{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,15]],"date-time":"2026-01-15T03:53:41Z","timestamp":1768449221755,"version":"3.49.0"},"publisher-location":"Berlin, Heidelberg","reference-count":10,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540262237","type":"print"},{"value":"9783540315421","type":"electronic"}],"license":[{"start":{"date-parts":[[2005,1,1]],"date-time":"2005-01-01T00:00:00Z","timestamp":1104537600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005]]},"DOI":"10.1007\/11496137_11","type":"book-chapter","created":{"date-parts":[[2010,9,25]],"date-time":"2010-09-25T15:14:24Z","timestamp":1285427664000},"page":"151-163","source":"Crossref","is-referenced-by-count":49,"title":["Thompson\u2019s Group and Public Key Cryptography"],"prefix":"10.1007","author":[{"given":"Vladimir","family":"Shpilrain","sequence":"first","affiliation":[]},{"given":"Alexander","family":"Ushakov","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"11_CR1","doi-asserted-by":"crossref","first-page":"287","DOI":"10.4310\/MRL.1999.v6.n3.a3","volume":"6","author":"I. Anshel","year":"1999","unstructured":"Anshel, I., Anshel, M., Goldfeld, D.: An algebraic method for public-key cryptography. Math. Res. Lett.\u00a06, 287\u2013291 (1999)","journal-title":"Math. Res. Lett."},{"issue":"2","key":"11_CR2","first-page":"215","volume":"42","author":"J.W. Cannon","year":"1996","unstructured":"Cannon, J.W., Floyd, W.J., Parry, W.R.: Introductory notes on Richard Thompson\u2019s groups. L\u2019Enseignement Mathematique\u00a042(2), 215\u2013256 (1996)","journal-title":"L\u2019Enseignement Mathematique"},{"key":"11_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"144","DOI":"10.1007\/3-540-45682-1_9","volume-title":"Advances in Cryptology - ASIACRYPT 2001","author":"J.C. Cha","year":"2001","unstructured":"Cha, J.C., Ko, K.H., Lee, S.J., Han, J.W., Cheon, J.H.: An efficient implementation of braid groups. In: Boyd, C. (ed.) ASIACRYPT 2001. LNCS, vol.\u00a02248, pp. 144\u2013156. Springer, Heidelberg (2001)"},{"key":"11_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"187","DOI":"10.1007\/3-540-36288-6_14","volume-title":"Public Key Cryptography - PKC 2003","author":"D. Hofheinz","year":"2002","unstructured":"Hofheinz, D., Steinwandt, R.: A practical attack on some braid group based cryptographic primitives. In: Desmedt, Y.G. (ed.) PKC 2003. LNCS, vol.\u00a02567, pp. 187\u2013198. Springer, Heidelberg (2002)"},{"key":"11_CR5","unstructured":"Hughes, J., Tannenbaum, A.: Length-based attacks for certain group based encryption rewriting systems, Workshop SECI02 Securit\u00e8 de la Communication sur Intenet, Tunis, Tunisia (September 2002), \n                  \n                    http:\/\/www.storagetek.com\/hughes\/"},{"key":"11_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"166","DOI":"10.1007\/3-540-44598-6_10","volume-title":"Advances in Cryptology - CRYPTO 2000","author":"K.H. Ko","year":"2000","unstructured":"Ko, K.H., Lee, S.J., Cheon, J.H., Han, J.W., Kang, J., Park, C.: New public-key cryptosystem using braid groups. In: Bellare, M. (ed.) CRYPTO 2000. LNCS, vol.\u00a01880, pp. 166\u2013183. Springer, Heidelberg (2000)"},{"key":"11_CR7","doi-asserted-by":"crossref","first-page":"167","DOI":"10.1090\/conm\/360\/06577","volume":"360","author":"V. Shpilrain","year":"2004","unstructured":"Shpilrain, V.: Assessing security of some group based cryptosystems. Contemp. Math., Amer. Math. Soc.\u00a0360, 167\u2013177 (2004)","journal-title":"Contemp. Math., Amer. Math. Soc."},{"key":"11_CR8","unstructured":"Shpilrain, V., Ushakov, A.: The conjugacy search problem in public key cryptography: unnecessary and insufficient, Applicable Algebra in Engineering, Communication and Computing (to appear), \n                  \n                    http:\/\/eprint.iacr.org\/2004\/321\/"},{"key":"11_CR9","unstructured":"Shpilrain, V., Zapata, G.: Combinatorial group theory and public key cryptography. Applicable Algebra in Engineering, Communication and Computing (to appear)"},{"key":"11_CR10","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511574702","volume-title":"Computation with finitely presented groups, Encyclopedia of Mathematics and its Applications","author":"C. Sims","year":"1994","unstructured":"Sims, C.: Computation with finitely presented groups, Encyclopedia of Mathematics and its Applications, vol.\u00a048. Cambridge University Press, Cambridge (1994)"}],"container-title":["Lecture Notes in Computer Science","Applied Cryptography and Network Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11496137_11","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,19]],"date-time":"2019-05-19T19:14:00Z","timestamp":1558293240000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11496137_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005]]},"ISBN":["9783540262237","9783540315421"],"references-count":10,"URL":"https:\/\/doi.org\/10.1007\/11496137_11","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2005]]}}}