{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,11]],"date-time":"2026-03-11T20:46:36Z","timestamp":1773261996424,"version":"3.50.1"},"reference-count":37,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2013,11,15]],"date-time":"2013-11-15T00:00:00Z","timestamp":1384473600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Cryptol"],"published-print":{"date-parts":[[2015,7]]},"DOI":"10.1007\/s00145-013-9170-9","type":"journal-article","created":{"date-parts":[[2013,11,14]],"date-time":"2013-11-14T16:55:56Z","timestamp":1384448156000},"page":"601-622","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":31,"title":["Polynomial-Time Solutions of Computational Problems in Noncommutative-Algebraic Cryptography"],"prefix":"10.1007","volume":"28","author":[{"given":"Boaz","family":"Tsaban","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2013,11,15]]},"reference":[{"key":"9170_CR1","doi-asserted-by":"crossref","unstructured":"B. An, K. Ko, A\u00a0family of pseudo-Anosov braids with large conjugacy invariant sets. \n                    arXiv:1203.2320\n                    \n                   (2012)","DOI":"10.1142\/S0218216513500259"},{"key":"9170_CR2","doi-asserted-by":"publisher","first-page":"287","DOI":"10.4310\/MRL.1999.v6.n3.a3","volume":"6","author":"I. Anshel","year":"1999","unstructured":"I. Anshel, M. Anshel, D. Goldfeld, An algebraic method for public-key cryptography. Math. Res. Lett.\n                  6, 287\u2013291 (1999)","journal-title":"Math. Res. Lett."},{"key":"9170_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"13","DOI":"10.1007\/3-540-45353-9_2","volume-title":"CT-RSA 2001","author":"I. Anshel","year":"2001","unstructured":"I. Anshel, M. Anshel, B. Fisher, D. Goldfeld, New key agreement protocols in braid group cryptography, in CT-RSA 2001. Lecture Notes in Computer Science, vol.\u00a02020 (2001), pp. 13\u201327"},{"key":"9170_CR4","first-page":"55","volume-title":"ACM STOC","author":"L. Babai","year":"2009","unstructured":"L. Babai, R. Beals, \u00c1. Seress, Polynomial-time theory of matrix groups, in ACM STOC (2009), pp. 55\u201364"},{"key":"9170_CR5","doi-asserted-by":"publisher","first-page":"471","DOI":"10.1090\/S0894-0347-00-00361-1","volume":"14","author":"S. Bigelow","year":"2001","unstructured":"S. Bigelow, Braid groups are linear. J. Am. Math. Soc.\n                  14, 471\u2013486 (2001)","journal-title":"J. Am. Math. Soc."},{"key":"9170_CR6","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1016\/B978-044451452-3\/50003-4","volume-title":"Handbook of Knot Theory","author":"J. Birman","year":"2005","unstructured":"J. Birman, T. Brendle, Braids: a survey, in Handbook of Knot Theory, ed. by W. Menasco, M. Thistlethwaite (Elsevier, Amsterdam, 2005), pp. 19\u2013103"},{"key":"9170_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"144","DOI":"10.1007\/3-540-45682-1_9","volume-title":"ASIACRYPT 2001","author":"J. Cha","year":"2001","unstructured":"J. Cha, K. Ko, S. Lee, J. Han, J. Cheon, An efficient implementation of braid groups, in ASIACRYPT 2001. Lecture Notes in Computer Science, vol.\u00a02248 (2001), pp. 144\u2013156"},{"key":"9170_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"212","DOI":"10.1007\/978-3-540-45146-4_13","volume-title":"CRYPTO 2003","author":"J. Cheon","year":"2003","unstructured":"J. Cheon, B. Jun, A\u00a0polynomial time algorithm for the braid Diffie\u2013Hellman conjugacy problem, in CRYPTO 2003. Lecture Notes in Computer Science, vol.\u00a02729 (2003), pp. 212\u2013224"},{"key":"9170_CR9","doi-asserted-by":"crossref","first-page":"5","DOI":"10.1090\/conm\/360\/06566","volume":"360","author":"P. Dehornoy","year":"2004","unstructured":"P. Dehornoy, Braid-based cryptography. Contemp. Math.\n                  360, 5\u201333 (2004)","journal-title":"Contemp. Math."},{"key":"9170_CR10","series-title":"IMS Lecture Notes Series","doi-asserted-by":"publisher","first-page":"329","DOI":"10.1142\/9789814291415_0006","volume-title":"Braids: Introductory Lectures on Braids, Configurations and Their Applications","author":"D. Garber","year":"2009","unstructured":"D. Garber, Braid group cryptography, in Braids: Introductory Lectures on Braids, Configurations and Their Applications, ed. by J. Berrick, F.R. Cohen, E. Hanbury, Y.L. Wong, J. Wu. IMS Lecture Notes Series, vol.\u00a019 (National University of Singapore, Singapore, 2009), pp. 329\u2013403"},{"key":"9170_CR11","doi-asserted-by":"publisher","first-page":"323","DOI":"10.1016\/j.aam.2005.03.002","volume":"35","author":"D. Garber","year":"2005","unstructured":"D. Garber, S. Kaplan, M. Teicher, B. Tsaban, U. Vishne, Probabilistic solutions of equations in the braid group. Adv. Appl. Math.\n                  35, 323\u2013334 (2005)","journal-title":"Adv. Appl. Math."},{"key":"9170_CR12","doi-asserted-by":"publisher","first-page":"282","DOI":"10.1016\/j.jalgebra.2005.02.002","volume":"292","author":"V. Gebhardt","year":"2005","unstructured":"V. Gebhardt, A\u00a0new approach to the conjugacy problem in Garside groups. J. Algebra\n                  292, 282\u2013302 (2005)","journal-title":"J. Algebra"},{"key":"9170_CR13","doi-asserted-by":"publisher","first-page":"219","DOI":"10.1007\/s00200-006-0008-7","volume":"17","author":"V. Gebhardt","year":"2006","unstructured":"V. Gebhardt, Conjugacy search in braid groups. Appl. Algebra Eng. Commun. Comput.\n                  17, 219\u2013238 (2006)","journal-title":"Appl. Algebra Eng. Commun. Comput."},{"key":"9170_CR14","first-page":"146","volume-title":"Proceedings of the First International Conference on Symbolic Computation and Cryptography","author":"R. Gilman","year":"2008","unstructured":"R. Gilman, A. Miasnikov, A. Miasnikov, A. Ushakov, New developments in commutator key exchange, in Proceedings of the First International Conference on Symbolic Computation and Cryptography, Beijing (2008), pp. 146\u2013150. \n                    http:\/\/www-calfor.lip6.fr\/~jcf\/Papers\/scc08.pdf"},{"key":"9170_CR15","series-title":"Lecture Notes in Computer Science","first-page":"187","volume-title":"PKC 2003","author":"D. Hofheinz","year":"2002","unstructured":"D. Hofheinz, R. Steinwandt, A\u00a0practical attack on some braid group based cryptographic primitives, in PKC 2003. Lecture Notes in Computer Science, vol.\u00a02567 (2002), pp. 187\u2013198"},{"key":"9170_CR16","volume-title":"SECI02: S\u00e9curit\u00e9 de la Communication sur Internet","author":"J. Hughes","year":"2002","unstructured":"J. Hughes, A. Tannenbaum, Length-based attacks for certain group based encryption rewriting systems, in SECI02: S\u00e9curit\u00e9 de la Communication sur Internet (2002). \n                    www.ima.umn.edu\/preprints\/apr2000\/1696.pdf"},{"key":"9170_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"107","DOI":"10.1007\/3-540-45450-0_15","volume-title":"Information Security and Privacy","author":"J. Hughes","year":"2002","unstructured":"J. Hughes, A\u00a0linear algebraic attack on the AAFG1 braid group cryptosystem, in Information Security and Privacy. Lecture Notes in Computer Science, vol.\u00a02384 (2002), pp. 107\u2013141"},{"key":"9170_CR18","doi-asserted-by":"publisher","first-page":"257","DOI":"10.1007\/s00200-006-0007-8","volume":"17","author":"A. Kalka","year":"2006","unstructured":"A. Kalka, Representation attacks on the braid Diffie\u2013Hellman public key encryption. Appl. Algebra Eng. Commun. Comput.\n                  17, 257\u2013266 (2006)","journal-title":"Appl. Algebra Eng. Commun. Comput."},{"key":"9170_CR19","unstructured":"A. Kalka, Representations of braid groups and braid-based cryptography. PhD thesis, Ruhr-Universit\u00e4t Bochum (2007). \n                    www-brs.ub.ruhr-uni-bochum.de\/netahtml\/HSS\/Diss\/KalkaArkadiusG\/"},{"key":"9170_CR20","unstructured":"A. Kalka, Non-associative public key cryptography. \n                    1210.8270\n                    \n                   (2012)"},{"key":"9170_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"166","DOI":"10.1007\/3-540-44598-6_10","volume-title":"CRYPTO 2000","author":"K. Ko","year":"2000","unstructured":"K. Ko, S. Lee, J. Cheon, J. Han, J. Kang, C. Park, New public-key cryptosystem using braid groups, in CRYPTO 2000. Lecture Notes in Computer Science, vol.\u00a01880 (2000), pp. 166\u2013183"},{"key":"9170_CR22","doi-asserted-by":"publisher","first-page":"317","DOI":"10.1007\/s10623-007-9123-0","volume":"45","author":"K. Ko","year":"2007","unstructured":"K. Ko, J. Lee, T. Thomas, Towards generating secure keys for braid cryptography. Des. Codes Cryptogr.\n                  45, 317\u2013333 (2007)","journal-title":"Des. Codes Cryptogr."},{"key":"9170_CR23","doi-asserted-by":"publisher","first-page":"131","DOI":"10.2307\/3062152","volume":"155","author":"D. Krammer","year":"2002","unstructured":"D. Krammer, Braid groups are linear. Ann. Math.\n                  155, 131\u2013156 (2002)","journal-title":"Ann. Math."},{"key":"9170_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"14","DOI":"10.1007\/3-540-46035-7_2","volume-title":"EUROCRYPT 2002","author":"S. Lee","year":"2002","unstructured":"S. Lee, E. Lee, Potential weaknesses of the commutator key agreement protocol based on braid groups, in EUROCRYPT 2002. Lecture Notes in Computer Science, vol.\u00a02332 (2002), pp. 14\u201328"},{"key":"9170_CR25","doi-asserted-by":"publisher","first-page":"347","DOI":"10.1007\/s10623-005-5382-9","volume":"39","author":"S. Maffre","year":"2006","unstructured":"S. Maffre, A\u00a0weak key test for braid-based cryptography. Des. Codes Cryptogr.\n                  39, 347\u2013373 (2006)","journal-title":"Des. Codes Cryptogr."},{"key":"9170_CR26","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"86","DOI":"10.1007\/11535218_6","volume-title":"CRYPTO 2005","author":"A. Miasnikov","year":"2005","unstructured":"A. Miasnikov, V. Shpilrain, A. Ushakov, A\u00a0practical attack on some braid group based cryptographic protocols, in CRYPTO 2005. Lecture Notes in Computer Science, vol.\u00a03621 (2005), pp. 86\u201396"},{"key":"9170_CR27","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"302","DOI":"10.1007\/11745853_20","volume-title":"PKC 2006","author":"A. Miasnikov","year":"2006","unstructured":"A. Miasnikov, V. Shpilrain, A. Ushakov, Random subgroups of braid groups: an approach to cryptanalysis of a braid group based cryptographic protocol, in PKC 2006. Lecture Notes in Computer Science, vol.\u00a03958 (2006), pp. 302\u2013314"},{"key":"9170_CR28","series-title":"American Mathematical Society Surveys and Monographs","doi-asserted-by":"crossref","DOI":"10.1090\/surv\/177","volume-title":"Non-commutative Cryptography and Complexity of Group-Theoretic Problems","author":"A. Miasnikov","year":"2011","unstructured":"A. Miasnikov, V. Shpilrain, A. Ushakov, Non-commutative Cryptography and Complexity of Group-Theoretic Problems. American Mathematical Society Surveys and Monographs, vol.\u00a0177 (2011)"},{"key":"9170_CR29","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"76","DOI":"10.1007\/978-3-540-71677-8_6","volume-title":"PKC 2007","author":"A. Miasnikov","year":"2007","unstructured":"A. Miasnikov, A. Ushakov, Length based attack and braid groups: cryptanalysis of Anshel\u2013Anshel\u2013Goldfeld key exchange protocol, in PKC 2007. Lecture Notes in Computer Science, vol.\u00a04450 (2007), pp. 76\u201388"},{"key":"9170_CR30","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1515\/JMC.2008.003","volume":"2","author":"A. Myasnikov","year":"2008","unstructured":"A. Myasnikov, A. Ushakov, Random subgroups and analysis of the length-based and quotient attacks. J. Math. Cryptol.\n                  2, 29\u201361 (2008)","journal-title":"J. Math. Cryptol."},{"key":"9170_CR31","volume-title":"Post-quantum Cryptography","author":"D. Micciancio","year":"2008","unstructured":"D. Micciancio, O. Regev, Lattice-based cryptography, in Post-quantum Cryptography, ed. by D. Bernstein, J. Buchmann (Springer, Berlin, 2008)"},{"key":"9170_CR32","volume-title":"CS Theory Seminar","author":"A. Lubotzky","year":"2001","unstructured":"A. Lubotzky, Braid group cryptography, in CS Theory Seminar, Hebrew University, March (2001). \n                    http:\/\/www.cs.huji.ac.il\/theorys\/2001\/Alex_Lubotzky"},{"key":"9170_CR33","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"283","DOI":"10.1007\/978-3-540-79709-8_29","volume-title":"Computer Science in Russia","author":"V. Shpilrain","year":"2008","unstructured":"V. Shpilrain, Cryptanalysis of Stickel\u2019s key exchange scheme, in Computer Science in Russia. Lecture Notes in Computer Science, vol.\u00a05010 (2008), pp. 283\u2013288"},{"key":"9170_CR34","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"151","DOI":"10.1007\/11496137_11","volume-title":"ACNS 2005","author":"V. Shpilrain","year":"2005","unstructured":"V. Shpilrain, A. Ushakov, Thompson\u2019s group and public key cryptography, in ACNS 2005. Lecture Notes in Computer Science, vol.\u00a03531 (2005), pp. 151\u2013164"},{"key":"9170_CR35","series-title":"Contemporary Mathematics","doi-asserted-by":"publisher","first-page":"161","DOI":"10.1090\/conm\/418\/07954","volume-title":"Algebraic Methods in Cryptography","author":"V. Shpilrain","year":"2006","unstructured":"V. Shpilrain, A. Ushakov, A\u00a0new key exchange protocol besed on the decomposition problem, in Algebraic Methods in Cryptography, ed. by L. Gerritzen, D. Goldfeld, M. Kreuzer, G. Rosenberger, V.\u00a0Shpilrain. Contemporary Mathematics, vol.\u00a0418 (2006), pp. 161\u2013167"},{"key":"9170_CR36","doi-asserted-by":"publisher","first-page":"426","DOI":"10.1109\/ICITA.2005.33","volume-title":"Proceedings of the Third International Conference on Information Technology and Applications (ICITA05)","author":"E. Stickel","year":"2005","unstructured":"E. Stickel, A\u00a0new method for exchanging secret keys, in Proceedings of the Third International Conference on Information Technology and Applications (ICITA05) (2005), pp. 426\u2013430"},{"key":"9170_CR37","unstructured":"B. Tsaban, The conjugacy problem: cryptoanalytic approaches to a problem of Dehn, Minicourse, D\u00fcsseldorf University, Germany, July\u2013August 2012. \n                    http:\/\/reh.math.uni-duesseldorf.de\/~gcgta\/slides\/Tsaban_minicourses.pdf"}],"container-title":["Journal of Cryptology"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00145-013-9170-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s00145-013-9170-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00145-013-9170-9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00145-013-9170-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,4,8]],"date-time":"2020-04-08T08:15:41Z","timestamp":1586333741000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s00145-013-9170-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,11,15]]},"references-count":37,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2015,7]]}},"alternative-id":["9170"],"URL":"https:\/\/doi.org\/10.1007\/s00145-013-9170-9","relation":{},"ISSN":["0933-2790","1432-1378"],"issn-type":[{"value":"0933-2790","type":"print"},{"value":"1432-1378","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013,11,15]]},"assertion":[{"value":"28 January 2013","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"15 November 2013","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}