{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T11:32:18Z","timestamp":1725881538115},"publisher-location":"Singapore","reference-count":27,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811031557"},{"type":"electronic","value":"9789811031564"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-981-10-3156-4_47","type":"book-chapter","created":{"date-parts":[[2017,3,2]],"date-time":"2017-03-02T02:13:45Z","timestamp":1488420825000},"page":"457-465","source":"Crossref","is-referenced-by-count":0,"title":["A Secured Digital Signature Using Conjugacy and DLP on Non-commutative Group over Finite Field"],"prefix":"10.1007","author":[{"given":"L.","family":"Narendra Mohan","sequence":"first","affiliation":[]},{"given":"G.S.G.N.","family":"Anjaneyulu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,3,3]]},"reference":[{"key":"47_CR1","doi-asserted-by":"crossref","unstructured":"W. Diffie, M. Hellman, New directions in cryptography. IEEE Trans. Inf. Theory IT-2.2(6), 644\u2013654 (1976)","DOI":"10.1109\/TIT.1976.1055638"},{"key":"47_CR2","doi-asserted-by":"crossref","first-page":"166","DOI":"10.1007\/3-540-44598-6_10","volume":"1880","author":"J Kang","year":"2000","unstructured":"J. Kang, J.W. Han, J.H. Cheon, S.J. Lee, K.H. Ko, S.J. Lee, C. Park, New public key crypto system using braid groups. Lect. Notes Comput. Sci. 1880, 166\u2013183 (2000)","journal-title":"Lect. Notes Comput. Sci."},{"key":"47_CR3","unstructured":"D. Moon, K.C. Ha, S. Cho, Y.-O. Kim, Key exchange protocol using matrix algebras and its analysis. J. Korean Math. Soc."},{"issue":"1","key":"47_CR4","doi-asserted-by":"crossref","first-page":"115","DOI":"10.15388\/Informatica.2007.167","volume":"18","author":"A Raulynaitis","year":"2007","unstructured":"A. Raulynaitis, E. Sakalauskas, P. Tvarijonas, key agreement protocol using conjugacy and discrete logarithm problems in group representation level. Informatica 18(1), 115\u2013124 (2007)","journal-title":"Informatica"},{"key":"47_CR5","unstructured":"Los Alamitos, Network and System Security. IEEE Computer Society, CA, USA (2009), pp. 443\u2013446"},{"key":"47_CR6","unstructured":"Text Book: Cryptography and network security by MR. AtulKahate"},{"key":"47_CR7","unstructured":"http:\/\/www.iacr.org (International Association for Cryptographic Research\u2014website)"},{"key":"47_CR8","doi-asserted-by":"crossref","unstructured":"D. Poulakis, A Variant of Digital Signature Algorithm Designs, Codes and Cryptography, vol. 51(1) (2009), pp. 99\u2013104","DOI":"10.1007\/s10623-008-9246-y"},{"issue":"4","key":"47_CR9","doi-asserted-by":"crossref","first-page":"222","DOI":"10.3844\/jmssp.2008.222.225","volume":"4","author":"NMF Tahat","year":"2008","unstructured":"N.M.F. Tahat, E.S. Ismail, R.R. Ahmad, A new digital signature scheme based on factoring and Discrete logarithms. J. Math. Stat. 4(4), 222\u2013225 (2008)","journal-title":"J. Math. Stat."},{"issue":"1","key":"47_CR10","first-page":"9","volume":"81","author":"CY Yang","year":"2004","unstructured":"C.Y. Yang, M.S. Hwang, S.F. Tzeng, A new digital signature scheme based on factoring and discrete logarithm. IJCM 81(1), 9\u201314 (2004)","journal-title":"IJCM"},{"issue":"10","key":"47_CR11","first-page":"1215","volume":"82","author":"Z Shao","year":"2005","unstructured":"Z. Shao, Security of a new digital signature scheme based on factoring and discrete logarithms. IJCM 82(10), 1215\u20131219 (2005)","journal-title":"IJCM"},{"key":"47_CR12","unstructured":"Z. Shao, Signature schemes based on factoring and discrete logarithms, in Computers and Digital Techniques, IEEE Proceedings-, vol. 145. IET (2002), pp. 33\u201336"},{"key":"47_CR13","unstructured":"G.S.G.N. Anjaneyulu, P.V. Reddy, U.M. Reddy, Secured digital signature scheme using polynomials over non-commutative division semi ring. IJCSNS 8(8), (2008)"},{"key":"47_CR14","unstructured":"G.S.G.N. Anjaneyulu, U.M. Reddy Secured directed digital signature over non-commutative division semirings and allocation of experimental registration number. IJCSI 9(5), 3 (2012)"},{"key":"47_CR15","unstructured":"A.J. Menezes, Y.-H. Wu, The discrete logarithm problem in G Ln (Fq); ARS Combinatorica 47, 23\u201332 (1997)"},{"key":"47_CR16","unstructured":"S. Wei, A new digital signature scheme based on factoring and discrete logarithms, in Progress on Cryptography (2004), pp. 107\u2013111"},{"key":"47_CR17","unstructured":"S. Alam, A. Jamil, A. Saldhi, M. Ahamad, Digital image authentication and encryption using digital signature, in ICACEA (2015), pp. 332\u2013336"},{"key":"47_CR18","doi-asserted-by":"crossref","first-page":"183","DOI":"10.1007\/978-3-642-14706-7_14","volume":"6258","author":"NA Moldovyan","year":"2010","unstructured":"N.A. Moldovyan, D.N. Moldovyan, A new hard problem over non commutative finite groups for cryptographic protocols. Lect. Notes Comput. Sci. 6258, 183\u2013194 (2010)","journal-title":"Lect. Notes Comput. Sci."},{"key":"47_CR19","doi-asserted-by":"crossref","unstructured":"D. Boneh, A. Joux, P.Q. Nguyen, Why textbook Elgamal and RSA encryption are insecure, in Lecture Notes in Computer Science, vol. 1976 (2000), pp. 30\u201344","DOI":"10.1007\/3-540-44448-3_3"},{"key":"47_CR20","doi-asserted-by":"crossref","first-page":"56","DOI":"10.1016\/j.aim.2004.03.018","volume":"193","author":"V Retakh","year":"2005","unstructured":"V. Retakh, S. Gelfand, I. Gelfand, R. Wilson, Quasideterminants. Adv. Math. 193, 56\u2013141 (2005)","journal-title":"Adv. Math."},{"key":"47_CR21","doi-asserted-by":"crossref","unstructured":"M. Eftekhari, A Diffie-Hellman key exchange protocol using matrices over non abelian ring. http:\/\/arXiv1209.6144v1[cs.CR] (2012)","DOI":"10.1515\/gcc-2012-0001"},{"issue":"2","key":"47_CR22","doi-asserted-by":"crossref","first-page":"218","DOI":"10.1006\/aima.1995.1032","volume":"112","author":"B Leclerc","year":"1995","unstructured":"B. Leclerc, V. Retakh, J.-Y. Thibon, A. Lascoux, D. Krob, I. Gelfand, Non commutative symmetric functions. Adv. Math. 112(2), 218\u2013348 (1995)","journal-title":"Adv. Math."},{"key":"47_CR23","doi-asserted-by":"crossref","unstructured":"V. Shpilrain, D. Grigoriev, Authentication from matrix conjugation, groups, complexity, cryptology, vol. 1, pp. 199\u2013205 (2009)","DOI":"10.1515\/GCC.2009.199"},{"key":"47_CR24","unstructured":"B. Lynn, D. Boneh, H. Shacham, Short signatures from the Weil pairing, in Proceedings of Asia Crypt 2001, LNCS, vol. 2248 (Springer, 2001), pp. 533\u2013551"},{"key":"47_CR25","doi-asserted-by":"crossref","unstructured":"D. Pointcheval, T. Okamoto, The gap-problems: a new class of problems for the security of cryptographic schemes, in Proceedings of PKC 2001, LNCS, vol. 1992 (Springer, 2001), pp. 104\u2013118","DOI":"10.1007\/3-540-44586-2_8"},{"key":"47_CR26","unstructured":"A. Lincoln, Electronic signature laws and the need for uniformity in the global market, 8 J. Small & Emerging Bus. L. 67 (2004)"},{"key":"47_CR27","unstructured":"T.J. Smedinghoff, R.H. Bro, Moving with change: electronic signature legislation as a vehicle for advancing e-commerce. 17 J. Marshall J. Computer & Info. L. 723, 199"}],"container-title":["Advances in Intelligent Systems and Computing","Proceedings of the 5th International Conference on Frontiers in Intelligent Computing: Theory and Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-10-3156-4_47","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,10,3]],"date-time":"2020-10-03T04:16:54Z","timestamp":1601698614000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-981-10-3156-4_47"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9789811031557","9789811031564"],"references-count":27,"URL":"https:\/\/doi.org\/10.1007\/978-981-10-3156-4_47","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2017]]}}}