{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,20]],"date-time":"2026-02-20T19:04:08Z","timestamp":1771614248114,"version":"3.50.1"},"reference-count":10,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2015,8,19]],"date-time":"2015-08-19T00:00:00Z","timestamp":1439942400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Des. Codes Cryptogr."],"published-print":{"date-parts":[[2016,10]]},"DOI":"10.1007\/s10623-015-0130-2","type":"journal-article","created":{"date-parts":[[2015,8,18]],"date-time":"2015-08-18T07:45:25Z","timestamp":1439883925000},"page":"75-82","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["A reduction of Semigroup DLP to classic DLP"],"prefix":"10.1007","volume":"81","author":[{"given":"Matan","family":"Banin","sequence":"first","affiliation":[]},{"given":"Boaz","family":"Tsaban","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,8,19]]},"reference":[{"key":"130_CR1","doi-asserted-by":"crossref","unstructured":"Koblitz N.: Elliptic curve cryptosystems. Math. Comput. 48(177), 203\u2013209 (1987).","DOI":"10.1090\/S0025-5718-1987-0866109-5"},{"key":"130_CR2","doi-asserted-by":"crossref","unstructured":"Miller V.: Use of elliptic curves in cryptography. In: Advances in Cryptology\u2014CRYPTO\u201985 Proceedings. Springer, Berlin (1986).","DOI":"10.1007\/3-540-39799-X_31"},{"key":"130_CR3","doi-asserted-by":"crossref","unstructured":"Odoni R., Varadharajan V., Sanders P.: Public key distribution in matrix rings. Electron. Lett. 20, 386\u2013387 (1984).","DOI":"10.1049\/el:19840267"},{"key":"130_CR4","unstructured":"Menezes A., Wu Y.: The discrete logarithm problem in GL $$(n, q)$$ ( n , q ) . Ars Comb. 47, 23\u201332 (1997)."},{"key":"130_CR5","doi-asserted-by":"crossref","unstructured":"Kahrobaei D., Koupparis C., Shpilrain V.: Public key exchange using matrices over group rings. Groups Complex. Cryptol. 5, 97\u2013115 (2013).","DOI":"10.1515\/gcc-2013-0007"},{"key":"130_CR6","unstructured":"McCurley K.: The discrete logarithm problem. In: Proceedings of Symposia in Appplied Mathematics, vol. 42, pp. 49\u201374. American Mathematical Society, Providence (1989)."},{"key":"130_CR7","doi-asserted-by":"crossref","unstructured":"Myasnikov A., Ushakov A.: Quantum algorithm for discrete logarithm problem for matrices over finite group rings. Groups Complex. Cryptol. 6, 31\u201336 (2014).","DOI":"10.1515\/gcc-2014-0003"},{"key":"130_CR8","doi-asserted-by":"crossref","unstructured":"Childs A., Ivanyos G.: Quantum computation of discrete logarithms in semigroups. J. Math. Cryptol. 8, 405\u2013416 (2014).","DOI":"10.1515\/jmc-2013-0038"},{"key":"130_CR9","unstructured":"Bach E., Shallit J.: Algorithmic number theory. In: Efficient Algorithms. MIT Press Series in the Foundations of Computing, vol. I. Cambridge (1996)."},{"key":"130_CR10","doi-asserted-by":"crossref","unstructured":"Shoup V.: Lower bounds for discrete logarithms and related problems. In: Advances in Cryptology\u2014EUROCRYPT 97. Lecture Notes in Computer Science, vol. 1233, pp. 256\u2013266, Springer, Berlin (1997).","DOI":"10.1007\/3-540-69053-0_18"}],"container-title":["Designs, Codes and Cryptography"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-015-0130-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10623-015-0130-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-015-0130-2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,30]],"date-time":"2019-05-30T19:58:41Z","timestamp":1559246321000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10623-015-0130-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,8,19]]},"references-count":10,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2016,10]]}},"alternative-id":["130"],"URL":"https:\/\/doi.org\/10.1007\/s10623-015-0130-2","relation":{},"ISSN":["0925-1022","1573-7586"],"issn-type":[{"value":"0925-1022","type":"print"},{"value":"1573-7586","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015,8,19]]}}}