{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,6]],"date-time":"2025-12-06T04:53:46Z","timestamp":1764996826693},"publisher-location":"Berlin, Heidelberg","reference-count":16,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540418986"},{"type":"electronic","value":"9783540453536"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2001]]},"DOI":"10.1007\/3-540-45353-9_2","type":"book-chapter","created":{"date-parts":[[2007,7,16]],"date-time":"2007-07-16T15:50:02Z","timestamp":1184601002000},"page":"13-27","source":"Crossref","is-referenced-by-count":38,"title":["New Key Agreement Protocols in Braid Group Cryptography"],"prefix":"10.1007","author":[{"given":"Iris","family":"Anshel","sequence":"first","affiliation":[]},{"given":"Michael","family":"Anshel","sequence":"additional","affiliation":[]},{"given":"Benji","family":"Fisher","sequence":"additional","affiliation":[]},{"given":"Dorian","family":"Goldfeld","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2001,4,2]]},"reference":[{"issue":"9","key":"2_CR1","doi-asserted-by":"publisher","first-page":"835","DOI":"10.2307\/2324657","volume":"100","author":"I. Anshel","year":"1993","unstructured":"Anshel, I., Anshel, M.: From the Post-Markov Theorem through Decision Problems to Public-Key Cryptography, American Mathematical Monthly Vol. 100, No. 9 (November 1993) 835\u2013845","journal-title":"American Mathematical Monthly"},{"key":"2_CR2","doi-asserted-by":"crossref","first-page":"1","DOI":"10.4310\/MRL.1999.v6.n3.a3","volume":"6","author":"I. Anshel","year":"1999","unstructured":"Anshel, I., Anshel, M., and Goldfeld D.: An Algebraic Method for Public-Key Cryptography, Mathematical Research Letters 6 (1999) 1\u20135","journal-title":"Mathematical Research Letters"},{"key":"2_CR3","doi-asserted-by":"crossref","unstructured":"Birman, J.: Braids, Links and Mapping Class Groups, Annals of Mathematical Studies, Study 82 Princeton University Press (1974)","DOI":"10.1515\/9781400881420"},{"key":"2_CR4","doi-asserted-by":"publisher","first-page":"322","DOI":"10.1006\/aima.1998.1761","volume":"139","author":"J. Birman","year":"1998","unstructured":"Birman, J., Ko, K. H., Lee, S. J.: A new solution to the word and conjugacy problems in the braid groups, Advances in Mathematics 139 (1998), 322\u2013353","journal-title":"Advances in Mathematics"},{"issue":"2","key":"2_CR5","first-page":"203","volume":"46","author":"D. Boneh","year":"1999","unstructured":"Boneh, D.: Twenty Years of Attacks on the RSA Cryptosystem, Notices of the American Mathematical Society, Vol 46, No. 2 (1999) 203\u2013213.","journal-title":"Notices of the American Mathematical Society"},{"key":"2_CR6","first-page":"205","volume":"123","author":"P. Dehornoy","year":"1997","unstructured":"Dehornoy, P.: A fast method for comparing braids, Advances in Mathematics 123 (1997), 205\u2013235","journal-title":"Advances in Mathematics"},{"issue":"1","key":"2_CR7","doi-asserted-by":"publisher","first-page":"83","DOI":"10.1016\/0304-3975(91)90074-C","volume":"88","author":"G. M","year":"1991","unstructured":"Garzon, M., Zalcstein, Y.: The complexity of Grigorchuk groups with applications to cryptography, Theoretical Computer Science 88:1 (1991) 83\u201398 (additional discussion may be found in M. Garzon, \u201cModels of Massive Parallelism\u201d Springer-Verlag (1995))","journal-title":"Theoretical Computer Science"},{"key":"2_CR8","doi-asserted-by":"crossref","unstructured":"Hansen, V. L.: Braids and Coverings: Selected topics, LMS, Student Texts 18 Cambridge University Press (1989)","DOI":"10.1017\/CBO9780511613098"},{"key":"2_CR9","doi-asserted-by":"crossref","unstructured":"Johnson, D. L.: Presentations of Groups: Second Edition, Cambridge University Press (1997)","DOI":"10.1017\/CBO9781139168410"},{"key":"2_CR10","doi-asserted-by":"crossref","unstructured":"Kawauchi, A.: A Survey of Knot Theory, Birhauser Verlag (1996)","DOI":"10.1007\/978-3-0348-9227-8"},{"key":"2_CR11","doi-asserted-by":"crossref","unstructured":"Ko, K. H., Lee, S. J., Cheon, J. H., Han, J. W., Kang, J. S., Park, C.: New Public-Key Cryptosystem Using Braid Groups, to appear in Crypto 2000","DOI":"10.1007\/3-540-44598-6_10"},{"key":"2_CR12","doi-asserted-by":"crossref","unstructured":"Koblitz, N.: Algebraic Aspects of Cryptography, Springer-Verlag (1998)","DOI":"10.1007\/978-3-662-03642-6"},{"key":"2_CR13","doi-asserted-by":"crossref","unstructured":"Morton, H. R.: The Multivariable Alexander Polynomial for a Closed Braid, Contemporary Mathematics 233 AMS (1999), 167\u2013172","DOI":"10.1090\/conm\/233\/03427"},{"issue":"2","key":"2_CR14","first-page":"384","volume":"48","author":"V. M. Sidelnikov","year":"1994","unstructured":"Sidel\u2019nikov, V. M., Cherepenev, M. A., Yashichenko, V. V.: Systems of open distribution of keys on the basis of noncommutative semigroups, Russian. Acad. Sci. Dokl. Math. Vol. 48 No.2 (1994) 384\u2013386","journal-title":"Systems of open distribution of keys on the basis of noncommutative semigroups"},{"key":"2_CR15","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"19","DOI":"10.1007\/3-540-39568-7_3","volume-title":"Advances in Cryptology: Proceedings of Crypto 84","author":"N. R. Wagner","year":"1985","unstructured":"Wagner, N. R., Magyarik, M. R.: A public key cryptosystem based on the word problem, Advances in Cryptology: Proceedings of Crypto 84, ed. G. R. Blakely and D. Chaum, LNCS 196, Springer Verlag (1985) 19\u201336"},{"key":"2_CR16","doi-asserted-by":"crossref","unstructured":"Welsch, D. J. A.: Complexity: Knots, Colourings and Counting, LMS, Lecture Notes Series 186 Cambridge University Press (1993)","DOI":"10.1017\/CBO9780511752506"}],"container-title":["Lecture Notes in Computer Science","Topics in Cryptology \u2014 CT-RSA 2001"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-45353-9_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,1]],"date-time":"2019-05-01T03:08:25Z","timestamp":1556680105000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-45353-9_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2001]]},"ISBN":["9783540418986","9783540453536"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/3-540-45353-9_2","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[2001]]}}}