{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T07:22:08Z","timestamp":1740122528294,"version":"3.37.3"},"reference-count":23,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2018,6,14]],"date-time":"2018-06-14T00:00:00Z","timestamp":1528934400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100001711","name":"Schweizerischer Nationalfonds zur F\u00f6rderung der Wissenschaftlichen Forschung","doi-asserted-by":"publisher","award":["171248","69510"],"award-info":[{"award-number":["171248","69510"]}],"id":[{"id":"10.13039\/501100001711","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Des. Codes Cryptogr."],"published-print":{"date-parts":[[2019,5]]},"DOI":"10.1007\/s10623-018-0500-7","type":"journal-article","created":{"date-parts":[[2018,6,14]],"date-time":"2018-06-14T08:08:23Z","timestamp":1528963703000},"page":"1069-1086","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Cryptanalysis of the CLR-cryptosystem"],"prefix":"10.1007","volume":"87","author":[{"given":"Giacomo","family":"Micheli","sequence":"first","affiliation":[]},{"given":"Violetta","family":"Weger","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,6,14]]},"reference":[{"issue":"3","key":"500_CR1","doi-asserted-by":"publisher","first-page":"257","DOI":"10.1007\/BF02757282","volume":"18","author":"GM Bergman","year":"1974","unstructured":"Bergman G.M.: Some examples in PI ring theory. Israel J. Math. 18(3), 257\u2013277 (1974).","journal-title":"Israel J. Math."},{"key":"500_CR2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-88702-7","volume-title":"Post-Quantum Cryptography","author":"DJ Bernstein","year":"2009","unstructured":"Bernstein D.J., Buchmann J., Dahmen E.: Post-Quantum Cryptography. Springer, Heidelberg (2009)."},{"key":"500_CR3","doi-asserted-by":"crossref","unstructured":"Chevallier-Mames B., Naccache D., Stern J.: Linear bandwidth naccache-stern encryption. In: International Conference on Security and Cryptography for Networks, pp. 327\u2013339. Springer (2008).","DOI":"10.1007\/978-3-540-85855-3_22"},{"issue":"2","key":"500_CR4","doi-asserted-by":"publisher","first-page":"91","DOI":"10.1007\/s00200-011-0138-4","volume":"22","author":"J-J Climent","year":"2011","unstructured":"Climent J.-J., Navarro P.R., Tortosa L.: On the arithmetic of the endomorphisms ring end \n                    \n                      \n                    \n                    $$(\\mathbb{Z}\\_p \\times \\mathbb{Z}\\_p^2)$$\n                    \n                      \n                        \n                          (\n                          Z\n                          _\n                          p\n                          \u00d7\n                          Z\n                          _\n                          \n                            p\n                            2\n                          \n                          )\n                        \n                      \n                    \n                  . Appl. Algebra Eng. Commun. Comput. 22(2), 91\u2013108 (2011).","journal-title":"Appl. Algebra Eng. Commun. Comput."},{"issue":"5","key":"500_CR5","doi-asserted-by":"publisher","first-page":"347","DOI":"10.1007\/s00200-014-0231-6","volume":"25","author":"J-J Climent","year":"2014","unstructured":"Climent J.-J., Navarro P.R., Tortosa L.: An extension of the noncommutative Bergmans ring with a large number of noninvertible elements. Appl. Algebr. Eng. Commun. Comput. 25(5), 347\u2013361 (2014).","journal-title":"Appl. Algebr. Eng. Commun. Comput."},{"issue":"4","key":"500_CR6","doi-asserted-by":"publisher","first-page":"861","DOI":"10.3934\/amc.2016046","volume":"10","author":"J-J Climent","year":"2016","unstructured":"Climent J.-J., Ramos J.A.L.: Public key protocols over the ring \n                    \n                      \n                    \n                    $$E\\_p^{(m)}$$\n                    \n                      \n                        \n                          E\n                          _\n                          \n                            p\n                            \n                              (\n                              m\n                              )\n                            \n                          \n                        \n                      \n                    \n                  . Adv. Math. Commun. 10(4), 861\u2013870 (2016).","journal-title":"Adv. Math. Commun."},{"key":"500_CR7","doi-asserted-by":"crossref","unstructured":"Ding J., Yang B.-Y.: Multivariate public key cryptography. In: Post-Quantum Cryptography, pp. 193\u2013241. Springer (2009).","DOI":"10.1007\/978-3-540-88702-7_6"},{"issue":"10","key":"500_CR8","doi-asserted-by":"publisher","first-page":"5899","DOI":"10.1109\/TIT.2014.2346079","volume":"60","author":"C Feng","year":"2014","unstructured":"Feng C., N\u00f3brega R.W., Kschischang F.R., Silva D.: Communication over finite-chain-ring matrix channels. IEEE Trans. Inf. Theory 60(10), 5899\u20135917 (2014).","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"1","key":"500_CR9","first-page":"1","volume":"21","author":"B Fine","year":"2011","unstructured":"Fine B., Habeeb M., Kahrobaei D., Rosenberger G.: Aspects of nonabelian group based cryptography: a survey and open problems. JP J. Algebra Number Theory Appl. 21(1), 1\u201340 (2011).","journal-title":"JP J. Algebra Number Theory Appl."},{"key":"500_CR10","doi-asserted-by":"crossref","unstructured":"Jao D., De\u00a0Feo L.: Towards quantum-resistant cryptosystems from supersingular elliptic curve isogenies. In: International Workshop on Post-Quantum Cryptography, pp. 19\u201334. Springer (2011).","DOI":"10.1007\/978-3-642-25405-5_2"},{"issue":"3","key":"500_CR11","doi-asserted-by":"publisher","first-page":"143","DOI":"10.1007\/s00200-012-0170-z","volume":"23","author":"AA Kamal","year":"2012","unstructured":"Kamal A.A., Youssef M.: Cryptanalysis of a key exchange protocol based on the endomorphisms ring end \n                    \n                      \n                    \n                    $$(\\mathbb{Z}\\_p \\times \\mathbb{Z}\\_p^2)$$\n                    \n                      \n                        \n                          (\n                          Z\n                          _\n                          p\n                          \u00d7\n                          Z\n                          _\n                          \n                            p\n                            2\n                          \n                          )\n                        \n                      \n                    \n                  . Appl. Algebr. Eng. Commun. Comput. 23(3), 143\u2013149 (2012).","journal-title":"Appl. Algebr. Eng. Commun. Comput."},{"issue":"8","key":"500_CR12","doi-asserted-by":"publisher","first-page":"1750148","DOI":"10.1142\/S0219498817501481","volume":"16","author":"JA L\u00f3pez-Ramos","year":"2017","unstructured":"L\u00f3pez-Ramos J.A., Rosenthal J., Schipani D., Schnyder R.: Group key management based on semigroup actions. J. Algebra Appl. 16(8), 1750148 (2017).","journal-title":"J. Algebra Appl."},{"issue":"4","key":"500_CR13","doi-asserted-by":"publisher","first-page":"489","DOI":"10.3934\/amc.2007.1.489","volume":"1","author":"G Maze","year":"2007","unstructured":"Maze G., Monico C., Rosenthal J.: Public key cryptography based on semigroup actions. Adv. Math. Commun. 1(4), 489\u2013507 (2007).","journal-title":"Adv. Math. Commun."},{"issue":"1","key":"500_CR14","doi-asserted-by":"publisher","first-page":"163","DOI":"10.1215\/S0012-7094-70-03722-1","volume":"37","author":"BR McDonald","year":"1970","unstructured":"McDonald B.R.: Enumeration of classes of row equivalent matrices over a principal ideal domain modulo \n                    \n                      \n                    \n                    $$p^n$$\n                    \n                      \n                        \n                          p\n                          n\n                        \n                      \n                    \n                  . Duke Math. J. 37(1), 163\u2013169 (1970).","journal-title":"Duke Math. J."},{"key":"500_CR15","first-page":"114","volume":"44","author":"RJ McEliece","year":"1978","unstructured":"McEliece R.J.: A public-key cryptosystem based on algebraic coding theory. Deep Space Network Progress Report 44, 114\u2013116 (1978).","journal-title":"Deep Space Network Progress Report"},{"key":"500_CR16","doi-asserted-by":"crossref","unstructured":"Micciancio D., Regev O.: Lattice-based cryptography. In: Post-Quantum Cryptography, pp. 147\u2013191. Springer (2009).","DOI":"10.1007\/978-3-540-88702-7_5"},{"issue":"2","key":"500_CR17","doi-asserted-by":"publisher","first-page":"247","DOI":"10.3934\/amc.2015.9.247","volume":"9","author":"G Micheli","year":"2015","unstructured":"Micheli G.: Cryptanalysis of a non-commutative key exchange protocol. Adv. Math. Commun. 9(2), 247\u2013253 (2015).","journal-title":"Adv. Math. Commun."},{"key":"500_CR18","doi-asserted-by":"crossref","unstructured":"Micheli G., Rosenthal J., Schnyder R.: An information rate improvement for a polynomial variant of the Naccache-Stern knapsack cryptosystem. In: Physical and Data-Link Security Techniques for Future Communication Systems, pp. 173\u2013180. Springer (2016).","DOI":"10.1007\/978-3-319-23609-4_11"},{"key":"500_CR19","doi-asserted-by":"publisher","first-page":"309","DOI":"10.1016\/j.laa.2015.06.008","volume":"483","author":"G Micheli","year":"2015","unstructured":"Micheli G., Rosenthal J., Vettori P.: Linear spanning sets for matrix spaces. Linear Algebra Appl. 483, 309\u2013322 (2015).","journal-title":"Linear Algebra Appl."},{"issue":"3","key":"500_CR20","doi-asserted-by":"publisher","first-page":"343","DOI":"10.3934\/amc.2014.8.343","volume":"8","author":"G Micheli","year":"2014","unstructured":"Micheli G., Schiavina M.: A general construction for monoid-based knapsack protocols. Adv. Math. Commun. 8(3), 343\u2013358 (2014).","journal-title":"Adv. Math. Commun."},{"key":"500_CR21","volume-title":"Group-Based Cryptography","author":"A Myasnikov","year":"2008","unstructured":"Myasnikov A., Shpilrain V., Ushakov A.: Group-Based Cryptography. Springer, Berlin (2008)."},{"key":"500_CR22","doi-asserted-by":"crossref","unstructured":"Naccache D., Stern J.: A new public-key cryptosystem. In: International Conference on the Theory and Applications of Cryptographic Techniques, pp. 27\u201336. Springer (1997).","DOI":"10.1007\/3-540-69053-0_3"},{"key":"500_CR23","doi-asserted-by":"crossref","unstructured":"N\u00f3brega R.W., Feng C., Silva D., Uch\u00f4a-Filho B.F.: On multiplicative matrix channels over finite chain rings. In: 2013 International Symposium on Network Coding (NetCod), pp. 1\u20136. IEEE (2013).","DOI":"10.1109\/NetCod.2013.6570822"}],"container-title":["Designs, Codes and Cryptography"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-018-0500-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10623-018-0500-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-018-0500-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,13]],"date-time":"2019-06-13T19:16:30Z","timestamp":1560453390000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10623-018-0500-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,6,14]]},"references-count":23,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2019,5]]}},"alternative-id":["500"],"URL":"https:\/\/doi.org\/10.1007\/s10623-018-0500-7","relation":{},"ISSN":["0925-1022","1573-7586"],"issn-type":[{"type":"print","value":"0925-1022"},{"type":"electronic","value":"1573-7586"}],"subject":[],"published":{"date-parts":[[2018,6,14]]},"assertion":[{"value":"30 June 2017","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"20 May 2018","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"25 May 2018","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"14 June 2018","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}