{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,11]],"date-time":"2026-03-11T20:46:33Z","timestamp":1773261993655,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":10,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783642147050","type":"print"},{"value":"9783642147067","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-14706-7_14","type":"book-chapter","created":{"date-parts":[[2010,8,11]],"date-time":"2010-08-11T09:14:43Z","timestamp":1281518083000},"page":"183-194","source":"Crossref","is-referenced-by-count":20,"title":["A New Hard Problem over Non-commutative Finite Groups for Cryptographic Protocols"],"prefix":"10.1007","author":[{"given":"Dmitriy N.","family":"Moldovyan","sequence":"first","affiliation":[]},{"given":"Nikolay A.","family":"Moldovyan","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"14_CR1","unstructured":"International Standard ISO\/IEC 14888-3:2006(E). Information technology \u2013 Security techniques \u2013 Digital Signatures with appendix \u2013 Part 3: Discrete logarithm based mechanisms"},{"key":"14_CR2","doi-asserted-by":"publisher","first-page":"1484","DOI":"10.1137\/S0097539795293172","volume":"26","author":"P.W. Shor","year":"1997","unstructured":"Shor, P.W.: Polynomial-time algorithms for prime factorization and discrete logarithms on quantum computer. SIAM Journal of Computing\u00a026, 1484\u20131509 (1997)","journal-title":"SIAM Journal of Computing"},{"key":"14_CR3","doi-asserted-by":"crossref","first-page":"287","DOI":"10.4310\/MRL.1999.v6.n3.a3","volume":"6","author":"I. Anshel","year":"1999","unstructured":"Anshel, I., Anshel, M., Goldfeld, D.: An Algebraic Method for Public Key Cryptography. Mathematical Research Letters\u00a06, 287\u2013291 (1999)","journal-title":"Mathematical Research Letters"},{"key":"14_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"166","DOI":"10.1007\/3-540-44598-6_10","volume-title":"Advances in Cryptology - CRYPTO 2000","author":"K.H. Ko","year":"2000","unstructured":"Ko, K.H., Lee, S.J., Cheon, J.H., Han, J.W., Kang, J.S., Park, C.: New Public-Key Cryptosystems Using Braid Groups. In: Bellare, M. (ed.) CRYPTO 2000. LNCS, vol.\u00a01880, pp. 166\u2013183. Springer, Heidelberg (2000)"},{"key":"14_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"477","DOI":"10.1007\/3-540-39200-9_30","volume-title":"Advances in Cryptology \u2013 EUROCRPYT 2003","author":"E. Lee","year":"2003","unstructured":"Lee, E., Park, J.H.: Cryptanalysis of the Public Key Encryption Based on Braid Groups. In: Biham, E. (ed.) EUROCRYPT 2003. LNCS, vol.\u00a02656, pp. 477\u2013489. Springer, Heidelberg (2003)"},{"key":"14_CR6","first-page":"214","volume":"9","author":"G.K. Verma","year":"2009","unstructured":"Verma, G.K.: A Proxy Blind Signature Scheme over Braid Groups. International Journal of Network Security\u00a09, 214\u2013217 (2009)","journal-title":"International Journal of Network Security"},{"key":"14_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"86","DOI":"10.1007\/11535218_6","volume-title":"Advances in Cryptology \u2013 CRYPTO 2005","author":"A. Myasnikov","year":"2005","unstructured":"Myasnikov, A., Shpilrain, V., Ushakov, A.: A Practical Attack on a Braid Group Based Cryptographic Protocol. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol.\u00a03621, pp. 86\u201396. Springer, Heidelberg (2005)"},{"key":"14_CR8","volume-title":"Group Theory Foundations","author":"M.I. Kargapolov","year":"1996","unstructured":"Kargapolov, M.I., Merzlyakov, Y. I.: Group Theory Foundations. Fizmatlit, Moscow (1996) (in Russian)"},{"key":"14_CR9","doi-asserted-by":"publisher","first-page":"644","DOI":"10.1109\/TIT.1976.1055638","volume":"IT-22","author":"W. Diffie","year":"1976","unstructured":"Diffie, W., Hellman, M.E.: New Directions in Cryptography. IEEE Transactions on Information Theory\u00a0IT-22, 644\u2013654 (1976)","journal-title":"IEEE Transactions on Information Theory"},{"key":"14_CR10","first-page":"271","volume":"17","author":"N.A. Moldovyan","year":"2009","unstructured":"Moldovyan, N.A., Moldovyanu, P.A.: New Primitives for Digital Signature Algorithms: Vector Finite Fields. Quasigroups and Related Systems\u00a017, 271\u2013282 (2009)","journal-title":"Quasigroups and Related Systems"}],"container-title":["Lecture Notes in Computer Science","Computer Network Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-14706-7_14.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,30]],"date-time":"2021-04-30T12:36:30Z","timestamp":1619786190000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-14706-7_14"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642147050","9783642147067"],"references-count":10,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-14706-7_14","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2010]]}}}