Imran, M., Ivanyos, G.: Efficient quantum algorithms for some instances of the semidirect discrete logarithm problem. Designs Codes Cryptogr. 1\u201319 (2024)","DOI":"10.1007\/s10623-024-01416-8"},{"key":"1_CR12","doi-asserted-by":"publisher","unstructured":"Lenstra, A.K., Lenstra, H.W., Manasse, M.S., Pollard, J.M.: The number field sieve. In: Proceedings of the Twenty-Second Annual ACM Symposium on Theory of Computing, STOC 1990, pp. 564\u2013572. Association for Computing Machinery, New York (1990). https:\/\/doi.org\/10.1145\/100216.100295","DOI":"10.1145\/100216.100295"},{"key":"1_CR13","doi-asserted-by":"crossref","unstructured":"Pollard, J.M.: Monte Carlo methods for index computation $$(\\text{mod} p)$$. Math. Comput. 32(143), 918\u2013924 (1978). http:\/\/www.jstor.org\/stable\/2006496","DOI":"10.1090\/S0025-5718-1978-0491431-9"},{"key":"1_CR14","doi-asserted-by":"publisher","unstructured":"Shanks, D.: Class number, a theory of factorization, and genera. In: Proceedings of Symposia in Pure Mathematics, pp. 415\u2013440 (1971). https:\/\/doi.org\/10.1090\/pspum\/020\/0316385","DOI":"10.1090\/pspum\/020\/0316385"},{"key":"1_CR15","doi-asserted-by":"crossref","unstructured":"Shor, P.W.: Algorithms for quantum computation: discrete logarithms and factoring. In: Proceedings 35th Annual Symposium on Foundations of Computer Science, pp. 124\u2013134. IEEE (1994)","DOI":"10.1109\/SFCS.1994.365700"},{"key":"1_CR16","doi-asserted-by":"publisher","unstructured":"Silverman, J.H.: The Arithmetic of Elliptic Curves, vol. 106. Springer, New York (2009). https:\/\/doi.org\/10.1007\/978-0-387-09494-6","DOI":"10.1007\/978-0-387-09494-6"},{"key":"1_CR17","doi-asserted-by":"crossref","unstructured":"Stickel, E.: A new method for exchanging secret keys. In: Third International Conference on Information Technology and Applications (ICITA 2005), vol.\u00a02, pp. 426\u2013430. IEEE (2005)","DOI":"10.1109\/ICITA.2005.33"}],"container-title":["Lecture Notes in Computer Science","Progress in Cryptology \u2013 INDOCRYPT 2025"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-032-13301-4_1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,10]],"date-time":"2025-12-10T09:12:31Z","timestamp":1765357951000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-032-13301-4_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,12,11]]},"ISBN":["9783032133007","9783032133014"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-032-13301-4_1","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,12,11]]},"assertion":[{"value":"11 December 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"INDOCRYPT","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Cryptology in India","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Bhubaneshwar","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"India","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14 December 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17 December 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"indocrypt2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}