{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,3,7]],"date-time":"2024-03-07T15:47:56Z","timestamp":1709826476082},"reference-count":19,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2016,1,26]],"date-time":"2016-01-26T00:00:00Z","timestamp":1453766400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Sci. China Inf. Sci."],"published-print":{"date-parts":[[2016,3]]},"DOI":"10.1007\/s11432-015-5447-y","type":"journal-article","created":{"date-parts":[[2016,1,27]],"date-time":"2016-01-27T11:17:29Z","timestamp":1453893449000},"update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Cryptanalysis of an MOR cryptosystem based on a finite associative algebra","\u57fa\u4e8e\u6709\u9650\u7ed3\u5408\u4ee3\u6570\u7684 MOR \u516c\u94a5\u5bc6\u7801\u5b89\u5168\u6027\u5206\u6790"],"prefix":"10.1007","volume":"59","author":[{"given":"Wanqing","family":"Wu","sequence":"first","affiliation":[]},{"given":"Huanguo","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Houzhen","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Shaowu","family":"Mao","sequence":"additional","affiliation":[]},{"given":"Shuomei","family":"Wu","sequence":"additional","affiliation":[]},{"given":"Haiqing","family":"Han","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,1,26]]},"reference":[{"key":"5447_CR1","doi-asserted-by":"crossref","first-page":"553","DOI":"10.1098\/rspa.1992.0167","volume":"439","author":"D Deutsch","year":"1992","unstructured":"Deutsch D, Jozsa R. Rapid solution of problems by quantum computation. Proc Roy Soc A-Math Phys Eng, 1992, 439: 553\u2013558","journal-title":"Proc Roy Soc A-Math Phys Eng"},{"key":"5447_CR2","doi-asserted-by":"crossref","first-page":"1474","DOI":"10.1137\/S0097539796298637","volume":"26","author":"D R Simon","year":"1997","unstructured":"Simon D R. On the power of quantum computation. SIAM J Comput, 1997, 26: 1474\u20131483","journal-title":"SIAM J Comput"},{"key":"5447_CR3","doi-asserted-by":"crossref","first-page":"303","DOI":"10.1137\/S0036144598347011","volume":"41","author":"P W Shor","year":"1999","unstructured":"Shor P W. Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer. SIAM Rev, 1999, 41: 303\u2013332","journal-title":"SIAM Rev"},{"key":"5447_CR4","doi-asserted-by":"crossref","first-page":"325","DOI":"10.1103\/PhysRevLett.79.325","volume":"79","author":"L K Grover","year":"1997","unstructured":"Grover L K. Quantum mechanics helps in searching for a needle in a haystack. Phys Rev Lett, 1997, 79: 325\u2013328","journal-title":"Phys Rev Lett"},{"key":"5447_CR5","doi-asserted-by":"crossref","first-page":"174","DOI":"10.1007\/3-540-49208-9_15","volume-title":"Quantum Comput Quantum Commun","author":"M Mosca","year":"1999","unstructured":"Mosca M, Ekert A. The hidden subgroup problem and eigenvalue estimation on a quantum computer. Quantum Comput Quantum Commun, 1999: 174\u2013188"},{"key":"5447_CR6","first-page":"166","volume-title":"Proceedings of 20th Annual International Cryptology Conference","author":"K H Ko","year":"2000","unstructured":"Ko K H, Lee S J, Cheon J H, et al. New public-key cryptosystem using braid groups. In: Proceedings of 20th Annual International Cryptology Conference, Santa Barbara, 2000. 166\u2013183"},{"key":"5447_CR7","first-page":"470","volume-title":"Proceedings of 21st Annual International Cryptology Conference","author":"S H Paeng","year":"2001","unstructured":"Paeng S H, Ha K C, Kim J H, et al. New public key cryptosystem using finite non Abelian groups. In: Proceedings of 21st Annual International Cryptology Conference, Santa Barbara, 2001. 470\u2013485"},{"key":"5447_CR8","doi-asserted-by":"crossref","first-page":"62","DOI":"10.1007\/s00145-008-9033-y","volume":"22","author":"W Lempken","year":"2009","unstructured":"Lempken W, van Tran T, Magliveras S S, et al. A public key cryptosystem based on non-abelian finite groups. J Cryptol, 2009, 22: 62\u201374","journal-title":"J Cryptol"},{"key":"5447_CR9","doi-asserted-by":"crossref","first-page":"3583","DOI":"10.1080\/00927872.2011.602998","volume":"40","author":"A Mahalanobis","year":"2012","unstructured":"Mahalanobis A. A simple generalization of the ElGamal cryptosystem to non-abelian groups II. Commun Algebra, 2012, 40: 3583\u20133596","journal-title":"Commun Algebra"},{"key":"5447_CR10","doi-asserted-by":"crossref","first-page":"293","DOI":"10.1016\/j.ipl.2003.09.001","volume":"88","author":"S H Paeng","year":"2003","unstructured":"Paeng S H. On the security of cryptosystem using automorphism groups. Inf Process Lett, 2003, 88: 293\u2013298","journal-title":"Inf Process Lett"},{"key":"5447_CR11","first-page":"175","volume-title":"Proceedings of 6th International Workshop on Practice and Theory in Public Key Cryptography","author":"C Tobias","year":"2002","unstructured":"Tobias C. Security analysis of the MOR cryptosystem. In: Proceedings of 6th International Workshop on Practice and Theory in Public Key Cryptography, Miami, 2002. 175\u2013186"},{"key":"5447_CR12","first-page":"387","volume-title":"Proceedings of 10th International Conference on the Theory and Application of Cryptology and Information Security","author":"I S Lee","year":"2004","unstructured":"Lee I S, Kim W H, Kwon D, et al. On the security of MOR public key cryptosystem. In: Proceedings of 10th International Conference on the Theory and Application of Cryptology and Information Security, Jeju Island, 2004. 387\u2013400"},{"key":"5447_CR13","doi-asserted-by":"crossref","first-page":"78","DOI":"10.1007\/978-3-540-88353-1_7","volume-title":"Proceedings of 2nd Western European Workshop on Research in Cryptology","author":"A Korsten","year":"2008","unstructured":"Korsten A. Cryptanalysis of MOR and discrete logarithms in inner automorphism groups. In: Proceedings of 2nd Western European Workshop on Research in Cryptology, Bochum, 2008. 78\u201389"},{"key":"5447_CR14","doi-asserted-by":"crossref","first-page":"3583","DOI":"10.1080\/00927872.2011.602998","volume":"40","author":"A Mahalanobis","year":"2006","unstructured":"Mahalanobis A. A simple generalization of ElGamal cryptosystem to non-abelian groups. Commun Algebra, 2006, 40: 3583\u20133596","journal-title":"Commun Algebra"},{"key":"5447_CR15","doi-asserted-by":"crossref","first-page":"55","DOI":"10.1145\/1536414.1536425","volume-title":"Proceedings of 41st Annual ACM Symposium on Theory of Computing","author":"L Babai","year":"2009","unstructured":"Babai L, Beals R, Seress A. Polynomial-time theory of matrix groups. In: Proceedings of 41st Annual ACM Symposium on Theory of Computing. New York: ACM, 2009. 55\u201364"},{"key":"5447_CR16","first-page":"1","volume-title":"Proceedings of 35th Annual ACM Symposium on Theory of Computing","author":"K Friedl","year":"2003","unstructured":"Friedl K, Ivanyos G, Magniez F, et al. Hidden translation and orbit coset in quantum computing. In: Proceedings of 35th Annual ACM Symposium on Theory of Computing. New York: ACM, 2003. 1\u20139"},{"key":"5447_CR17","doi-asserted-by":"crossref","first-page":"916","DOI":"10.1137\/S009753970139450X","volume":"32","author":"S Hallgren","year":"2003","unstructured":"Hallgren S, Russell A, Ta-Shma A. The hidden subgroup problem and quantum computation using group representations. SIAM J Comput, 2003, 32: 916\u2013934","journal-title":"SIAM J Comput"},{"key":"5447_CR18","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1103\/RevModPhys.82.1","volume":"82","author":"A M Childs","year":"2010","unstructured":"Childs A M, van Dam W. Quantum algorithms for algebraic problems. Rev Mod Phys, 2010, 82: 1\u201352","journal-title":"Rev Mod Phys"},{"key":"5447_CR19","first-page":"1","volume":"17","author":"H Z Wei","year":"1993","unstructured":"Wei H Z, Wang Y X. Enumeration theorems of solutions of some matrix equations over finite field (in Chinese). J Hebei Normal Univ, 1993, 17: 1\u201313","journal-title":"J Hebei Normal Univ"}],"container-title":["Science China Information Sciences"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11432-015-5447-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11432-015-5447-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11432-015-5447-y","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,8,16]],"date-time":"2023-08-16T16:44:50Z","timestamp":1692204290000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11432-015-5447-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,1,26]]},"references-count":19,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2016,3]]}},"alternative-id":["5447"],"URL":"https:\/\/doi.org\/10.1007\/s11432-015-5447-y","relation":{},"ISSN":["1674-733X","1869-1919"],"issn-type":[{"value":"1674-733X","type":"print"},{"value":"1869-1919","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,1,26]]},"article-number":"32111"}}