{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T05:00:30Z","timestamp":1725512430760},"publisher-location":"Berlin, Heidelberg","reference-count":6,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540797081"},{"type":"electronic","value":"9783540797098"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-79709-8_26","type":"book-chapter","created":{"date-parts":[[2008,5,13]],"date-time":"2008-05-13T14:33:17Z","timestamp":1210689197000},"page":"252-260","source":"Crossref","is-referenced-by-count":1,"title":["Public Key Encryption and Encryption Emulation Attacks"],"prefix":"10.1007","author":[{"given":"Denis","family":"Osin","sequence":"first","affiliation":[]},{"given":"Vladimir","family":"Shpilrain","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"26_CR1","first-page":"137","volume":"33","author":"J.-C. Birget","year":"2006","unstructured":"Birget, J.-C., Magliveras, S., Sramka, M.: On public-key cryptosystems based on combinatorial group theory. Tatra Mountains Mathematical Publications\u00a033, 137\u2013148 (2006)","journal-title":"Tatra Mountains Mathematical Publications"},{"key":"26_CR2","series-title":"Lecture Notes in Computer Science","first-page":"19","volume-title":"Advances in Cryptology","author":"M.R. Magyarik","year":"1985","unstructured":"Magyarik, M.R., Wagner, N.R.: A Public Key Cryptosystem Based on the Word Problem. In: Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol.\u00a0196, pp. 19\u201336. Springer, Heidelberg (1985)"},{"key":"26_CR3","doi-asserted-by":"crossref","DOI":"10.1201\/9781439821916","volume-title":"Handbook of Applied Cryptography","author":"A.J. Menezes","year":"1996","unstructured":"Menezes, A.J.: Handbook of Applied Cryptography. CRC Press, Boca Raton (1996)"},{"doi-asserted-by":"crossref","unstructured":"Miller, C.F., Schupp, P.: Some presentations of the trivial group. In: Proceedings of the AMS-IMS-SIAM Joint Summer Research Conference on Geometric Group Theory and Computer Science. Contemp. Math., Amer. Math. Soc., vol.\u00a0250, pp. 113\u2013115 (1999)","key":"26_CR4","DOI":"10.1090\/conm\/250\/03848"},{"key":"26_CR5","doi-asserted-by":"crossref","first-page":"183","DOI":"10.1090\/conm\/296\/05074","volume":"296","author":"A.D. Myasnikov","year":"2002","unstructured":"Myasnikov, A.D., Myasnikov, A.G., Shpilrain, V.: On the Andrews-Curtis equivalence. Contemp. Math., Amer. Math. Soc.\u00a0296, 183\u2013198 (2002)","journal-title":"Contemp. Math., Amer. Math. Soc."},{"unstructured":"Shpilrain, V., Zapata, G.: Using decision problems in public key cryptography, (preprint) \n                    \n                      http:\/\/www.sci.ccny.cuny.edu\/~shpil\/wppkc.pdf","key":"26_CR6"}],"container-title":["Lecture Notes in Computer Science","Computer Science \u2013 Theory and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-79709-8_26.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T11:28:49Z","timestamp":1619522929000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-79709-8_26"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540797081","9783540797098"],"references-count":6,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-79709-8_26","relation":{},"subject":[]}}