{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,12,21]],"date-time":"2022-12-21T03:35:01Z","timestamp":1671593701749},"reference-count":30,"publisher":"American Institute of Mathematical Sciences (AIMS)","issue":"4","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["AMC"],"published-print":{"date-parts":[[2016,11]]},"DOI":"10.3934\/amc.2016046","type":"journal-article","created":{"date-parts":[[2016,11,4]],"date-time":"2016-11-04T18:57:08Z","timestamp":1478285828000},"page":"861-870","source":"Crossref","is-referenced-by-count":3,"title":["Public key protocols over the ring $E_{p}^{(m)}$"],"prefix":"10.3934","volume":"10","author":[{"given":"Joan-Josep","family":"Climent","sequence":"first","affiliation":[]},{"given":"Juan Antonio","family":"L\u00f3pez-Ramos","sequence":"first","affiliation":[]}],"member":"2321","reference":[{"key":"1","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1007\/3-540-45353-9_2","article-title":"New key agreement protocols in braid group cryptography,","author":"I. Anshel","year":"2001","journal-title":"in <em>Topics Crypt. - CT-RSA 2001<\/em> (ed. D. Naccache)"},{"key":"2","doi-asserted-by":"publisher","first-page":"1","DOI":"10.4310\/MRL.1999.v6.n3.a3","article-title":"An algebraic method for public-key cryptography,","volume":"6","author":"I. Anshel","year":"1999","journal-title":"<em>Math. Res. Lett.<\/em>"},{"key":"3","doi-asserted-by":"crossref","first-page":"257","DOI":"10.1007\/BF02757282","article-title":"Some examples in PI ring theory,","volume":"18","author":"G. M. Bergman","year":"1974","journal-title":"<em>Israel J. Math.<\/em>"},{"key":"4","doi-asserted-by":"publisher","first-page":"150","DOI":"10.1016\/j.amc.2005.03.032","article-title":"A nonlinear elliptic curve cryptosystem based on matrices,","volume":"174","author":"J.-J. Climent","year":"2006","journal-title":"<em>Appl. Math. Comput.<\/em>"},{"key":"5","doi-asserted-by":"publisher","first-page":"357","DOI":"10.1080\/00207160.2012.696105","article-title":"Key exchange protocols over noncommutative rings. The case of End$(\\mathbb Z_p\\times\\mathbb Z_{p^2})$,","author":"J.-J. Climent","year":"2011","journal-title":"<em>Proc. 11th Int. Conf. Comput. Math. Methods Sci. Engin. (CMMSE 2011)<\/em>"},{"key":"6","doi-asserted-by":"publisher","first-page":"91","DOI":"10.1007\/s00200-011-0138-4","article-title":"On the arithmetic of the endomorphisms ring End $(\\mathbb Z_p\\times\\mathbb Z_{p^2})$,","volume":"22","author":"J.-J. Climent","year":"2011","journal-title":"<em>Appl. Algebr. Eng"},{"key":"7","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1080\/00207160.2012.696105","article-title":"Key exchange protocols over noncommutative rings. The case of End $(\\mathbb Z_p\\times\\mathbb Z_{p^2})$,","volume":"89(13-14)","author":"J.-J. Climent","year":"2012","journal-title":"<em>Int. J. Comput. Math.<\/em>"},{"key":"8","doi-asserted-by":"publisher","first-page":"347","DOI":"10.1007\/s00200-014-0231-6","article-title":"An extension of the noncommutative Bergman's ring with a large number of noninvertible elements,","volume":"25","author":"J.-J. Climent","year":"2014","journal-title":"<em>Appl. Algebr. Eng. Comm.<\/em>"},{"key":"9","doi-asserted-by":"crossref","first-page":"644","DOI":"10.1109\/TIT.1976.1055638","article-title":"New Directions in Cryptography,","volume":"22","author":"W. D. Diffie","year":"1976","journal-title":"<em>IEEE Trans. Inform. Theory<\/em>"},{"key":"10","doi-asserted-by":"publisher","first-page":"469","DOI":"10.1109\/TIT.1985.1057074","article-title":"A public key cryptosystem and a signature scheme based on discrete logarithms,","volume":"31","author":"T. ElGamal","year":"1985","journal-title":"<em>IEEE Trans. Inform. Theory<\/em>"},{"key":"11","doi-asserted-by":"publisher","first-page":"143","DOI":"10.1007\/s00200-012-0170-z","article-title":"Cryptanalysis of a key exchange protocol based on the endomorphisms ring End $(\\mathbb Z_p\\times\\mathbb Z_{p^2})$,","volume":"23)","author":"A. A. Kamal","year":"2012","journal-title":"<em>Appl. Algebr. Eng. Comm.<\/em>"},{"key":"12","doi-asserted-by":"publisher","first-page":"317","DOI":"10.1007\/s10623-007-9123-0","article-title":"Towards generating secure keys for braid cryptography,","volume":"45","author":"K. H. Ko","year":"2007","journal-title":"<em>Design. Code. Cryptogr.<\/em>"},{"key":"13","doi-asserted-by":"publisher","first-page":"166","DOI":"10.1007\/3-540-44598-6_10","article-title":"New public-key cryptosystem using braid groups,","author":"K. H. Ko","year":"2000","journal-title":"<em>Adv. Crypt. - CRYPTO 2000<\/em> (ed. M. Bellare)"},{"key":"14","doi-asserted-by":"publisher","first-page":"3878","DOI":"10.1080\/00927870802160883","article-title":"A simple generalization of the ElGamal cryptosystem to non-abelian groups,","volume":"36","author":"A. Mahalanobis","year":"2008","journal-title":"<em>Commun. Algebra<\/em>"},{"key":"15","doi-asserted-by":"publisher","first-page":"161","DOI":"10.1007\/s11856-008-1008-z","article-title":"The Diffie-Hellman key exchange and non-abelian nilpotent groups,","volume":"165","author":"A. Mahalanobis","year":"2008","journal-title":"<em>Israel J. Math.<\/em>"},{"key":"16","doi-asserted-by":"publisher","first-page":"1939","DOI":"10.12988\/imf.2013.310187","article-title":"Are matrices useful in public-key cryptography?,","volume":"8","author":"A. Mahalanobis","year":"2013","journal-title":"<em>Int. Math. Forum<\/em>"},{"key":"17","doi-asserted-by":"publisher","first-page":"81","DOI":"10.1090\/conm\/633\/12653","article-title":"The MOR cryptosystem and finite $p$-groups,","author":"A. Mahalanobis","year":"2015","journal-title":"in <em>Algorithmic Problems of Group Theory"},{"key":"18","doi-asserted-by":"publisher","first-page":"489","DOI":"10.3934\/amc.2007.1.489","article-title":"Public key cryptography based on semigroup actions,","volume":"1","author":"G. Maze","year":"2007","journal-title":"<em>Adv. Math. Commun.<\/em>"},{"key":"19","article-title":"<em>Handbook of Applied Cryptography<\/em>,","author":"A. J. Menezes","year":"1996","journal-title":"CRC Press"},{"key":"20","article-title":"<em>Group-Based Cryptography<\/em>,","author":"A. G. Myasnikov","year":"2008","journal-title":"Birkh\u00e4user Verlag"},{"key":"21","doi-asserted-by":"publisher","first-page":"470","DOI":"10.1007\/3-540-44647-8_28","article-title":"New public key cryptosystem using finite non abelian groups,","author":"S.-H. Paeng","year":"2001","journal-title":"in <em>Adv. Crypt. - CRYPTO 2001<\/em> (ed. J. Kilian)"},{"key":"22","doi-asserted-by":"publisher","first-page":"120","DOI":"10.1145\/359340.359342","article-title":"A method for obtaining digital signatures and public-key cryptosystems,","volume":"21","author":"R. L. Rivest","year":"1978","journal-title":"<em>Commun. ACM<\/em>"},{"key":"23","first-page":"76","article-title":"Basic semigroup primitive for cryptographic session key exchange protocol (SKEP),","volume":"28","author":"E. Sakalauskas","year":"2003","journal-title":"<em>Inf. Technol. Control<\/em>"},{"key":"24","doi-asserted-by":"publisher","first-page":"161","DOI":"10.1090\/conm\/418\/07954","article-title":"A new key exchange protocol based on the decomposition problem,","volume":"418","author":"V. Shpilrain","year":"2006","journal-title":"<em>Contemp. Math.<\/em>"},{"key":"25","doi-asserted-by":"publisher","first-page":"291","DOI":"10.1007\/s00200-006-0006-9","article-title":"Combinatorial group theory and public key cryptography,","volume":"17","author":"V. Shpilrain","year":"2006","journal-title":"<em>Appl. Algebr. Eng. Comm.<\/em>"},{"key":"26","first-page":"384","article-title":"Systems of open distribution of keys on the basis of noncommutative semigroups,","volume":"48","author":"V. M. Sidelnikov","year":"1994","journal-title":"<em>Russ. Ac. Sc. Doklady Math.<\/em>"},{"key":"27","first-page":"426","article-title":"A new method for exchanging secret keys,","author":"E. Stickel","year":"2005","journal-title":"in <em>Proc. 3rd Int. Conf. Inform. Techn. Appl. (ICITA'05)<\/em>"},{"key":"28","article-title":"<em>Cryptography. Theory and Practice<\/em>,","author":"D. R. Stinson","year":"1995","journal-title":"CRC Press"},{"key":"29","first-page":"265","article-title":"A zero-knowledge undeniable signature scheme in non-abelian group setting,","volume":"6","author":"T. Thomas","year":"2008","journal-title":"<em>Int. J. Netw. Secur.<\/em>"},{"key":"30","doi-asserted-by":"crossref","first-page":"41","DOI":"10.1007\/10718964_4","article-title":"A proposal of a new public key cryptosystem using matrices over a ring,","author":"H. Yoo","year":"2000","journal-title":"in <em>Information Security and Privacy<\/em>"}],"container-title":["Advances in Mathematics of Communications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/www.aimsciences.org\/journals\/displayArticlesnew.jsp?paperID=13244","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,25]],"date-time":"2017-06-25T02:53:05Z","timestamp":1498359185000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.aimsciences.org\/journals\/displayArticlesnew.jsp?paperID=13244"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,11]]},"references-count":30,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2016,11]]}},"URL":"https:\/\/doi.org\/10.3934\/amc.2016046","relation":{},"ISSN":["1930-5346"],"issn-type":[{"value":"1930-5346","type":"print"}],"subject":[],"published":{"date-parts":[[2016,11]]}}}