{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,15]],"date-time":"2026-04-15T20:17:08Z","timestamp":1776284228892,"version":"3.50.1"},"reference-count":36,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,7,3]],"date-time":"2025-07-03T00:00:00Z","timestamp":1751500800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,7,3]],"date-time":"2025-07-03T00:00:00Z","timestamp":1751500800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,7,3]]},"DOI":"10.1109\/icecet63943.2025.11472340","type":"proceedings-article","created":{"date-parts":[[2026,4,9]],"date-time":"2026-04-09T19:42:35Z","timestamp":1775763755000},"page":"1-6","source":"Crossref","is-referenced-by-count":0,"title":["ElGamal Digital Signature Scheme in a Matrix Finite Field"],"prefix":"10.1109","author":[{"given":"Alimzhan","family":"Baikenov","sequence":"first","affiliation":[{"name":"Almaty University of Power Engineering and Telecommunications Named After Gumarbek Daukeev,Dept. of Telecommunications Engineering,Almaty,Kazakhstan"}]},{"given":"Emil","family":"Faure","sequence":"additional","affiliation":[{"name":"Research &amp; Development Systems LLC,Almaty,Kazakhstan"}]},{"given":"Anatoly","family":"Shcherba","sequence":"additional","affiliation":[{"name":"Cherkasy State Technological University,Dept. of Applied Mathematics,Cherkasy,Ukraine"}]},{"given":"Artem","family":"Lavdanskyi","sequence":"additional","affiliation":[{"name":"The State Scientific and Research Institute of Cybersecurity Technologies and Information Protection,Kyiv,Ukraine"}]},{"given":"Sakhybay","family":"Tynymbayev","sequence":"additional","affiliation":[{"name":"International Information Technology University,Department of Computer Engineering,Almat,Kazakhstan"}]},{"given":"Viktor","family":"Khaliavka","sequence":"additional","affiliation":[{"name":"Cherkasy Research Forensic Center,Dept. of Forensic Investigation and Duplication of Vehicle Identification Numbers,Cherkasy,Ukraine"}]},{"given":"Olga","family":"Abramkina","sequence":"additional","affiliation":[{"name":"International Information Technology University,Dept. of Cybersecurity,Almaty,Kazakhstan"}]}],"member":"263","reference":[{"key":"ref1","article-title":"One-Time Certificates for Reliable and Secure Document Signing","author":"Mayr","year":"2022"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.3390\/electronics12183824"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.54254\/2755-2721\/15\/20230814"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/icmcsi61536.2024.00027"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/359340.359342"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/129902.129904"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.6028\/nist.fips.186-5"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/b97644"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/s13389-012-0027-1"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/0-387-34805-0_22"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/tit.1985.1057074"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1049\/iet-net.2019.0004"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1108\/ijpcc-06-2022-0240"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ic_aset58101.2023.10151215"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/jbhi.2021.3112693"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.2478\/ijssis-2024-0032"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.3390\/cryptography8030031"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1137\/s0097539795293172"},{"key":"ref19","first-page":"289","article-title":"Families of Square Commutative 2x2 Matrices","volume-title":"CEUR Workshop Proceedings","volume":"3550","author":"Shcherba"},{"key":"ref20","first-page":"306","article-title":"A Finite Field of Square Matrices of Order 2","volume-title":"CEUR Workshop Proceedings","volume":"3550","author":"Faure"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-68391-6_1"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-71804-5_17"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/tit.1976.1055638"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4757-2103-4"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4939-1711-2"},{"key":"ref26","volume-title":"Cryptography: theory and practice","author":"Stinson","year":"2022"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1023\/a:1008350005447"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4419-5906-5"},{"key":"ref29","first-page":"119","article-title":"Cryptography: Fundamentals and applications","author":"Massey","year":"1993","journal-title":"Copies of transparencies, Advanced Technology Seminars"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1002\/j.1538-7305.1949.tb00928.x"},{"key":"ref31","article-title":"The Marsaglia Random Number CDROM including the Diehard Battery of Tests"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.6028\/nist.sp.800-22r1a"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1145\/1268776.1268777"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1007\/s10559-016-9824-3"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.32782\/cmis\/2608-52"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1007\/bf00193563"}],"event":{"name":"2025 5th International Conference on Electrical, Computer and Energy Technologies (ICECET)","location":"Paris, France","start":{"date-parts":[[2025,7,3]]},"end":{"date-parts":[[2025,7,6]]}},"container-title":["2025 5th International Conference on Electrical, Computer and Energy Technologies (ICECET)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11471878\/11471697\/11472340.pdf?arnumber=11472340","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,15]],"date-time":"2026-04-15T19:23:59Z","timestamp":1776281039000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11472340\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,7,3]]},"references-count":36,"URL":"https:\/\/doi.org\/10.1109\/icecet63943.2025.11472340","relation":{},"subject":[],"published":{"date-parts":[[2025,7,3]]}}}