{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,25]],"date-time":"2026-01-25T21:41:46Z","timestamp":1769377306796,"version":"3.49.0"},"publisher-location":"Berlin, Heidelberg","reference-count":12,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540797081","type":"print"},{"value":"9783540797098","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-79709-8_29","type":"book-chapter","created":{"date-parts":[[2008,5,13]],"date-time":"2008-05-13T14:33:17Z","timestamp":1210689197000},"page":"283-288","source":"Crossref","is-referenced-by-count":30,"title":["Cryptanalysis of Stickel\u2019s Key Exchange Scheme"],"prefix":"10.1007","author":[{"given":"Vladimir","family":"Shpilrain","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"29_CR1","doi-asserted-by":"publisher","first-page":"323","DOI":"10.1016\/j.aam.2005.03.002","volume":"35","author":"D. Garber","year":"2005","unstructured":"Garber, D., Kaplan, S., Teicher, M., Tsaban, B., Vishne, U.: Probabilistic solutions of equations in the braid group. Advances in Applied Mathematics\u00a035, 323\u2013334 (2005)","journal-title":"Advances in Applied Mathematics"},{"key":"29_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"166","DOI":"10.1007\/3-540-44598-6_10","volume-title":"Advances in Cryptology - CRYPTO 2000","author":"K.H. Ko","year":"2000","unstructured":"Ko, K.H., Lee, S.J., Cheon, J.H., Han, J.W., Kang, J., Park, C.: New public-key cryptosystem using braid groups. In: Bellare, M. (ed.) CRYPTO 2000. LNCS, vol.\u00a01880, pp. 166\u2013183. Springer, Heidelberg (2000)"},{"key":"29_CR3","doi-asserted-by":"crossref","DOI":"10.1201\/9781439821916","volume-title":"Handbook of Applied Cryptography","author":"A.J. Menezes","year":"1996","unstructured":"Menezes, A.J.: Handbook of Applied Cryptography. CRC Press, Boca Raton (1996)"},{"key":"29_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"86","DOI":"10.1007\/11535218_6","volume-title":"Advances in Cryptology \u2013 CRYPTO 2005","author":"A.G. Myasnikov","year":"2005","unstructured":"Myasnikov, A.G., Shpilrain, V., Ushakov, A.: A practical attack on some braid group based cryptographic protocols. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol.\u00a03621, pp. 86\u201396. Springer, Heidelberg (2005)"},{"key":"29_CR5","doi-asserted-by":"crossref","unstructured":"Ruinskiy, D., Shamir, A., Tsaban, B.: Cryptanalysis of group-based key agreement protocols using subgroup distance functions. In: Okamoto, T., Wang, X. (eds.) PKC 2007. LNCS, vol.\u00a04450, pp. 61\u201375. Springer, Heidelberg (2007)","DOI":"10.1007\/978-3-540-71677-8_5"},{"key":"29_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"22","DOI":"10.1007\/11927587_4","volume-title":"Information Security and Cryptology \u2013 ICISC 2006","author":"V. Shpilrain","year":"2006","unstructured":"Shpilrain, V.: Hashing with polynomials. In: Rhee, M.S., Lee, B. (eds.) ICISC 2006. LNCS, vol.\u00a04296, pp. 22\u201328. Springer, Heidelberg (2006)"},{"key":"29_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"151","DOI":"10.1007\/11496137_11","volume-title":"Applied Cryptography and Network Security","author":"V. Shpilrain","year":"2005","unstructured":"Shpilrain, V., Ushakov, A.: Thompson\u2019s group and public key cryptography. In: Ioannidis, J., Keromytis, A.D., Yung, M. (eds.) ACNS 2005. LNCS, vol.\u00a03531, pp. 151\u2013164. Springer, Heidelberg (2005)"},{"key":"29_CR8","doi-asserted-by":"crossref","first-page":"161","DOI":"10.1090\/conm\/418\/07954","volume":"418","author":"V. Shpilrain","year":"2006","unstructured":"Shpilrain, V., Ushakov, A.: A new key exchange protocol based on the decomposition problem. Contemp. Math., Amer. Math. Soc.\u00a0418, 161\u2013167 (2006)","journal-title":"Contemp. Math., Amer. Math. Soc."},{"key":"#cr-split#-29_CR9.1","unstructured":"Sidelnikov, V.M., Cherepnev, M.A., Yashcenko, V.Y.: Systems of open distribution of keys on the basis of noncommutative semigroups. Ross. Acad. Nauk Dokl.\u00a0332, (1993);"},{"key":"#cr-split#-29_CR9.2","unstructured":"English translation: Russian Acad. Sci. Dokl. Math. 48, 384\u2013386 (1994)"},{"key":"29_CR10","unstructured":"Sramka, M.: On the Security of Stickel\u2019s Key Exchange Scheme (preprint)"},{"key":"29_CR11","doi-asserted-by":"crossref","unstructured":"Stickel, E.: A New Method for Exchanging Secret Keys. In: Proc. of the Third International Conference on Information Technology and Applications (ICITA 2005), vol.\u00a02, pp. 426\u2013430 (2005)","DOI":"10.1109\/ICITA.2005.33"}],"container-title":["Lecture Notes in Computer Science","Computer Science \u2013 Theory and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-79709-8_29.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T11:28:50Z","timestamp":1619522930000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-79709-8_29"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540797081","9783540797098"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-79709-8_29","relation":{},"subject":[]}}