{"id":"https://openalex.org/W2004463970","doi":"https://doi.org/10.1007/bf00202270","title":"The cryptanalysis of a public-key implementation of finite group mappings","display_name":"The cryptanalysis of a public-key implementation of finite group mappings","publication_year":1995,"publication_date":"1995-09-01","ids":{"openalex":"https://openalex.org/W2004463970","doi":"https://doi.org/10.1007/bf00202270","mag":"2004463970"},"language":"en","primary_location":{"id":"doi:10.1007/bf00202270","is_oa":true,"landing_page_url":"https://doi.org/10.1007/bf00202270","pdf_url":"https://link.springer.com/content/pdf/10.1007/BF00202270.pdf","source":{"id":"https://openalex.org/S190936789","display_name":"Journal of Cryptology","issn_l":"0933-2790","issn":["0933-2790","1432-1378"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Cryptology","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"bronze","oa_url":"https://link.springer.com/content/pdf/10.1007/BF00202270.pdf","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5044763974","display_name":"Simon R. Blackburn\u22c6","orcid":"https://orcid.org/0000-0003-0762-031X"},"institutions":[{"id":"https://openalex.org/I184558857","display_name":"Royal Holloway University of London","ror":"https://ror.org/04g2vpn86","country_code":"GB","type":"education","lineage":["https://openalex.org/I124357947","https://openalex.org/I184558857"]},{"id":"https://openalex.org/I124357947","display_name":"University of London","ror":"https://ror.org/04cw6st05","country_code":"GB","type":"education","lineage":["https://openalex.org/I124357947"]}],"countries":["GB"],"is_corresponding":true,"raw_author_name":"Simon Blackburn","raw_affiliation_strings":["Information Security Group, Royal Holloway and Bedford New College, University of London, TW20 0EX, Egham, Surrey, England","Information Security Group, Royal Holloway and Bedford New College, University of London, Egham, England TW20 0EX#TAB#"],"affiliations":[{"raw_affiliation_string":"Information Security Group, Royal Holloway and Bedford New College, University of London, TW20 0EX, Egham, Surrey, England","institution_ids":["https://openalex.org/I184558857"]},{"raw_affiliation_string":"Information Security Group, Royal Holloway and Bedford New College, University of London, Egham, England TW20 0EX#TAB#","institution_ids":["https://openalex.org/I124357947"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5061053285","display_name":"Se\u00e1n Murphy","orcid":"https://orcid.org/0000-0002-6582-4065"},"institutions":[{"id":"https://openalex.org/I184558857","display_name":"Royal Holloway University of London","ror":"https://ror.org/04g2vpn86","country_code":"GB","type":"education","lineage":["https://openalex.org/I124357947","https://openalex.org/I184558857"]},{"id":"https://openalex.org/I124357947","display_name":"University of London","ror":"https://ror.org/04cw6st05","country_code":"GB","type":"education","lineage":["https://openalex.org/I124357947"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Sean Murphy","raw_affiliation_strings":["Information Security Group, Royal Holloway and Bedford New College, University of London, TW20 0EX, Egham, Surrey, England","Information Security Group, Royal Holloway and Bedford New College, University of London, Egham, England TW20 0EX#TAB#"],"affiliations":[{"raw_affiliation_string":"Information Security Group, Royal Holloway and Bedford New College, University of London, TW20 0EX, Egham, Surrey, England","institution_ids":["https://openalex.org/I184558857"]},{"raw_affiliation_string":"Information Security Group, Royal Holloway and Bedford New College, University of London, Egham, England TW20 0EX#TAB#","institution_ids":["https://openalex.org/I124357947"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5108393186","display_name":"Jacques Stern","orcid":null},"institutions":[{"id":"https://openalex.org/I29607241","display_name":"\u00c9cole Normale Sup\u00e9rieure - PSL","ror":"https://ror.org/05a0dhs15","country_code":"FR","type":"funder","lineage":["https://openalex.org/I2746051580","https://openalex.org/I29607241"]}],"countries":["FR"],"is_corresponding":false,"raw_author_name":"Jacques Stern","raw_affiliation_strings":["Laboratoire d'Informatique, Ecole Normale Sup\u00e9rieure, 45 Rue d'Ulm 75230, 05, Paris, France","Laboratoire d'Informatique, Ecole Normale Sup\u00e9rieure, Paris, France 05#TAB#"],"affiliations":[{"raw_affiliation_string":"Laboratoire d'Informatique, Ecole Normale Sup\u00e9rieure, 45 Rue d'Ulm 75230, 05, Paris, France","institution_ids":["https://openalex.org/I29607241"]},{"raw_affiliation_string":"Laboratoire d'Informatique, Ecole Normale Sup\u00e9rieure, Paris, France 05#TAB#","institution_ids":["https://openalex.org/I29607241"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5044763974"],"corresponding_institution_ids":["https://openalex.org/I124357947","https://openalex.org/I184558857"],"apc_list":{"value":2290,"currency":"EUR","value_usd":2890},"apc_paid":null,"fwci":0.588,"has_fulltext":true,"cited_by_count":8,"citation_normalized_percentile":{"value":0.74578906,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"8","issue":"3","first_page":"157","last_page":"166"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11130","display_name":"Coding theory and cryptography","score":0.998199999332428,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11130","display_name":"Coding theory and cryptography","score":0.998199999332428,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10849","display_name":"Finite Group Theory Research","score":0.9886000156402588,"subfield":{"id":"https://openalex.org/subfields/2607","display_name":"Discrete Mathematics and Combinatorics"},"field":{"id":"https://openalex.org/fields/26","display_name":"Mathematics"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11797","display_name":"graph theory and CDMA systems","score":0.9814000129699707,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/cryptosystem","display_name":"Cryptosystem","score":0.7729750871658325},{"id":"https://openalex.org/keywords/discrete-logarithm","display_name":"Discrete logarithm","score":0.6041526198387146},{"id":"https://openalex.org/keywords/cryptanalysis","display_name":"Cryptanalysis","score":0.596189558506012},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.537067711353302},{"id":"https://openalex.org/keywords/group","display_name":"Group (periodic table)","score":0.5351921319961548},{"id":"https://openalex.org/keywords/abelian-group","display_name":"Abelian group","score":0.5267072319984436},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.4956256151199341},{"id":"https://openalex.org/keywords/discrete-mathematics","display_name":"Discrete mathematics","score":0.46791985630989075},{"id":"https://openalex.org/keywords/algebra-over-a-field","display_name":"Algebra over a field","score":0.46095919609069824},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.4403230845928192},{"id":"https://openalex.org/keywords/transversal","display_name":"Transversal (combinatorics)","score":0.4354351758956909},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.33024418354034424},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.2957949638366699},{"id":"https://openalex.org/keywords/pure-mathematics","display_name":"Pure mathematics","score":0.2824535667896271},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.27817654609680176},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.2444922924041748},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.23859992623329163},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.15417790412902832},{"id":"https://openalex.org/keywords/mathematical-analysis","display_name":"Mathematical analysis","score":0.10269725322723389},{"id":"https://openalex.org/keywords/physics","display_name":"Physics","score":0.06894949078559875}],"concepts":[{"id":"https://openalex.org/C6295992","wikidata":"https://www.wikidata.org/wiki/Q976521","display_name":"Cryptosystem","level":3,"score":0.7729750871658325},{"id":"https://openalex.org/C173259116","wikidata":"https://www.wikidata.org/wiki/Q864003","display_name":"Discrete logarithm","level":4,"score":0.6041526198387146},{"id":"https://openalex.org/C181149355","wikidata":"https://www.wikidata.org/wiki/Q897511","display_name":"Cryptanalysis","level":3,"score":0.596189558506012},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.537067711353302},{"id":"https://openalex.org/C2781311116","wikidata":"https://www.wikidata.org/wiki/Q83306","display_name":"Group (periodic table)","level":2,"score":0.5351921319961548},{"id":"https://openalex.org/C136170076","wikidata":"https://www.wikidata.org/wiki/Q181296","display_name":"Abelian group","level":2,"score":0.5267072319984436},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.4956256151199341},{"id":"https://openalex.org/C118615104","wikidata":"https://www.wikidata.org/wiki/Q121416","display_name":"Discrete mathematics","level":1,"score":0.46791985630989075},{"id":"https://openalex.org/C136119220","wikidata":"https://www.wikidata.org/wiki/Q1000660","display_name":"Algebra over a field","level":2,"score":0.46095919609069824},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.4403230845928192},{"id":"https://openalex.org/C2780130068","wikidata":"https://www.wikidata.org/wiki/Q2208651","display_name":"Transversal (combinatorics)","level":2,"score":0.4354351758956909},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.33024418354034424},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.2957949638366699},{"id":"https://openalex.org/C202444582","wikidata":"https://www.wikidata.org/wiki/Q837863","display_name":"Pure mathematics","level":1,"score":0.2824535667896271},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.27817654609680176},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.2444922924041748},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.23859992623329163},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.15417790412902832},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.10269725322723389},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.06894949078559875},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1007/bf00202270","is_oa":true,"landing_page_url":"https://doi.org/10.1007/bf00202270","pdf_url":"https://link.springer.com/content/pdf/10.1007/BF00202270.pdf","source":{"id":"https://openalex.org/S190936789","display_name":"Journal of Cryptology","issn_l":"0933-2790","issn":["0933-2790","1432-1378"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Cryptology","raw_type":"journal-article"},{"id":"pmh:oai:CiteSeerX.psu:10.1.1.65.4355","is_oa":false,"landing_page_url":"http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.65.4355","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"http://www.isg.rhul.ac.uk/~sean/fgmrevise.pdf","raw_type":"text"}],"best_oa_location":{"id":"doi:10.1007/bf00202270","is_oa":true,"landing_page_url":"https://doi.org/10.1007/bf00202270","pdf_url":"https://link.springer.com/content/pdf/10.1007/BF00202270.pdf","source":{"id":"https://openalex.org/S190936789","display_name":"Journal of Cryptology","issn_l":"0933-2790","issn":["0933-2790","1432-1378"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Cryptology","raw_type":"journal-article"},"sustainable_development_goals":[{"score":0.5,"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2004463970.pdf","grobid_xml":"https://content.openalex.org/works/W2004463970.grobid-xml"},"referenced_works_count":1,"referenced_works":["https://openalex.org/W2080309018"],"related_works":["https://openalex.org/W27999159","https://openalex.org/W1999127230","https://openalex.org/W18328579","https://openalex.org/W2018555057","https://openalex.org/W2154571469","https://openalex.org/W4312813683","https://openalex.org/W1604946673","https://openalex.org/W98134122","https://openalex.org/W2157130609","https://openalex.org/W1553510179"],"abstract_inverted_index":null,"counts_by_year":[],"updated_date":"2026-04-04T16:13:02.066488","created_date":"2025-10-10T00:00:00"}
