{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,20]],"date-time":"2025-12-20T22:14:52Z","timestamp":1766268892400,"version":"build-2065373602"},"publisher-location":"Cham","reference-count":17,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319401881"},{"type":"electronic","value":"9783319401898"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-40189-8_14","type":"book-chapter","created":{"date-parts":[[2016,6,13]],"date-time":"2016-06-13T15:34:07Z","timestamp":1465832047000},"page":"132-141","source":"Crossref","is-referenced-by-count":15,"title":["Using Semidirect Product of (Semi)groups in Public Key Cryptography"],"prefix":"10.1007","author":[{"given":"Delaram","family":"Kahrobaei","sequence":"first","affiliation":[]},{"given":"Vladimir","family":"Shpilrain","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,6,14]]},"reference":[{"key":"14_CR1","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1090\/conm\/418\/07943","volume":"418","author":"I Anshel","year":"2006","unstructured":"Anshel, I., Anshel, M., Goldfeld, D., Lemieux, S.: Key agreement, the algebraic eraser, and lightweight cryptography, algebraic methods in cryptography. Contemp. Math. Am. Math. Soc. 418, 1\u201334 (2006)","journal-title":"Contemp. Math. Am. Math. Soc."},{"key":"14_CR2","doi-asserted-by":"crossref","first-page":"644","DOI":"10.1109\/TIT.1976.1055638","volume":"22","author":"W Diffie","year":"1976","unstructured":"Diffie, W., Hellman, M.E.: New directions in cryptography. IEEE Trans. Inf. Theory IT 22, 644\u2013654 (1976)","journal-title":"IEEE Trans. Inf. Theory IT"},{"key":"14_CR3","unstructured":"Ding, J., Miasnikov, A. D., Ushakov, A.: A linear attack on a key exchange protocol using extensions of matrix semigroups. (preprint). http:\/\/eprint.iacr.org\/2015\/018"},{"key":"14_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"475","DOI":"10.1007\/978-3-642-38980-1_30","volume-title":"Applied Cryptography and Network Security","author":"M Habeeb","year":"2013","unstructured":"Habeeb, M., Kahrobaei, D., Koupparis, C., Shpilrain, V.: Public key exchange using semidirect product of (semi)groups. In: Jacobson, M., Locasto, M., Mohassel, P., Safavi-Naini, R. (eds.) ACNS 2013. LNCS, vol. 7954, pp. 475\u2013486. Springer, Heidelberg (2013)"},{"key":"14_CR5","doi-asserted-by":"crossref","first-page":"335","DOI":"10.1016\/0021-8693(70)90063-3","volume":"15","author":"GJ Janusz","year":"1970","unstructured":"Janusz, G.J.: Faithful representations of p-groups at characteristic p. J. Algebra 15, 335\u2013351 (1970)","journal-title":"J. Algebra"},{"key":"14_CR6","doi-asserted-by":"crossref","first-page":"97","DOI":"10.1515\/gcc-2013-0007","volume":"5","author":"D Kahrobaei","year":"2013","unstructured":"Kahrobaei, D., Koupparis, C., Shpilrain, V.: Public key exchange using matrices over group rings. Groups Complex. Cryptol. 5, 97\u2013115 (2013)","journal-title":"Groups Complex. Cryptol."},{"key":"14_CR7","unstructured":"Kahrobaei, D., Lam, H., Shpilrain, V.: Public key exchange using extensions by endomorphisms and matrices over a Galois field. (preprint)"},{"key":"14_CR8","doi-asserted-by":"crossref","DOI":"10.1201\/9781439821916","volume-title":"Handbook of Applied Cryptography","author":"A Menezes","year":"1996","unstructured":"Menezes, A., van Oorschot, P., Vanstone, S.: Handbook of Applied Cryptography. CRC-Press, Boca Raton (1996)"},{"key":"14_CR9","doi-asserted-by":"crossref","first-page":"81","DOI":"10.1515\/gcc-2015-0007","volume":"7","author":"AG Myasnikov","year":"2015","unstructured":"Myasnikov, A.G., Romankov, V.: A linear decomposition attack. Groups Complex. Cryptol. 7, 81\u201394 (2015)","journal-title":"Groups Complex. Cryptol."},{"key":"14_CR10","volume-title":"Group-Based Cryptography","author":"AG Myasnikov","year":"2008","unstructured":"Myasnikov, A.G., Shpilrain, V., Ushakov, A.: Group-Based Cryptography. Birkh\u00e4user, Basel (2008)"},{"key":"14_CR11","series-title":"Surveys and Monographs","doi-asserted-by":"crossref","DOI":"10.1090\/surv\/177","volume-title":"Non-commutative Cryptography and Complexity of Group-Theoretic Problems","author":"AG Myasnikov","year":"2011","unstructured":"Myasnikov, A.G., Shpilrain, V., Ushakov, A.: Non-commutative Cryptography and Complexity of Group-Theoretic Problems. Surveys and Monographs. American Mathematical Society, Providence (2011)"},{"key":"14_CR12","doi-asserted-by":"crossref","first-page":"376","DOI":"10.1016\/j.jalgebra.2006.03.002","volume":"300","author":"W Nickel","year":"2006","unstructured":"Nickel, W.: Matrix representations for torsion-free nilpotent groups by deep thought. J. Algebra 300, 376\u2013383 (2006)","journal-title":"J. Algebra"},{"key":"14_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"470","DOI":"10.1007\/3-540-44647-8_28","volume-title":"Advances in Cryptology - CRYPTO 2001","author":"S-H Paeng","year":"2001","unstructured":"Paeng, S.-H., Ha, K.-C., Kim, J.H., Chee, S., Park, C.: New public key cryptosystem using finite non abelian groups. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, p. 470. Springer, Heidelberg (2001)"},{"key":"14_CR14","unstructured":"Romankov, V.: Linear decomposition attack on public key exchange protocols using semidirect products of (semi)groups. (preprint). http:\/\/arxiv.org\/abs\/1501.01152"},{"key":"14_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"283","DOI":"10.1007\/978-3-540-79709-8_29","volume-title":"Computer Science \u2013 Theory and Applications","author":"V Shpilrain","year":"2008","unstructured":"Shpilrain, V.: Cryptanalysis of Stickel\u2019s key exchange scheme. In: Hirsch, E.A., Razborov, A.A., Semenov, A., Slissenko, A. (eds.) Computer Science \u2013 Theory and Applications. LNCS, vol. 5010, pp. 283\u2013288. Springer, Heidelberg (2008)"},{"key":"14_CR16","doi-asserted-by":"crossref","unstructured":"Stickel, E.: A new method for exchanging secret keys. In: Proceedings of the Third International Conference on Information Technology and Applications (ICITA 2005), Contemporary Mathematics, vol. 2, pp. 426\u2013430. IEEE Computer Society (2005)","DOI":"10.1109\/ICITA.2005.33"},{"key":"14_CR17","doi-asserted-by":"crossref","DOI":"10.1201\/9781420071474","volume-title":"Elliptic Curves: Number Theory and Cryptography","author":"LC Washington","year":"2008","unstructured":"Washington, L.C.: Elliptic Curves: Number Theory and Cryptography. Chapman and Hall\/CRC, Boca Raton (2008)"}],"container-title":["Lecture Notes in Computer Science","Pursuit of the Universal"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-40189-8_14","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,24]],"date-time":"2017-06-24T16:17:30Z","timestamp":1498321050000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-40189-8_14"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319401881","9783319401898"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-40189-8_14","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2016]]}}}