{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T23:00:32Z","timestamp":1773615632946,"version":"3.50.1"},"reference-count":12,"publisher":"Allerton Press","issue":"7","license":[{"start":{"date-parts":[[2019,12,1]],"date-time":"2019-12-01T00:00:00Z","timestamp":1575158400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2019,12,1]],"date-time":"2019-12-01T00:00:00Z","timestamp":1575158400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Aut. Control Comp. Sci."],"published-print":{"date-parts":[[2019,12]]},"DOI":"10.3103\/s0146411619070198","type":"journal-article","created":{"date-parts":[[2020,3,4]],"date-time":"2020-03-04T10:02:40Z","timestamp":1583316160000},"page":"745-754","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Codes in a Dihedral Group Algebra"],"prefix":"10.3103","volume":"53","author":[{"given":"K. V.","family":"Vedenev","sequence":"first","affiliation":[]},{"given":"V. M.","family":"Deundyak","sequence":"additional","affiliation":[]}],"member":"1627","published-online":{"date-parts":[[2020,3,4]]},"reference":[{"key":"7176_CR1","first-page":"114","volume":"42\u201344","author":"R.J. McEliece","year":"1978","unstructured":"McEliece, R.J., A public-key cryptosystem based on algebraic coding theory, DSN Prog. Rep., 1978, vols. 42\u201344, pp. 114\u2013116.","journal-title":"DSN Prog. Rep."},{"key":"7176_CR2","doi-asserted-by":"publisher","first-page":"137","DOI":"10.18255\/1818-1015-2016-2-137-152","volume":"23","author":"V.M. Deundyak","year":"2016","unstructured":"Deundyak, V.M. and Kosolapov, Yu.V., Cryptosystem based on induced group codes, Model. Anal. Inf. Sist., 2016, vol. 23, no. 2, pp. 137\u2013152.","journal-title":"Model. Anal. Inf. Sist."},{"key":"7176_CR3","doi-asserted-by":"publisher","first-page":"239","DOI":"10.18255\/1818-1015-2017-2-239-252","volume":"24","author":"V.M. Deundyak","year":"2017","unstructured":"Deundyak, V.M., Kosolapov, Yu.V., and Lelyuk, E.A., Decoding the tensor product of MLD codes and applications for code cryptosystems, Model. Anal. Inf. Sist., 2017, vol. 24, no. 2, pp. 239\u2013252.","journal-title":"Model. Anal. Inf. Sist."},{"key":"7176_CR4","first-page":"43","volume":"22","author":"V.M. Deundyak","year":"2017","unstructured":"Deundyak, V.M. and Kosolapov, Yu.V., The use of the tensor product of Reed\u2013Muller codes in asymmetric McEliece type cryptosystem and analysis of its resistance to attacks on the cryptogram, Vychisl. Tekhnol., 2017, vol. 22, no. 4, pp. 43\u201360.","journal-title":"Vychisl. Tekhnol."},{"key":"7176_CR5","doi-asserted-by":"publisher","DOI":"10.1007\/978-94-010-0405-3","volume-title":"An Inroduction to Group Rings","author":"C.P. Milies","year":"2002","unstructured":"Milies, C.P. and Sehgal, S.K., An Inroduction to Group Rings, Boston: Kluwer Academic Publishers, 2002."},{"key":"7176_CR6","first-page":"109","volume":"11","author":"V.M. Sidel\u2019nikov","year":"2008","unstructured":"Sidel\u2019nikov, V.M. and Kazarin, L.S., On a group algebra of a dihedral group and complexity of multiplication of second-order matrices, Tr. Diskr. Mat., 2008, vol. 11, no. 1, pp. 109\u2013118.","journal-title":"Tr. Diskr. Mat."},{"key":"7176_CR7","doi-asserted-by":"publisher","first-page":"204","DOI":"10.1016\/j.ffa.2015.05.002","volume":"35","author":"F.E.B. Martinez","year":"2015","unstructured":"Martinez, F.E.B., Structure of finite dihedral group algebra, Finite Fields Their Appl., 2015, vol. 35, pp. 204\u2013214.","journal-title":"Finite Fields Their Appl."},{"key":"7176_CR8","unstructured":"Vinberg, E.B., Kurs algebry (Course in Algebra), Moscow: Mosk. Tsentr Nepreryvnogo Mat. Obraz., 2013."},{"key":"7176_CR9","unstructured":"Tsimmerman, K.-Kh., Metody teorii modulyarnykh predstavlenii v algebraicheskoi teorii kodirovaniya (Methods of the Theory of Modular Representations in Algebraic Coding Theory), Moscow: Mosk. Tsentr Nepreryvnogo Mat. Obraz., 2011."},{"key":"7176_CR10","doi-asserted-by":"publisher","first-page":"464","DOI":"10.18255\/1818-1015-2015-4-464-482","volume":"22","author":"V.M. Deundyak","year":"2015","unstructured":"Deundyak, V.M. and Kosolapov, Yu.V., Algorithms for majority decoding of group codes, Model. Anal. Inf. Sist., 2015, vol. 22, no. 4, pp. 464\u2013482.","journal-title":"Model. Anal. Inf. Sist."},{"key":"7176_CR11","doi-asserted-by":"publisher","DOI":"10.1090\/coll\/037","volume-title":"Structure of Rings","author":"N. Jacobson","year":"1956","unstructured":"Jacobson, N., Structure of Rings, American Mathematical Soc., 1956."},{"key":"7176_CR12","unstructured":"Sidelnikov, V.M., Teoriya kodirovaniya (Coding Theory), Moscow: Fizmatlit, 2011."}],"container-title":["Automatic Control and Computer Sciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.3103\/S0146411619070198.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.3103\/S0146411619070198","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.3103\/S0146411619070198.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T22:02:34Z","timestamp":1773612154000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.3103\/S0146411619070198"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,12]]},"references-count":12,"journal-issue":{"issue":"7","published-print":{"date-parts":[[2019,12]]}},"alternative-id":["7176"],"URL":"https:\/\/doi.org\/10.3103\/s0146411619070198","relation":{},"ISSN":["0146-4116","1558-108X"],"issn-type":[{"value":"0146-4116","type":"print"},{"value":"1558-108X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,12]]},"assertion":[{"value":"2 December 2017","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"4 March 2020","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"The authors declare that they have no conflicts of interest.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"CONFLICT OF INTEREST"}}]}}