{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,4,13]],"date-time":"2024-04-13T16:49:05Z","timestamp":1713026945284},"reference-count":12,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2011,2,12]],"date-time":"2011-02-12T00:00:00Z","timestamp":1297468800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["AAECC"],"published-print":{"date-parts":[[2011,3]]},"DOI":"10.1007\/s00200-011-0138-4","type":"journal-article","created":{"date-parts":[[2011,2,11]],"date-time":"2011-02-11T20:30:51Z","timestamp":1297456251000},"page":"91-108","source":"Crossref","is-referenced-by-count":11,"title":["On the arithmetic of the endomorphisms ring $${{\\rm End}(\\mathbb{Z}_{p} \\times \\mathbb{Z}_{p^{2}})}$$"],"prefix":"10.1007","volume":"22","author":[{"given":"Joan-Josep","family":"Climent","sequence":"first","affiliation":[]},{"given":"Pedro R.","family":"Navarro","sequence":"additional","affiliation":[]},{"given":"Leandro","family":"Tortosa","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2011,2,12]]},"reference":[{"key":"138_CR1","doi-asserted-by":"crossref","first-page":"1","DOI":"10.4310\/MRL.1999.v6.n3.a3","volume":"6","author":"I. Anshel","year":"1999","unstructured":"Anshel I., Anshel M., Goldfeld D.: An algebraic method for public-key cryptography. Math. Res. Lett. 6, 1\u20135 (1999)","journal-title":"Math. Res. Lett."},{"key":"138_CR2","doi-asserted-by":"crossref","first-page":"257","DOI":"10.1007\/BF02757282","volume":"18","author":"G.M. Bergman","year":"1974","unstructured":"Bergman G.M.: examples in PI ring theory. Israel J. Math. 18, 257\u2013277 (1974)","journal-title":"Israel J. Math."},{"key":"138_CR3","first-page":"424","volume-title":"Advances in Cryptology\u2014CRYPT0 \u201995 volume 963 Lecture Notes in Computer Science","author":"D. Boneh","year":"1995","unstructured":"Boneh D., Lipton R.J.: Quantum cryptanalysis of hidden linear functions. In: Coppersmith, D. (eds) Advances in Cryptology\u2014CRYPT0 \u201995 volume 963 Lecture Notes in Computer Science, pp. 424\u2013437. Springer, Berlin (1995)"},{"key":"138_CR4","doi-asserted-by":"crossref","unstructured":"Ko K.H., Lee S.J., Cheon J.H., Han J.W., Kang J.-s., Park C.: New public-key cryptosystem using braid groups. In: Bellare, M. Advances in Cryptology\u2014CRYPTO 2000 volume 1880 of Lecture Notes in Computer Science, pp. 166\u2013183. Springer, Berlin (2000)","DOI":"10.1007\/3-540-44598-6_10"},{"key":"138_CR5","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4419-8616-0","volume-title":"A First Curs in Noncommutative Rings Number 131 in Graduate Texts in Mathematics","author":"T.-Y. Lam","year":"2001","unstructured":"Lam T.-Y.: A First Curs in Noncommutative Rings Number 131 in Graduate Texts in Mathematics. Springer, New York, NY (2001)"},{"key":"138_CR6","doi-asserted-by":"crossref","first-page":"285","DOI":"10.1007\/s00145-001-0018-3","volume":"15","author":"S.S. Magliveras","year":"2002","unstructured":"Magliveras S.S., Stinson D.R., van Trung T.: New approaches to designing public key cryptosystems using one-way functions and trapdoors in finite groups. J. Cryptol. 15, 285\u2013297 (2002)","journal-title":"J. Cryptol."},{"key":"138_CR7","volume-title":"Group-based cryptography","author":"A.G. Myasnikov","year":"2008","unstructured":"Myasnikov A.G., Shpilrain V., Ushakov A.: Group-based cryptography. Birkh\u00e4user Verlag Basel, Switzerland (2008)"},{"issue":"3","key":"138_CR8","first-page":"76","volume":"28","author":"E. Sakalauskas","year":"2003","unstructured":"Sakalauskas E., Burba T.: Basic semigroup primitive for cryptographic session key exchange protocol(SKEP). Inf. Technol. Control 28(3), 76\u201380 (2003)","journal-title":"Inf. Technol. Control"},{"issue":"5","key":"138_CR9","doi-asserted-by":"crossref","first-page":"1484","DOI":"10.1137\/S0097539795293172","volume":"26","author":"P.W. Shor","year":"1997","unstructured":"Shor P.W.: Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer. SIAM J. Comput. 26(5), 1484\u20131509 (1997)","journal-title":"SIAM J. Comput."},{"issue":"2","key":"138_CR10","first-page":"384","volume":"48","author":"V.M. Sidelnikov","year":"1994","unstructured":"Sidelnikov V.M., Cherepnev M.A., Yashchenko V.V.: Systems of open distribution of keys on the basis of noncommutative semigroups. Russ. Acad. Sci. Doklady Math. 48(2), 384\u2013386 (1994)","journal-title":"Russ. Acad. Sci. Doklady Math."},{"key":"138_CR11","unstructured":"Stickel, E.: A new method for exchanging secret keys. In Proceedings of the Third International Conference on Information Technology and Applications (ICITA\u201905), pp. 426\u2013430. Sidney,Australia (2005)."},{"key":"138_CR12","unstructured":"Tsaban, B.: Combinatorial Group Theory and Cryptography Bulletin (CGC Bulletin). http:\/\/u.cs.biu.ac.il\/~tsaban\/CGC\/cgc.html ."}],"container-title":["Applicable Algebra in Engineering, Communication and Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00200-011-0138-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s00200-011-0138-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00200-011-0138-4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,8]],"date-time":"2019-06-08T14:15:23Z","timestamp":1560003323000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s00200-011-0138-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,2,12]]},"references-count":12,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2011,3]]}},"alternative-id":["138"],"URL":"https:\/\/doi.org\/10.1007\/s00200-011-0138-4","relation":{},"ISSN":["0938-1279","1432-0622"],"issn-type":[{"value":"0938-1279","type":"print"},{"value":"1432-0622","type":"electronic"}],"subject":[],"published":{"date-parts":[[2011,2,12]]}}}