{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,6]],"date-time":"2025-12-06T04:54:35Z","timestamp":1764996875474},"reference-count":17,"publisher":"Springer Science and Business Media LLC","issue":"2-3","license":[{"start":{"date-parts":[[2010,2,24]],"date-time":"2010-02-24T00:00:00Z","timestamp":1266969600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Des. Codes Cryptogr."],"published-print":{"date-parts":[[2010,5]]},"DOI":"10.1007\/s10623-010-9373-0","type":"journal-article","created":{"date-parts":[[2010,2,23]],"date-time":"2010-02-23T10:32:31Z","timestamp":1266921151000},"page":"189-200","source":"Crossref","is-referenced-by-count":7,"title":["A note on the security of MST 3"],"prefix":"10.1007","volume":"55","author":[{"given":"Mar\u00eda Isabel Gonz\u00e1lez","family":"Vasco","sequence":"first","affiliation":[]},{"given":"Angel L. P\u00e9rez","family":"del Pozo","sequence":"additional","affiliation":[]},{"given":"Pedro Taborda","family":"Duarte","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2010,2,24]]},"reference":[{"key":"9373_CR1","doi-asserted-by":"crossref","unstructured":"Bellare M., Desai A., Pointcheval D., Rogaway P.: Relations among notions of security for public-key encryption schemes. In: CRYPTO\u201998: Proceedings of the 18th Annual International Cryptology Conference on Advances in Cryptology, pp. 26\u201345. Springer-Verlag, London, UK (1998).","DOI":"10.1007\/BFb0055718"},{"key":"9373_CR2","doi-asserted-by":"crossref","unstructured":"Blackburn S.R., Cid C., Mullan C.: Cryptanalysis of the MST 3 Public Key Cryptosystem. Cryptology ePrint Archive: Report 2009\/248. At the time of writing available electronically at http:\/\/www.eprint.iacr.org\/2009\/248 (2009).","DOI":"10.1515\/JMC.2009.020"},{"key":"9373_CR3","doi-asserted-by":"crossref","first-page":"509","DOI":"10.1007\/s10623-004-4040-y","volume":"37","author":"J.M. Bohli","year":"2005","unstructured":"Bohli J.M., Gonz\u00e1lez Vasco M.I., Mart\u00ednez C., Steinwandt R.: Weak keys in MST 1. Des. Codes Cryptogr. 37, 509\u2013524 (2005)","journal-title":"Des. Codes Cryptogr."},{"key":"9373_CR4","doi-asserted-by":"crossref","first-page":"469","DOI":"10.1109\/TIT.1985.1057074","volume":"31","author":"T. ElGamal","year":"1985","unstructured":"ElGamal T.: A public key cryptosystem and a signature scheme based on discrete logarithm. IEEE Trans. Info. Theory 31, 469\u2013472 (1985)","journal-title":"IEEE Trans. Info. Theory"},{"key":"9373_CR5","unstructured":"The GAP Group: GAP\u2014Groups, Algorithms, and Programming, Version 4.4.10 http:\/\/www.gap-system.org (2007)."},{"key":"9373_CR6","unstructured":"Gonz\u00e1lez Vasco M.I., Steinwandt R.: Obstacles in two public-key cryptosystems based on group factorizations. In: Nemoga, K., Gro\u0161ek, O. (eds.) Cryptology, pp. 23\u201337. Tatra Mountains Mathematical Publications, Slovakia (2002)."},{"key":"9373_CR7","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-642-67994-0","volume-title":"Finite Groups II","author":"B. Huppert","year":"1982","unstructured":"Huppert B., Blackburn N.: Finite Groups II. Springer, Berlin (1982)"},{"key":"9373_CR8","doi-asserted-by":"crossref","first-page":"62","DOI":"10.1007\/s00145-008-9033-y","volume":"22","author":"W. Lempken","year":"2009","unstructured":"Lempken W., Magliveras S.S., van Trung T., Wei W.: A public key cryptosystem based on non-abelian finite groups. J. Cryptol. 22, 62\u201374 (2009)","journal-title":"J. Cryptol."},{"key":"9373_CR9","unstructured":"Magliveras S.S.: A cryptosystem from logarithmic signatures of finite groups. In: Proceedings of the 29th Midwest Symposium on Circuits and Systems, pp. 972\u2013975. Elsevier Publishing Company, Amsterdam (1986)."},{"key":"9373_CR10","first-page":"51","volume":"72","author":"S.S. Magliveras","year":"1989","unstructured":"Magliveras S.S., Memon N.D.: Linear complexity profile analysis of the PGM cryptosystem. Congresus Numerantium, Utilitas Mathematica 72, 51\u201360 (1989)","journal-title":"Congresus Numerantium, Utilitas Mathematica"},{"key":"9373_CR11","unstructured":"Magliveras S.S., Memon N.D.: Properties of cryptosystem PGM. In: Advances in Cryptology. Proceedings of CRYPTO 1989, Lecture Notes on Computer Science, pp. 447\u2013460. Springer-Verlag, Berlin (1989)."},{"key":"9373_CR12","first-page":"61","volume":"79","author":"S.S. Magliveras","year":"1990","unstructured":"Magliveras S.S., Memon N.D.: Complexity tests for cryptosystem PGM. Congressus Numerantium, Utilitas Mathematica 79, 61\u201368 (1990)","journal-title":"Congressus Numerantium, Utilitas Mathematica"},{"key":"9373_CR13","doi-asserted-by":"crossref","first-page":"167","DOI":"10.1007\/BF02451113","volume":"5","author":"S.S. Magliveras","year":"1992","unstructured":"Magliveras S.S., Memon N.D.: Algebraic properties of cryptosystem PGM. J. Cryptol. 5, 167\u2013183 (1992)","journal-title":"J. Cryptol."},{"key":"9373_CR14","doi-asserted-by":"crossref","first-page":"285","DOI":"10.1007\/s00145-001-0018-3","volume":"15","author":"S.S. Magliveras","year":"2002","unstructured":"Magliveras S.S., Stinson D.R., van Trung T.: New approaches to designing public key cryptosystems using one-way functions and trap-doors in finite groups. J. Cryptol. 15, 285\u2013297 (2002)","journal-title":"J. Cryptol."},{"key":"9373_CR15","first-page":"1","volume":"41","author":"S.S. Magliveras","year":"2008","unstructured":"Magliveras S.S., Svaba P., van Trung T., Zajac P.: On the security of a realization of cryptosystem MST 3. Tatra Mt. Math. Publ. 41, 1\u201313 (2008)","journal-title":"Tatra Mt. Math. Publ."},{"key":"9373_CR16","doi-asserted-by":"crossref","DOI":"10.1017\/CBO9780511814075","volume-title":"Randomized Algorithms","author":"R. Motwani","year":"1995","unstructured":"Motwani R., Raghavan P.: Randomized Algorithms. Cambridge University Press, Cambridge (1995)"},{"key":"9373_CR17","first-page":"105","volume":"37","author":"P. Svaba","year":"2007","unstructured":"Svaba P., Van Trung T.: On generation of random covers for finite groups. Tatra Mt. Math. Publ. 37, 105\u2013112 (2007)","journal-title":"Tatra Mt. Math. Publ."}],"container-title":["Designs, Codes and Cryptography"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-010-9373-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10623-010-9373-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-010-9373-0","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,30]],"date-time":"2019-05-30T19:58:27Z","timestamp":1559246307000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10623-010-9373-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,2,24]]},"references-count":17,"journal-issue":{"issue":"2-3","published-print":{"date-parts":[[2010,5]]}},"alternative-id":["9373"],"URL":"https:\/\/doi.org\/10.1007\/s10623-010-9373-0","relation":{},"ISSN":["0925-1022","1573-7586"],"issn-type":[{"value":"0925-1022","type":"print"},{"value":"1573-7586","type":"electronic"}],"subject":[],"published":{"date-parts":[[2010,2,24]]}}}