{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,6]],"date-time":"2025-12-06T04:54:43Z","timestamp":1764996883227},"publisher-location":"Berlin, Heidelberg","reference-count":17,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540406747"},{"type":"electronic","value":"9783540451464"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2003]]},"DOI":"10.1007\/978-3-540-45146-4_13","type":"book-chapter","created":{"date-parts":[[2010,6,22]],"date-time":"2010-06-22T17:51:19Z","timestamp":1277229079000},"page":"212-225","source":"Crossref","is-referenced-by-count":34,"title":["A Polynomial Time Algorithm for the Braid Diffie-Hellman Conjugacy Problem"],"prefix":"10.1007","author":[{"given":"Jung Hee","family":"Cheon","sequence":"first","affiliation":[]},{"given":"Byungheup","family":"Jun","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"13_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1007\/3-540-45353-9_2","volume-title":"Topics in Cryptology - CT-RSA 2001","author":"I. Anshel","year":"2001","unstructured":"Anshel, I., Anshel, M., Fisher, B., Goldfeld, D.: New Key Agreement Protocols in Braid Group Cryptography. In: Naccache, D. (ed.) CT-RSA 2001. LNCS, vol.\u00a02020, pp. 13\u201327. Springer, Heidelberg (2001)"},{"issue":"3-4","key":"13_CR2","doi-asserted-by":"crossref","first-page":"287","DOI":"10.4310\/MRL.1999.v6.n3.a3","volume":"6","author":"I. Anshel","year":"1999","unstructured":"Anshel, I., Anshel, M., Goldfeld, D.: An Algebraic Method for Public-Key Cryptography. Math. Res. Lett.\u00a06(3-4), 287\u2013291 (1999)","journal-title":"Math. Res. Lett."},{"key":"13_CR3","doi-asserted-by":"publisher","first-page":"322","DOI":"10.1006\/aima.1998.1761","volume":"139","author":"J. Birman","year":"1998","unstructured":"Birman, J., Ko, K., Lee, S.: A New Approach to the Word and Conjugacy Problem in the Braid Groups. Advances in Mathematics\u00a0139, 322\u2013353 (1998)","journal-title":"Advances in Mathematics"},{"key":"13_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"144","DOI":"10.1007\/3-540-45682-1_9","volume-title":"Advances in Cryptology - ASIACRYPT 2001","author":"J. Cha","year":"2001","unstructured":"Cha, J., Koh, K., Lee, S., Han, J., Cheon, J.: An Efficient Implementations of Braid Groups. In: Boyd, C. (ed.) ASIACRYPT 2001. LNCS, vol.\u00a02248, pp. 144\u2013156. Springer, Heidelberg (2001)"},{"key":"13_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/3-540-46035-7_1","volume-title":"Advances in Cryptology - EUROCRYPT 2002","author":"R. Gennaro","year":"2002","unstructured":"Gennaro, R., Micciancio, D.: Cryptanalysis of a Pseudorandom Generator Based on Braid Groups. In: Knudsen, L.R. (ed.) EUROCRYPT 2002. LNCS, vol.\u00a02332, pp. 1\u201313. Springer, Heidelberg (2002)"},{"key":"13_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"187","DOI":"10.1007\/3-540-36288-6_14","volume-title":"Public Key Cryptography - PKC 2003","author":"D. Hofheinz","year":"2002","unstructured":"Hofheinz, D., Steinwandt, R.: A Practical Attack on Some Braid Group Based Cryptography Primitives. In: Desmedt, Y.G. (ed.) PKC 2003. LNCS, vol.\u00a02567, pp. 187\u2013198. Springer, Heidelberg (2002)"},{"key":"13_CR7","volume-title":"An introduction to the Theory of Numbers","author":"G.H. Hardy","year":"1978","unstructured":"Hardy, G.H., Wright, E.M.: An introduction to the Theory of Numbers. Oxford Univ. Press, Oxford (1978)"},{"key":"13_CR8","unstructured":"K. Koh et. al New Signature Scheme Using Conjugacy Problem (2002) (Preprint)"},{"key":"13_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"166","DOI":"10.1007\/3-540-44598-6_10","volume-title":"Advances in Cryptology - CRYPTO 2000","author":"K. Ko","year":"2000","unstructured":"Ko, K., Lee, S., Cheon, J., Han, J., Kang, J., Park, C.: New Pulic-key Cryptosystem using Braid Groups. In: Bellare, M. (ed.) CRYPTO 2000. LNCS, vol.\u00a01880, pp. 166\u2013183. Springer, Heidelberg (2000)"},{"key":"13_CR10","doi-asserted-by":"publisher","first-page":"451","DOI":"10.1007\/s002220000088","volume":"142","author":"D. Krammer","year":"2002","unstructured":"Krammer, D.: The Braid group B4 is Linear. Inventiones Mathematics\u00a0142, 451\u2013486 (2002)","journal-title":"Inventiones Mathematics"},{"key":"13_CR11","doi-asserted-by":"publisher","first-page":"131","DOI":"10.2307\/3062152","volume":"155","author":"D. Krammer","year":"2002","unstructured":"Krammer, D.: Braid groups are Linear. Annals of Mathematics\u00a0155, 131\u2013156 (2002)","journal-title":"Annals of Mathematics"},{"key":"13_CR12","unstructured":"Lee, S.: The Trapdoor Oneway Functions in Braid Groups. In: Workshop on Algbraic Methods in Cryptography, Slides are available in \n                    \n                      http:\/\/knot.kaist.ac.kr\/sjiee"},{"key":"13_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"14","DOI":"10.1007\/3-540-46035-7_2","volume-title":"Advances in Cryptology - EUROCRYPT 2002","author":"S. Lee","year":"2002","unstructured":"Lee, S., Lee, E.: Potential Weaknesses of the Commutator Key Agreement Protocol Based on Braid Groups. In: Knudsen, L.R. (ed.) EUROCRYPT 2002. LNCS, vol.\u00a02332, pp. 14\u201328. Springer, Heidelberg (2002)"},{"key":"13_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"477","DOI":"10.1007\/3-540-39200-9_30","volume-title":"Advances in Cryptology \u2013 EUROCRPYT 2003","author":"E. Lee","year":"2003","unstructured":"Lee, E., Park, J.: Cryptanalysis of the Public-key Encryption based on Braid Groups. In: Biham, E. (ed.) EUROCRYPT 2003. LNCS, vol.\u00a02656, pp. 477\u2013490. Springer, Heidelberg (2003)"},{"key":"13_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"486","DOI":"10.1007\/3-540-44647-8_29","volume-title":"Advances in Cryptology - CRYPTO 2001","author":"E. Lee","year":"2001","unstructured":"Lee, E., Lee, S.J., Hahn, S.G.: Pseudorandomness from Braid Groups. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol.\u00a02139, pp. 486\u2013502. Springer, Heidelberg (2001)"},{"key":"13_CR16","volume-title":"Handbook of Applied Cryptography","author":"A. Menezes","year":"1997","unstructured":"Menezes, A., Oorschot, P., Vanston, S.: Handbook of Applied Cryptography. CRC Press, Boca Raton (1997)"},{"key":"13_CR17","unstructured":"Strang, G.: Linear Algebra and its Applications. Harcourt, New York (1986)"}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology - CRYPTO 2003"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-45146-4_13","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,3,14]],"date-time":"2019-03-14T21:20:25Z","timestamp":1552598425000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-45146-4_13"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2003]]},"ISBN":["9783540406747","9783540451464"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-45146-4_13","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2003]]}}}