{"id":"https://openalex.org/W3115163388","doi":"https://doi.org/10.1515/jmc-2019-0054","title":"Improved cryptanalysis of a ElGamal Cryptosystem Based on Matrices Over Group Rings","display_name":"Improved cryptanalysis of a ElGamal Cryptosystem Based on Matrices Over Group Rings","publication_year":2020,"publication_date":"2020-12-20","ids":{"openalex":"https://openalex.org/W3115163388","doi":"https://doi.org/10.1515/jmc-2019-0054","mag":"3115163388"},"language":"en","primary_location":{"id":"doi:10.1515/jmc-2019-0054","is_oa":true,"landing_page_url":"https://doi.org/10.1515/jmc-2019-0054","pdf_url":"https://www.degruyter.com/document/doi/10.1515/jmc-2019-0054/pdf","source":{"id":"https://openalex.org/S100611479","display_name":"Journal of Mathematical Cryptology","issn_l":"1862-2976","issn":["1862-2976","1862-2984"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310313990","host_organization_name":"De Gruyter","host_organization_lineage":["https://openalex.org/P4310313990"],"host_organization_lineage_names":["De Gruyter"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Mathematical Cryptology","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://www.degruyter.com/document/doi/10.1515/jmc-2019-0054/pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5082118320","display_name":"Atul Pandey","orcid":"https://orcid.org/0000-0003-2992-5368"},"institutions":[{"id":"https://openalex.org/I110166357","display_name":"University of Delhi","ror":"https://ror.org/04gzb2213","country_code":"IN","type":"education","lineage":["https://openalex.org/I110166357"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Atul Pandey","raw_affiliation_strings":["Department of Mathematics, University of Delhi , Delhi - , India","Department of Mathematics, University of Delhi, Delhi-110007, India"],"affiliations":[{"raw_affiliation_string":"Department of Mathematics, University of Delhi , Delhi - , India","institution_ids":["https://openalex.org/I110166357"]},{"raw_affiliation_string":"Department of Mathematics, University of Delhi, Delhi-110007, India","institution_ids":["https://openalex.org/I110166357"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5005200150","display_name":"Indivar Gupta","orcid":"https://orcid.org/0000-0003-2801-0254"},"institutions":[{"id":"https://openalex.org/I4210120887","display_name":"Scientific Analysis Group","ror":"https://ror.org/02rpzt041","country_code":"IN","type":"facility","lineage":["https://openalex.org/I1340206300","https://openalex.org/I4210120887","https://openalex.org/I4210150591"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Indivar Gupta","raw_affiliation_strings":["SAG, Metcalfe House, DRDO Complex , Delhi - , India","SAG, Metcalfe House, DRDO Complex, Delhi-110054, India"],"affiliations":[{"raw_affiliation_string":"SAG, Metcalfe House, DRDO Complex , Delhi - , India","institution_ids":["https://openalex.org/I4210120887"]},{"raw_affiliation_string":"SAG, Metcalfe House, DRDO Complex, Delhi-110054, India","institution_ids":["https://openalex.org/I4210120887"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5101867199","display_name":"Dhiraj Kumar Singh","orcid":"https://orcid.org/0000-0002-5513-9558"},"institutions":[{"id":"https://openalex.org/I110166357","display_name":"University of Delhi","ror":"https://ror.org/04gzb2213","country_code":"IN","type":"education","lineage":["https://openalex.org/I110166357"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Dhiraj Kumar Singh","raw_affiliation_strings":["Zakir Husain College, University of Delhi , Delhi - , India","Zakir Husain College, University of Delhi, Delhi-110002, India"],"affiliations":[{"raw_affiliation_string":"Zakir Husain College, University of Delhi , Delhi - , India","institution_ids":["https://openalex.org/I110166357"]},{"raw_affiliation_string":"Zakir Husain College, University of Delhi, Delhi-110002, India","institution_ids":["https://openalex.org/I110166357"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5082118320"],"corresponding_institution_ids":["https://openalex.org/I110166357"],"apc_list":{"value":1000,"currency":"EUR","value_usd":1078},"apc_paid":{"value":1000,"currency":"EUR","value_usd":1078},"fwci":0.3977,"has_fulltext":true,"cited_by_count":4,"citation_normalized_percentile":{"value":0.70070926,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":95},"biblio":{"volume":"15","issue":"1","first_page":"266","last_page":"279"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11130","display_name":"Coding theory and cryptography","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11130","display_name":"Coding theory and cryptography","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9988999962806702,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9969000220298767,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/elgamal-encryption","display_name":"ElGamal encryption","score":0.9499703645706177},{"id":"https://openalex.org/keywords/cryptosystem","display_name":"Cryptosystem","score":0.776858925819397},{"id":"https://openalex.org/keywords/cryptanalysis","display_name":"Cryptanalysis","score":0.6189799308776855},{"id":"https://openalex.org/keywords/discrete-logarithm","display_name":"Discrete logarithm","score":0.5299390554428101},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.5032328963279724},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.4432589113712311},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.4129175543785095},{"id":"https://openalex.org/keywords/linear-cryptanalysis","display_name":"Linear cryptanalysis","score":0.41089892387390137},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.40125608444213867},{"id":"https://openalex.org/keywords/discrete-mathematics","display_name":"Discrete mathematics","score":0.39362582564353943},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.39066335558891296},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.27931833267211914},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.2464054822921753},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.13270583748817444}],"concepts":[{"id":"https://openalex.org/C11045955","wikidata":"https://www.wikidata.org/wiki/Q1162410","display_name":"ElGamal encryption","level":4,"score":0.9499703645706177},{"id":"https://openalex.org/C6295992","wikidata":"https://www.wikidata.org/wiki/Q976521","display_name":"Cryptosystem","level":3,"score":0.776858925819397},{"id":"https://openalex.org/C181149355","wikidata":"https://www.wikidata.org/wiki/Q897511","display_name":"Cryptanalysis","level":3,"score":0.6189799308776855},{"id":"https://openalex.org/C173259116","wikidata":"https://www.wikidata.org/wiki/Q864003","display_name":"Discrete logarithm","level":4,"score":0.5299390554428101},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.5032328963279724},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.4432589113712311},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.4129175543785095},{"id":"https://openalex.org/C82424418","wikidata":"https://www.wikidata.org/wiki/Q1826463","display_name":"Linear cryptanalysis","level":4,"score":0.41089892387390137},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.40125608444213867},{"id":"https://openalex.org/C118615104","wikidata":"https://www.wikidata.org/wiki/Q121416","display_name":"Discrete mathematics","level":1,"score":0.39362582564353943},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.39066335558891296},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.27931833267211914},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.2464054822921753},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.13270583748817444}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1515/jmc-2019-0054","is_oa":true,"landing_page_url":"https://doi.org/10.1515/jmc-2019-0054","pdf_url":"https://www.degruyter.com/document/doi/10.1515/jmc-2019-0054/pdf","source":{"id":"https://openalex.org/S100611479","display_name":"Journal of Mathematical Cryptology","issn_l":"1862-2976","issn":["1862-2976","1862-2984"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310313990","host_organization_name":"De Gruyter","host_organization_lineage":["https://openalex.org/P4310313990"],"host_organization_lineage_names":["De Gruyter"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Mathematical Cryptology","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:ff446db40f06437987f5fcf6da7627c9","is_oa":true,"landing_page_url":"https://doaj.org/article/ff446db40f06437987f5fcf6da7627c9","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Journal of Mathematical Cryptology, Vol 15, Iss 1, Pp 266-279 (2020)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1515/jmc-2019-0054","is_oa":true,"landing_page_url":"https://doi.org/10.1515/jmc-2019-0054","pdf_url":"https://www.degruyter.com/document/doi/10.1515/jmc-2019-0054/pdf","source":{"id":"https://openalex.org/S100611479","display_name":"Journal of Mathematical Cryptology","issn_l":"1862-2976","issn":["1862-2976","1862-2984"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310313990","host_organization_name":"De Gruyter","host_organization_lineage":["https://openalex.org/P4310313990"],"host_organization_lineage_names":["De Gruyter"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Mathematical Cryptology","raw_type":"journal-article"},"sustainable_development_goals":[{"display_name":"Partnerships for the goals","score":0.4399999976158142,"id":"https://metadata.un.org/sdg/17"}],"awards":[],"funders":[{"id":"https://openalex.org/F4320320767","display_name":"University Grants Commission","ror":"https://ror.org/04p800546"}],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W3115163388.pdf","grobid_xml":"https://content.openalex.org/works/W3115163388.grobid-xml"},"referenced_works_count":11,"referenced_works":["https://openalex.org/W1498993177","https://openalex.org/W1594873819","https://openalex.org/W2016280276","https://openalex.org/W2036619496","https://openalex.org/W2105962937","https://openalex.org/W2108834246","https://openalex.org/W2158655916","https://openalex.org/W2464093460","https://openalex.org/W2559378053","https://openalex.org/W2908787541","https://openalex.org/W4230398518"],"related_works":["https://openalex.org/W3010024830","https://openalex.org/W2151519129","https://openalex.org/W2044833882","https://openalex.org/W2360657378","https://openalex.org/W1528334372","https://openalex.org/W2363815311","https://openalex.org/W4254421369","https://openalex.org/W2492670495","https://openalex.org/W4211148044","https://openalex.org/W2021705294"],"abstract_inverted_index":{"Abstract":[0],"ElGamal":[1,178],"cryptosystem":[2,76,100,142,179],"has":[3],"emerged":[4],"as":[5,36],"one":[6],"of":[7,45,48,62,151,190],"the":[8,46,99,111,118,140,149,165,177,188],"most":[9],"important":[10],"construction":[11],"in":[12,83,101],"Public":[13],"Key":[14],"Cryptography":[15],"(PKC)":[16],"since":[17],"Diffie-Hellman":[18],"key":[19,26,131],"exchange":[20],"protocol":[21],"was":[22],"proposed.":[23],"However,":[24,114],"public":[25],"schemes":[27],"which":[28],"are":[29,41,58],"based":[30,77],"on":[31,78],"number":[32],"theoretic":[33,56],"problems":[34],"such":[35],"discrete":[37],"logarithm":[38],"problem":[39],"(DLP)":[40],"at":[42],"risk":[43],"because":[44],"evolution":[47],"quantum":[49],"computers.":[50],"As":[51],"a":[52,59,74,96],"result,":[53],"other":[54],"non-number":[55],"alternatives":[57],"dire":[60],"need":[61],"entire":[63],"cryptographic":[64],"community.":[65],"In":[66],"2016,":[67],"Saba":[68,145,182],"Inam":[69],"and":[70,103,120,127,146,170,183,192],"Rashid":[71,184],"Ali":[72],"proposed":[73,143,180],"ElGamal-like":[75,141],"matrices":[79,152,159],"over":[80,153,160],"group":[81,154],"rings":[82,155],"\u2018Neural":[84],"Computing":[85],"&amp;":[86],"Applications\u2019.":[87],"Using":[88,148],"linear":[89],"algebra":[90],"approach,":[91],"Jia":[92],"et":[93],"al.":[94],"provided":[95],"cryptanalysis":[97,125],"for":[98],"2019":[102],"claimed":[104],"that":[105,133,176],"their":[106,124],"attack":[107],"could":[108],"recover":[109],"all":[110,129],"equivalent":[112,130],"keys.":[113],"this":[115],"is":[116],"not":[117,186],"case":[119],"we":[121,162],"have":[122,163,173],"improved":[123],"approach":[126],"derived":[128],"pairs":[132],"can":[134],"be":[135],"used":[136],"to":[137,156],"totally":[138],"break":[139],"by":[144,181],"Rashid.":[147],"decomposition":[150],"larger":[157],"size":[158],"rings,":[161],"made":[164],"cryptanalysing":[166],"algorithm":[167],"more":[168],"practical":[169],"efficient.":[171],"We":[172],"also":[174],"proved":[175],"does":[185],"achieve":[187],"security":[189],"IND-CPA":[191],"IND-CCA.":[193]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":2}],"updated_date":"2025-12-07T23:40:59.601060","created_date":"2025-10-10T00:00:00"}
