{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,28]],"date-time":"2026-02-28T12:57:59Z","timestamp":1772283479768,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":16,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783662530177","type":"print"},{"value":"9783662530184","type":"electronic"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-662-53018-4_7","type":"book-chapter","created":{"date-parts":[[2016,7,20]],"date-time":"2016-07-20T10:02:12Z","timestamp":1469008932000},"page":"179-189","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":9,"title":["A Practical Cryptanalysis of the Algebraic Eraser"],"prefix":"10.1007","author":[{"given":"Adi","family":"Ben-Zvi","sequence":"first","affiliation":[]},{"given":"Simon R.","family":"Blackburn","sequence":"additional","affiliation":[]},{"given":"Boaz","family":"Tsaban","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,7,21]]},"reference":[{"key":"7_CR1","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1090\/conm\/418\/07943","volume":"418","author":"I Anshel","year":"2006","unstructured":"Anshel, I., Anshel, M., Goldfeld, D., Lemieux, S.: Key agreement, the algebraic eraser\u2122 and lightweight cryptography. Contemp. Math. 418, 1\u201334 (2006)","journal-title":"Contemp. Math."},{"key":"7_CR2","unstructured":"Anshel, I., Atkins, D., Goldfeld, D., Gunnells, P.: Defeating the Ben-Zvi, Blackburn, and Tsaban attack on the algebraic eraser. IACR ePrint 2016\/044"},{"key":"7_CR3","unstructured":"Atkins, D., Gunnells, P.: Algebraic Eraser\u2122: a lightweight, efficient asymmetric key agreement protocol for use in no-power, low-power, and IoT devices. In: NIST Lightweight Cryptography Workshop, 20 July 2015. \n                      http:\/\/www.nist.gov\/itl\/csd\/ct\/lwc_workshop2015.cfm"},{"key":"7_CR4","unstructured":"Bahr, F., Boehm, M., Franke, J., Kleinjung, T.: RSA200. \n                      http:\/\/www.crypto-world.com\/announcements\/rsa200.txt"},{"key":"7_CR5","unstructured":"Ben-Zvi, A., Kalka, A., Tsaban, B.: Cryptanalysis via algebraic spans. IACR ePrint 2014\/041"},{"key":"7_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/978-3-319-39555-5_1","volume-title":"Applied Cryptography and Network Security","author":"SR Blackburn","year":"2016","unstructured":"Blackburn, S.R., Robshaw, M.J.B.: On the security of the algebraic eraser tag authentication protocol. In: Manulis, M., Sadeghi, A.-R., Schneider, S. (eds.) ACNS 2016. LNCS, vol. 9696, pp. 3\u201317. Springer, Heidelberg (2016). doi:\n                      10.1007\/978-3-319-39555-5_1"},{"key":"7_CR7","doi-asserted-by":"publisher","first-page":"235","DOI":"10.1006\/jsco.1996.0125","volume":"24","author":"W Bosma","year":"1997","unstructured":"Bosma, W., Cannon, J., Playoust, C.: The Magma algebra system. I. The user language. J. Symb.Comput. 24, 235\u2013265 (1997)","journal-title":"J. Symb.Comput."},{"key":"7_CR8","unstructured":"Cryptography Stack Exchange: Status of Algebraic Eraser Key Exchange? \n                      http:\/\/crypto.stackexchange.com\/questions\/30644\/status-of-algebraic-eraser-key-exchange\n                      \n                    . Accessed 5 Feb 2016"},{"key":"7_CR9","unstructured":"Goldfeld, D., Gunnells, P.: Defeating the Kalka-Teicher-Tsaban linear algebra attack on the algebraic eraser. \n                      arXiv:1202.0598\n                      \n                    , February 2012"},{"key":"7_CR10","unstructured":"Gunnells, P.: On the cryptanalysis of the generalized simultaneous conjugacy search problem and the security of the algebraic eraser. \n                      arXiv:1105.1141\n                      \n                    , May 2011"},{"key":"7_CR11","doi-asserted-by":"publisher","first-page":"57","DOI":"10.1016\/j.aam.2012.03.001","volume":"49","author":"A Kalka","year":"2012","unstructured":"Kalka, A., Teicher, M., Tsaban, B.: Short expressions of permutations as products and cryptanalysis of the algebraic eraser. Adv. Appl. Math. 49, 57\u201376 (2012)","journal-title":"Adv. Appl. Math."},{"key":"7_CR12","series-title":"Graduate Texts in Mathematics","doi-asserted-by":"crossref","DOI":"10.1007\/978-0-387-68548-9","volume-title":"Braid Groups","author":"C Kassel","year":"2008","unstructured":"Kassel, C., Turaev, V.: Braid Groups. Graduate Texts in Mathematics, vol. 247. Springer, New York (2008)"},{"key":"7_CR13","first-page":"63","volume":"1","author":"A Myasnikov","year":"2009","unstructured":"Myasnikov, A., Ushakov, A.: Cryptanalysis of the Anshel-Anshel-Goldfeld-Lemieux key agreement protocol. Groups Complex. Cryptol. 1, 63\u201375 (2009)","journal-title":"Groups Complex. Cryptol."},{"key":"7_CR14","unstructured":"National Institute of Stadards and Technology: Digital Signature Standard (DSS). Federal Information Processing Standards Publication FIPS PUB 186\u20134, July 2013. \n                      http:\/\/nvlpubs.nist.gov\/nistpubs\/FIPS\/NIST.FIPS.186-4.pdf"},{"key":"7_CR15","doi-asserted-by":"publisher","first-page":"120","DOI":"10.1145\/359340.359342","volume":"21","author":"R Rivest","year":"1978","unstructured":"Rivest, R., Shamir, A., Adleman, L.: A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM 21, 120\u2013126 (1978)","journal-title":"Commun. ACM"},{"key":"7_CR16","doi-asserted-by":"publisher","first-page":"601","DOI":"10.1007\/s00145-013-9170-9","volume":"28","author":"B Tsaban","year":"2015","unstructured":"Tsaban, B.: Polynomial-time solutions of computational problems in noncommutative algebraic cryptography. J. Cryptol. 28, 601\u2013622 (2015)","journal-title":"J. Cryptol."}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2013 CRYPTO 2016"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-662-53018-4_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,7,20]],"date-time":"2020-07-20T00:03:50Z","timestamp":1595203430000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-662-53018-4_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783662530177","9783662530184"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-662-53018-4_7","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016]]},"assertion":[{"value":"21 July 2016","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"CRYPTO","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Annual International Cryptology Conference","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Santa Barbara","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"USA","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2016","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14 August 2016","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18 August 2016","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"36","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"crypto2016","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}