{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,11]],"date-time":"2026-03-11T12:11:49Z","timestamp":1773231109247,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":8,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783642389795","type":"print"},{"value":"9783642389801","type":"electronic"}],"license":[{"start":{"date-parts":[[2013,1,1]],"date-time":"2013-01-01T00:00:00Z","timestamp":1356998400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-38980-1_30","type":"book-chapter","created":{"date-parts":[[2013,6,20]],"date-time":"2013-06-20T18:26:48Z","timestamp":1371752808000},"page":"475-486","source":"Crossref","is-referenced-by-count":34,"title":["Public Key Exchange Using Semidirect Product of (Semi)Groups"],"prefix":"10.1007","author":[{"given":"Maggie","family":"Habeeb","sequence":"first","affiliation":[]},{"given":"Delaram","family":"Kahrobaei","sequence":"additional","affiliation":[]},{"given":"Charalambos","family":"Koupparis","sequence":"additional","affiliation":[]},{"given":"Vladimir","family":"Shpilrain","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"30_CR1","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1090\/conm\/418\/07943","volume":"418","author":"I. Anshel","year":"2006","unstructured":"Anshel, I., Anshel, M., Goldfeld, D., Lemieux, S.: Key agreement, the Algebraic Eraser, and lightweight cryptography. Algebraic Methods in Cryptography, Contemp. Math. Amer. Math. Soc.\u00a0418, 1\u201334 (2006)","journal-title":"Algebraic Methods in Cryptography, Contemp. Math. Amer. Math. Soc."},{"key":"30_CR2","doi-asserted-by":"publisher","first-page":"644","DOI":"10.1109\/TIT.1976.1055638","volume":"22","author":"W. Diffie","year":"1976","unstructured":"Diffie, W., Hellman, M.E.: New Directions in Cryptography. IEEE Transactions on Information Theory\u00a0IT-22, 644\u2013654 (1976)","journal-title":"IEEE Transactions on Information Theory"},{"key":"30_CR3","unstructured":"Habeeb, M., Kahrobaei, D., Shpilrain, V.: A public key exchange using semidirect products of groups (extended abstract). In: Proceedings of the International Conference in Symbolic Computations and Cryptography, SCC 2010, Royal Holloway, University of London, Egham, United Kingdom (June 2010)"},{"key":"30_CR4","unstructured":"Kahrobaei, D., Koupparis, C., Shpilrain, V.: Public key exchange using matrices over group rings, Groups, Complexity, and Cryptology (to appear), \n                    \n                      http:\/\/arxiv.org\/abs\/1302.1625"},{"key":"30_CR5","unstructured":"Menezes, A., van Oorschot, P., Vanstone, S.: Handbook of Applied Cryptography. CRC-Press (1996)"},{"key":"30_CR6","unstructured":"Myasnikov, A.G., Shpilrain, V., Ushakov, A.: Group-based cryptography. Birkha \u0308user (2008)"},{"key":"30_CR7","doi-asserted-by":"crossref","unstructured":"Myasnikov, A.G., Shpilrain, V., Ushakov, A.: Non-commutative cryptography and complexity of group-theoretic problems. Amer. Math. Soc. Surveys and Monographs (2011)","DOI":"10.1090\/surv\/177"},{"key":"30_CR8","series-title":"LNCS","doi-asserted-by":"publisher","first-page":"470","DOI":"10.1007\/3-540-44647-8_28","volume-title":"CRYPTO 2001","author":"S.-H. Paeng","year":"2001","unstructured":"Paeng, S.-H., Ha, K.-C., Kim, J.H., Chee, S., Park, C.S.: New public key cryptosystem using finite non abelian groups. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol.\u00a02139, pp. 470\u2013485. Springer, Heidelberg (2001)"}],"container-title":["Lecture Notes in Computer Science","Applied Cryptography and Network Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-38980-1_30","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,19]],"date-time":"2019-05-19T21:35:35Z","timestamp":1558301735000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-38980-1_30"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642389795","9783642389801"],"references-count":8,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-38980-1_30","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013]]}}}