{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T14:56:43Z","timestamp":1742914603470,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":23,"publisher":"Springer Nature Singapore","isbn-type":[{"type":"print","value":"9789819604364"},{"type":"electronic","value":"9789819604371"}],"license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-981-96-0437-1_9","type":"book-chapter","created":{"date-parts":[[2024,11,26]],"date-time":"2024-11-26T16:57:21Z","timestamp":1732640241000},"page":"119-131","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Decomposition of Quaternion-Like Algebras into a Set of Commutative Subalgebras"],"prefix":"10.1007","author":[{"given":"May Thu","family":"Duong","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"A. A.","family":"Moldovyan","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"D. N.","family":"Moldovyan","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Minh Hieu","family":"Nguyen","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Bac Thi","family":"Do","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2024,11,27]]},"reference":[{"key":"9_CR1","unstructured":"Federal Register. Announcing request for nominations for public-key post-quantum cryptographic algorithms. https:\/\/www.gpo.gov\/fdsys\/pkg\/FR-2016-12-20\/pdf\/2016-30615.pdf"},{"key":"9_CR2","doi-asserted-by":"publisher","DOI":"10.6028\/NIST.IR.8240","author":"G Alagic","year":"2019","unstructured":"Alagic, G., et al.: Status Report on the First Round of the NIST Post-quantum Cryptography Standardization Process (2019). https:\/\/doi.org\/10.6028\/NIST.IR.8240","journal-title":"Status Report on the First Round of the NIST Post-quantum Cryptography Standardization Process"},{"key":"9_CR3","doi-asserted-by":"publisher","DOI":"10.6028\/NIST.IR.8309","author":"D Moody","year":"2020","unstructured":"Moody, D., et al.: Status Report on the Second Round of the NIST Post-quantum Cryptography Standardization Process (2020). https:\/\/doi.org\/10.6028\/NIST.IR.8309","journal-title":"Status Report on the Second Round of the NIST Post-quantum Cryptography Standardization Process"},{"key":"9_CR4","unstructured":"Moody, D.: Nist status update on the 3rd round (2020). https:\/\/csrc.nist.gov\/CSRC\/media\/Presentations\/status-update-on-the-3rd-round\/images-media\/session-1-moody-nist-round"},{"issue":"4","key":"9_CR5","doi-asserted-by":"publisher","first-page":"445","DOI":"10.21638\/11701\/spbu10.2020.410","volume":"16","author":"NA Moldovyan","year":"2020","unstructured":"Moldovyan, N.A., Moldovyan, A.A.: Candidate for practical post-quantum signature scheme. Vestn. St. Peterbg. Univ. Appl. Mat. Comput. Sci. Control. Process. 16(4), 445\u2013461 (2020). https:\/\/doi.org\/10.21638\/11701\/spbu10.2020.410","journal-title":"Vestn. St. Peterbg. Univ. Appl. Mat. Comput. Sci. Control. Process."},{"key":"9_CR6","doi-asserted-by":"publisher","first-page":"44","DOI":"10.21638\/11701\/spbu10.2020.410","volume":"1","author":"N Moldovyan","year":"2022","unstructured":"Moldovyan, N., Moldovyan, D., Moldovyan, A.: A novel method for developing post-quantum digital signature algorithms on non-commutative associative algebras. Math. Comput. Scinf. Control. Syst. 1, 44\u201353 (2022). https:\/\/doi.org\/10.21638\/11701\/spbu10.2020.410","journal-title":"Math. Comput. Scinf. Control. Syst."},{"key":"9_CR7","doi-asserted-by":"publisher","first-page":"209","DOI":"10.21638\/11701\/spbu10.2022.202","volume":"18","author":"N Moldovyan","year":"2022","unstructured":"Moldovyan, N., Moldovyan, A.: Structure of a 4-dimensional algebra and generating parameters of the hidden discrete logarithm problem. Vestn. St. Peterbg. Univ. Appl. Mat. Comput. Sci. Control. Processes. 18, 209\u2013217 (2022). https:\/\/doi.org\/10.21638\/11701\/spbu10.2022.202","journal-title":"Vestn. St. Peterbg. Univ. Appl. Mat. Comput. Sci. Control. Processes."},{"issue":"13","key":"9_CR8","doi-asserted-by":"publisher","first-page":"1970","DOI":"10.3390\/math12131970","volume":"12","author":"A Moldovyan","year":"2024","unstructured":"Moldovyan, A., Moldovyan, D., Moldovyan, N., Kurysheva, A.: A method for specifying complete signature randomization and an algebraic algorithm based on it. Mathematics 12(13), 1970 (2024). https:\/\/doi.org\/10.3390\/math12131970","journal-title":"Mathematics"},{"issue":"2(86)","key":"9_CR9","first-page":"206","volume":"29","author":"N Moldovyan","year":"2021","unstructured":"Moldovyan, N., Moldovyan, A.: A practical digital signature scheme based on the hidden logarithm problem. Comput. Sci. J. Mold 29(2(86)), 206\u2013226 (2021)","journal-title":"Comput. Sci. J. Mold"},{"key":"9_CR10","doi-asserted-by":"publisher","first-page":"254","DOI":"10.21638\/11701\/spbu10.2021.303","volume":"17","author":"N Moldovyan","year":"2021","unstructured":"Moldovyan, N., Moldovyan, A.: Digital signature scheme on the 2\u00d72 matrix algebra. Vestn. St. Peterbg. Univ. Appl. Mat. Comput. Sci. Control Process. 17, 254\u2013261 (2021). https:\/\/doi.org\/10.21638\/11701\/spbu10.2021.303","journal-title":"Vestn. St. Peterbg. Univ. Appl. Mat. Comput. Sci. Control Process."},{"key":"9_CR11","doi-asserted-by":"publisher","first-page":"133","DOI":"10.56415\/qrs.v30.11","volume":"30","author":"D Moldovyan","year":"2022","unstructured":"Moldovyan, D., Moldovyan, A., Moldovyan, N.: Structure of a finite non-commutative algebra set by a sparse multiplication table. Quasi. Relat. Syst 30, 133\u2013140 (2022)","journal-title":"Quasi. Relat. Syst"},{"key":"9_CR12","first-page":"263","volume":"26","author":"N Moldovyan","year":"2018","unstructured":"Moldovyan, N.: Unified method for defining finite associative algebras of arbitrary even dimensions. Quasi. Relat. Syst. 26, 263\u2013270 (2018)","journal-title":"Quasi. Relat. Syst."},{"issue":"93","key":"9_CR13","first-page":"62","volume":"2","author":"N Moldovyan","year":"2020","unstructured":"Moldovyan, N.: Signature schemes on algebras, satisfying enhanced criterion of post-quantum security. Bul. Acad. Stiinte Repub. Mold. Mat. 2(93), 62\u201367 (2020)","journal-title":"Bul. Acad. Stiinte Repub. Mold. Mat."},{"key":"9_CR14","doi-asserted-by":"publisher","first-page":"43","DOI":"10.31799\/1684-8853-2021-2-43-51","volume":"2","author":"D Moldovyan","year":"2021","unstructured":"Moldovyan, D., Moldovyan, N.: A post-quantum digital signature scheme on groups with four-dimensional cyclicity. Math. Comput. Sci. Inf. Control. Syst. 2, 43\u201351 (2021). https:\/\/doi.org\/10.31799\/1684-8853-2021-2-43-51","journal-title":"Math. Comput. Sci. Inf. Control. Syst."},{"key":"9_CR15","doi-asserted-by":"publisher","first-page":"7","DOI":"10.21681\/2311-3456-2022-2-7-17","volume":"2","author":"D Moldovyan","year":"2022","unstructured":"Moldovyan, D., Moldovyan, A.: Algebraic signature algorithms based on difficulty of solving systems of equations. Voprosykiberbezopasnosti [Cibersecurityquesttions]. 2, 7\u201317 (2022). https:\/\/doi.org\/10.21681\/2311-3456-2022-2-7-17. (in Russia)","journal-title":"Voprosykiberbezopasnosti [Cibersecurityquesttions]."},{"key":"9_CR16","doi-asserted-by":"publisher","first-page":"287","DOI":"10.56415\/qrs.v30.24","volume":"30","author":"N Moldovyan","year":"2022","unstructured":"Moldovyan, N.: Algebraic signature algorithms with a hidden group, based on hardness of solving systems of quadratic equations. Quasi. Relat. Syst. 30, 287 (2022)","journal-title":"Quasi. Relat. Syst."},{"key":"9_CR17","first-page":"83","volume":"18","author":"N Moldovyan","year":"2010","unstructured":"Moldovyan, N.: Fast signatures based on non-cyclic finite groups. Quasi. Relat. Syst. 18, 83\u201394 (2010)","journal-title":"Quasi. Relat. Syst."},{"key":"9_CR18","first-page":"165","volume":"18","author":"D Moldovyan","year":"2010","unstructured":"Moldovyan, D.: Non-commutative finite groups as primitive of public-key cryptoschemes. Quasi. Relat. Syst. 18, 165\u2013176 (2010)","journal-title":"Quasi. Relat. Syst."},{"key":"9_CR19","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1016\/j.tcs.2022.03.040","volume":"921","author":"MH Nguyen","year":"2022","unstructured":"Nguyen, M.H., Hoang, C.N., Moldovyan, A., Moldovyan, N., Vu, H.Q., Le Tran, D.K.: A novel version of the hidden logarithm problem for post-quantum signature algorithms. Theor. Comput. Sci. 921, 36\u201349 (2022). https:\/\/doi.org\/10.1016\/j.tcs.2022.03.040","journal-title":"Theor. Comput. Sci."},{"key":"9_CR20","first-page":"3","volume":"2","author":"D Moldovyan","year":"2020","unstructured":"Moldovyan, D.: New form of the hidden logarithm problem and its algebraic support. Bul. Acad. Stiinte Repub. Mold. Mat. 2, 3\u201310 (2020)","journal-title":"Bul. Acad. Stiinte Repub. Mold. Mat."},{"key":"9_CR21","doi-asserted-by":"publisher","unstructured":"May, D.T., Bac, D.T., Minh, N.H., Kurysheva, A.A., Kostina, A.A., Moldovyan, D.: Signature algorithms on non-commutative algebras over finite fields of characteristic two. In: Future Data and Security Engineering. Big Data, Security and Privacy, Smart City and Industry 4.0 Applications, Vol. 1688 of Communications in Computer and Information Science. Springer (2022). https:\/\/doi.org\/10.1007\/978-981-19-8069-5_18","DOI":"10.1007\/978-981-19-8069-5_18"},{"key":"9_CR22","doi-asserted-by":"publisher","first-page":"103740","DOI":"10.1016\/j.csi.2023.103740","volume":"86","author":"MT Duong","year":"2023","unstructured":"Duong, M.T., Moldovyan, D.N., Do, D.V., Nguyen, M.H.: Post-quantum signature algorithms on noncommutative algebras, using difficulty of solving systems of quadratic equations. Comput. Stand. Interfaces 86, 103740 (2023). https:\/\/doi.org\/10.1016\/j.csi.2023.103740","journal-title":"Comput. Stand. Interfaces"},{"key":"9_CR23","doi-asserted-by":"publisher","unstructured":"Moldovyan, A., Moldovyan, D.N., Duong, M.T., Do, B.T., Nguyen, M.H.: Post-quantum signature scheme on commutative algebras. In: 2023 15th International Conference on Knowledge and Systems Engineering (KSE), Hanoi, Vietnam, pp. 1\u20135 (2023). https:\/\/doi.org\/10.1109\/KSE59128.2023.10299530","DOI":"10.1109\/KSE59128.2023.10299530"}],"container-title":["Communications in Computer and Information Science","Future Data and Security Engineering. Big Data, Security and Privacy, Smart City and Industry 4.0 Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-96-0437-1_9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,26]],"date-time":"2024-11-26T17:03:06Z","timestamp":1732640586000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-96-0437-1_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"ISBN":["9789819604364","9789819604371"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-981-96-0437-1_9","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"27 November 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"All authors declare no conflicts of interest in this paper.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of Interest"}},{"value":"FDSE","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Future Data and Security Engineering","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Binh Duong","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Vietnam","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"27 November 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29 November 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"11","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"fdse2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/thefdse.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}