{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T21:12:36Z","timestamp":1725484356095},"publisher-location":"Berlin, Heidelberg","reference-count":30,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540438618"},{"type":"electronic","value":"9783540454502"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2002]]},"DOI":"10.1007\/3-540-45450-0_15","type":"book-chapter","created":{"date-parts":[[2007,5,19]],"date-time":"2007-05-19T20:53:10Z","timestamp":1179607990000},"page":"176-189","source":"Crossref","is-referenced-by-count":21,"title":["A Linear Algebraic Attack on the AAFG1 Braid Group Cryptosystem"],"prefix":"10.1007","author":[{"given":"James","family":"Hughes","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2002,6,21]]},"reference":[{"key":"15_CR1","doi-asserted-by":"crossref","first-page":"1","DOI":"10.4310\/MRL.1999.v6.n3.a3","volume":"6","author":"I. Anshel","year":"1999","unstructured":"I. Anshel, M. Anshel, and D. Goldfeld. \u201cAn algebraic method for public-key cryptography\u201d. Mathematical Research Letters 6 (1999), 1\u20135","journal-title":"Mathematical Research Letters"},{"key":"15_CR2","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1007\/3-540-45353-9_2","volume-title":"Topics in Cryptology-CT-RSA2001","author":"I. Anshel","year":"2001","unstructured":"I. Anshel, M. Anshel, B. Fisher, and D. Goldfeld. \u201cNew Key Agreement Protocol in Braid Group Cryptography\u201d. Topics in Cryptology-CT-RSA2001. Lecture Notes in Computer Science, Vol. 2020. (Springer-Verlag, 2001), 13\u201327."},{"key":"15_CR3","unstructured":"I. Anshel, M. Anshel, and D. Goldfeld. \u201cA Linear Time Matrix Key Agreement Protocol\u201d. Contemporary Methods in Cryptography. Institute for Pure and Applied Mathematics (IPAM), Winter 2002. From URL http:\/\/www.ipam.ucla.edu\/programs\/cry2002\/abstracts\/cry2002_dgoldfeld_abstract.html"},{"key":"15_CR4","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1007\/BF02950718","volume":"4","author":"E. Artin","year":"1925","unstructured":"E. Artin. \u201cTheorie der Zopfe\u201d. Hamburg Abh 4 (1925), 47\u201372","journal-title":"Hamburg Abh"},{"key":"15_CR5","volume-title":"Technical Report CS-97-358","author":"A. Cleary","year":"1997","unstructured":"A. Cleary, and J. Dongarra. \u201cImplementation in ScaLAPACK of Divide-and-Conquer Algorithms for Banded and Tridiagonal Systems\u201d. Technical Report CS-97-358, University of Tennessee, Knoxville, TN, April 1997. Available as LAPACK Working Note #125 from URL http:\/\/www.netlib.org\/lapack\/lawns\/"},{"key":"15_CR6","doi-asserted-by":"publisher","first-page":"497","DOI":"10.1006\/jsco.1994.1061","volume":"18","author":"B. Barkee","year":"1994","unstructured":"BOO BARKEE, DEH CAC CAN, JULIA ECKS, THEO MORIARITY, R. F. REE. \u201cWhy You Cannot Even Hope to use Grobner Bases in Public Key Cryptography: An Open Letter to Those Who Have Not Yet Failed\u201d. J. Symbolic Computation 18 (1994), 497\u2013501","journal-title":"J. Symbolic Computation"},{"key":"15_CR7","unstructured":"S. Bigelow. \u201cHomological representation of Braid groups\u201d. Ph.D. Thesis, Dept. of Mathematics, Berkeley Univ., 2000"},{"key":"15_CR8","unstructured":"S. Bigelow. \u201cBraid Groups Are Linear\u201d. From URL http:\/\/citeseer.nj.nec.com\/465605.html"},{"key":"15_CR9","doi-asserted-by":"publisher","first-page":"397","DOI":"10.2140\/gt.1999.3.397","volume":"3","author":"S. Bigelow","year":"1999","unstructured":"S. Bigelow. \u201cThe Burau representation is not faithful for n = 5\u201d. Geometry and Topology. 3 (1999), 397\u2013404","journal-title":"Geometry and Topology"},{"key":"15_CR10","doi-asserted-by":"publisher","first-page":"245","DOI":"10.1007\/BF01406235","volume":"17","author":"E. Brieskorn","year":"1972","unstructured":"E. Brieskorn, and K. Saito. \u201cArtin Gruppen und Coxeter Gruppen\u201d. Invent. Math. 17 (1972), 245\u2013271","journal-title":"Invent. Math."},{"key":"15_CR11","volume-title":"Annals of Mathematics Studies","author":"J. Birman","year":"1975","unstructured":"J. Birman. \u201cBraids, Links, and Mapping Class Groups\u201d. Annals of Mathematics Studies. Princeton University Press, Princeton, New Jersey, 1975"},{"key":"15_CR12","doi-asserted-by":"publisher","first-page":"322","DOI":"10.1006\/aima.1998.1761","volume":"139","author":"J. Birman","year":"1998","unstructured":"J. Birman, K. Ko, and S. Lee. \u201cA new approach to the word and conjugacy problems in the braid groups\u201d. Advances in Math. 139 (1998), 322\u2013353","journal-title":"Advances in Math."},{"key":"15_CR13","unstructured":"A.V. Borovik, A.G. Myasnikov, and V. Shpilrain. \u201cMeasuring sets in infinite groups\u201d, From URL http:\/\/www.ma.umist.ac.uk\/avb\/pdf\/measurePrep.pdf"},{"key":"15_CR14","unstructured":"W. Burau. \u201c\u0168ber Zopfgruppen und gleichsinning verdrillte Verkettungen\u201d. Abh. Math. Sem. Ham. II (1936), 171\u2013178"},{"key":"15_CR15","doi-asserted-by":"publisher","first-page":"200","DOI":"10.1006\/aima.1997.1605","volume":"127","author":"P. Dehornoy","year":"1997","unstructured":"P. Dehornoy. \u201cA fast method for comparing braids\u201d. Advances in Math. 127 (1997), 200\u2013235","journal-title":"Advances in Math."},{"key":"15_CR16","doi-asserted-by":"publisher","first-page":"479","DOI":"10.1093\/qmath\/45.4.479","volume":"45","author":"E. A. Elrifai","year":"1994","unstructured":"E. A. Elrifai and H. R. Morton. \u201cAlgorithms for positive braids\u201d. Quart. J. Math. Oxford. 45 (1994), 479\u2013497","journal-title":"Quart. J. Math. Oxford"},{"key":"15_CR17","doi-asserted-by":"publisher","first-page":"235","DOI":"10.1093\/qmath\/20.1.235","volume":"20","author":"H. Garside","year":"1969","unstructured":"H. Garside. \u201cThe braid group and other groups\u201d. Quart. J. Math. Oxford. 20 (1969), 235\u2013254","journal-title":"Quart. J. Math. Oxford"},{"key":"15_CR18","unstructured":"D. Goldfeld, Private Correspondence, November 17, 2001, Message-ID: < 3BF6E636.40195953@veriomail.com >"},{"key":"15_CR19","unstructured":"S.G. Hahn, E.K. Lee, J.H. Park. \u201cThe Generalized Conjugacy Search Problem and the Burau Representation\u201d. Preprint, February, 2001, From URL http:\/\/crypt.kaist.ac.kr\/pre_papers\/hlp_revised1.ps"},{"key":"15_CR20","unstructured":"J. Hughes, and A. Tannenbaum. \u201cLength-based attacks for certain group based encryption rewriting systems\u201d. Institute for Mathematics and Its Applications, April, 2000, Minneapolis, MN, Preprint number 1696"},{"key":"15_CR21","unstructured":"J. Hughes. \u201cThe LeftSSS attack on Ko-Lee-Cheon-Han-Kang-Park Key Agreement Protocol in B45\u201d, Rump Session Crypto 2000, Santa Barbara, CA, May, 2000. From URL http:\/\/www.network.com\/hughes\/Crypt2000.pdf"},{"key":"15_CR22","volume-title":"Technical Report","author":"K. Ko","year":"2000","unstructured":"K. Ko, S. Lee, J. Cheon, J. Han, J. Kang, and C. Park. \u201cNew public-key cryptosystem using braid groups\u201d. Technical Report, Korea Advance Institute of Science and Technology, Taejon, Korea, February 2000"},{"key":"15_CR23","doi-asserted-by":"publisher","first-page":"141","DOI":"10.1007\/BF02097660","volume":"135","author":"R.J. Lawrence","year":"1990","unstructured":"R.J. Lawrence. \u201cHomological representations of the Hecke algebra\u201d. Comm. Math. Phys. 135 (1990), pp. 141\u2013191.","journal-title":"Comm. Math. Phys."},{"key":"15_CR24","doi-asserted-by":"publisher","first-page":"439","DOI":"10.1016\/0040-9383(93)90030-Y","volume":"32","author":"D. Long","year":"1993","unstructured":"D. Long and M. Paton. \u201cThe Burau representation is not faithful for n=6\u201d. Topology 32 (1993), 439\u2013447.","journal-title":"Topology"},{"key":"15_CR25","doi-asserted-by":"publisher","first-page":"594","DOI":"10.1109\/TIT.1984.1056942","volume":"30","author":"A. Odlyzko","year":"1984","unstructured":"A. Odlyzko. \u201cCryptanalytic attacks on the multiplicative knapsack cryptosystem and on Shamir\u2019s fast signature scheme\u201d. IEEE Trans. Inform. Theory. 30 (1984), 594\u2013601.","journal-title":"IEEE Trans. Inform. Theory"},{"key":"15_CR26","doi-asserted-by":"crossref","unstructured":"R.L. Rivest. \u201cCryptography\u201d, Chapter 13 of Handbook of Theoretical Computer Science, (ed. J. Van Leeuwen). 1 (Elsevier, 1990), 717\u2013755. http:\/\/theory.lcs.mit.edu\/rivest\/Rivest-Cryptography.pdf","DOI":"10.1016\/B978-0-444-88071-0.50018-7"},{"key":"15_CR27","doi-asserted-by":"crossref","first-page":"103","DOI":"10.1007\/s00145-001-0014-7","volume":"15","author":"M. Abadi","year":"2002","unstructured":"M. Abadi, and P. Rogaway. \u201cReconciling Two Views of Cryptography (The Computational Soundness of Formal Encryption)\u201d. Journal of Cryptology. 15 (2002), 103\u2013127","journal-title":"Journal of Cryptology"},{"key":"15_CR28","unstructured":"V Shpilrain. \u201cAverage Case Complexity of the Word and Conjugacy Problems in the Braid Groups\u201d. From URL http:\/\/zebra.sci.ccny.cuny.edu\/web\/shpil\/complexity.ps"},{"key":"15_CR29","unstructured":"N. Franco, and J. Gonzalez-Meneses. \u201cComputation of Normalizers in Braid groups and Garside Groups\u201d. From URL http:\/\/xxx.lanl.gov\/abs\/math.GT\/0201243"},{"key":"15_CR30","series-title":"Lect Notes Comput Sci","first-page":"470","volume-title":"Advances in Cryptology: Proceedings of AsiaCrypt\u201991","author":"A. Joux","year":"1991","unstructured":"A. Joux and J. Stern. \u201cCryptanalysis of another knapsack cryptosystem\u201d. Advances in Cryptology: Proceedings of AsiaCrypt\u201991, Volume 739 Lecture Notes in Computer Science, (Springer Verlag, 1991), 470\u2013476"}],"container-title":["Lecture Notes in Computer Science","Information Security and Privacy"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-45450-0_15","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,4,28]],"date-time":"2019-04-28T05:39:33Z","timestamp":1556429973000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-45450-0_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2002]]},"ISBN":["9783540438618","9783540454502"],"references-count":30,"URL":"https:\/\/doi.org\/10.1007\/3-540-45450-0_15","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[2002]]}}}