{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T15:25:40Z","timestamp":1742916340503,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":16,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540689133"},{"type":"electronic","value":"9783540689140"}],"license":[{"start":{"date-parts":[[2008,1,1]],"date-time":"2008-01-01T00:00:00Z","timestamp":1199145600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008]]},"DOI":"10.1007\/978-3-540-68914-0_22","type":"book-chapter","created":{"date-parts":[[2008,5,26]],"date-time":"2008-05-26T04:58:06Z","timestamp":1211777886000},"page":"366-372","source":"Crossref","is-referenced-by-count":12,"title":["An Authentication Scheme Based on the Twisted Conjugacy Problem"],"prefix":"10.1007","author":[{"given":"Vladimir","family":"Shpilrain","sequence":"first","affiliation":[]},{"given":"Alexander","family":"Ushakov","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"22_CR1","doi-asserted-by":"crossref","first-page":"287","DOI":"10.4310\/MRL.1999.v6.n3.a3","volume":"6","author":"I. Anshel","year":"1999","unstructured":"Anshel, I., Anshel, M., Goldfeld, D.: An algebraic method for public-key cryptography. Math. Res. Lett.\u00a06, 287\u2013291 (1999)","journal-title":"Math. Res. Lett."},{"key":"22_CR2","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4612-0265-3","volume-title":"Polynomial and Matrix Computations. vol. 1: Fundamental Algorithms","author":"D. Bini","year":"1994","unstructured":"Bini, D., Pan, V.: Polynomial and Matrix Computations. vol. 1: Fundamental Algorithms. Birkh\u00e4user, Basel (1994)"},{"key":"22_CR3","doi-asserted-by":"crossref","first-page":"221","DOI":"10.4171\/GGD\/12","volume":"1","author":"J. Birman","year":"2007","unstructured":"Birman, J., Gebhardt, V., Gonzalez-Meneses, J.: Conjugacy in Garside groups I: Cyclings, powers, and rigidity. Groups, Geometry and Dynamics\u00a01, 221\u2013279 (2007)","journal-title":"Groups, Geometry and Dynamics"},{"key":"22_CR4","doi-asserted-by":"crossref","first-page":"13","DOI":"10.4171\/GGD\/30","volume":"2","author":"J. Birman","year":"2008","unstructured":"Birman, J., Gebhardt, V., Gonzalez-Meneses, J.: Conjugacy in Garside groups II: Structure of the ultra summit set. Groups, Geometry and Dynamics\u00a02, 13\u201361 (2008)","journal-title":"Groups, Geometry and Dynamics"},{"key":"22_CR5","doi-asserted-by":"publisher","first-page":"787","DOI":"10.1112\/S0024609306018674","volume":"38","author":"O. Bogopolski","year":"2006","unstructured":"Bogopolski, O., Martino, A., Maslakova, O., Ventura, E.: Free-by-cyclic groups have solvable conjugacy problem. Bull. London Math. Soc.\u00a038, 787\u2013794 (2006)","journal-title":"Bull. London Math. Soc."},{"key":"22_CR6","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-662-03338-8","volume-title":"Algebraic Complexity Theory","author":"P. B\u00fcrgisser","year":"1997","unstructured":"B\u00fcrgisser, P., Clausen, M., Shokrollahi, M.A., Lickteig, T.: Algebraic Complexity Theory. Springer, Heidelberg (1997)"},{"key":"22_CR7","doi-asserted-by":"crossref","first-page":"75","DOI":"10.1090\/conm\/418\/07947","volume":"418","author":"D. Garber","year":"2006","unstructured":"Garber, D., Kaplan, S., Teicher, M., Tsaban, B., Vishne, U.: Length-based conjugacy search in the Braid group. Contemp. Math., Amer. Math. Soc.\u00a0418, 75\u201387 (2006)","journal-title":"Contemp. Math., Amer. Math. Soc."},{"key":"22_CR8","doi-asserted-by":"publisher","first-page":"323","DOI":"10.1016\/j.aam.2005.03.002","volume":"35","author":"D. Garber","year":"2005","unstructured":"Garber, D., Kaplan, S., Teicher, M., Tsaban, B., Vishne, U.: Probabilistic solutions of equations in the braid group. Advances in Applied Mathematics\u00a035, 323\u2013334 (2005)","journal-title":"Advances in Applied Mathematics"},{"key":"22_CR9","volume-title":"Modern Computer Algebra","author":"J. Gathen von zur","year":"2003","unstructured":"von zur Gathen, J., Gerhard, J.: Modern Computer Algebra, 2nd edn. Cambridge University Press, Cambridge (2003)","edition":"2"},{"key":"22_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"187","DOI":"10.1007\/3-540-36288-6_14","volume-title":"Public Key Cryptography - PKC 2003","author":"D. Hofheinz","year":"2002","unstructured":"Hofheinz, D., Steinwandt, R.: A practical attack on some braid group based cryptographic primitives. In: Desmedt, Y.G. (ed.) PKC 2003. LNCS, vol.\u00a02567, pp. 187\u2013198. Springer, Heidelberg (2002)"},{"key":"22_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"166","DOI":"10.1007\/3-540-44598-6_10","volume-title":"Advances in Cryptology - CRYPTO 2000","author":"K.H. Ko","year":"2000","unstructured":"Ko, K.H., Lee, S.J., Cheon, J.H., Han, J.W., Kang, J., Park, C.: New public-key cryptosystem using braid groups. In: Bellare, M. (ed.) CRYPTO 2000. LNCS, vol.\u00a01880, pp. 166\u2013183. Springer, Heidelberg (2000)"},{"key":"22_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"76","DOI":"10.1007\/978-3-540-71677-8_6","volume-title":"Public Key Cryptography \u2013 PKC 2007","author":"A.D. Myasnikov","year":"2007","unstructured":"Myasnikov, A.D., Ushakov, A.: Length based attack in braid groups. In: Okamoto, T., Wang, X. (eds.) PKC 2007. LNCS, vol.\u00a04450, pp. 76\u201388. Springer, Heidelberg (2007)"},{"key":"22_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1007\/978-3-540-71677-8_5","volume-title":"Public Key Cryptography \u2013 PKC 2007","author":"D. Ruinskiy","year":"2007","unstructured":"Ruinskiy, D., Shamir, A., Tsaban, B.: Cryptanalysis of group-based key agreement protocols using subgroup distance functions. In: Okamoto, T., Wang, X. (eds.) PKC 2007. LNCS, vol.\u00a04450, pp. 61\u201375. Springer, Heidelberg (2007)"},{"key":"22_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"22","DOI":"10.1007\/11927587_4","volume-title":"Information Security and Cryptology \u2013 ICISC 2006","author":"V. Shpilrain","year":"2006","unstructured":"Shpilrain, V.: Hashing with polynomials. In: Rhee, M.S., Lee, B. (eds.) ICISC 2006. LNCS, vol.\u00a04296, pp. 22\u201328. Springer, Heidelberg (2006)"},{"key":"22_CR15","doi-asserted-by":"publisher","first-page":"420","DOI":"10.1016\/j.dam.2005.03.015","volume":"154-2","author":"H. Sibert","year":"2006","unstructured":"Sibert, H., Dehornoy, P., Girault, M.: Entity authentication schemes using braid word reduction. Discrete Applied Math.\u00a0154-2, 420\u2013436 (2006)","journal-title":"Discrete Applied Math."},{"key":"22_CR16","unstructured":"Fel\u2019shtyn, A., Troitsky, E.: Twisted conjugacy separable groups, preprint, \n                  \n                    http:\/\/arxiv.org\/abs\/math\/0606764"}],"container-title":["Lecture Notes in Computer Science","Applied Cryptography and Network Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-68914-0_22","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,19]],"date-time":"2019-05-19T11:32:53Z","timestamp":1558265573000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-68914-0_22"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008]]},"ISBN":["9783540689133","9783540689140"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-68914-0_22","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2008]]}}}