{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,6]],"date-time":"2026-04-06T09:04:43Z","timestamp":1775466283433,"version":"3.50.1"},"reference-count":18,"publisher":"Springer Science and Business Media LLC","issue":"3-4","license":[{"start":{"date-parts":[[2006,5,30]],"date-time":"2006-05-30T00:00:00Z","timestamp":1148947200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["AAECC"],"published-print":{"date-parts":[[2006,7,21]]},"DOI":"10.1007\/s00200-006-0006-9","type":"journal-article","created":{"date-parts":[[2006,5,29]],"date-time":"2006-05-29T15:58:36Z","timestamp":1148918316000},"page":"291-302","source":"Crossref","is-referenced-by-count":34,"title":["Combinatorial Group Theory and Public Key Cryptography"],"prefix":"10.1007","volume":"17","author":[{"given":"Vladimir","family":"Shpilrain","sequence":"first","affiliation":[]},{"given":"Gabriel","family":"Zapata","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2006,5,30]]},"reference":[{"key":"6_CR1","doi-asserted-by":"crossref","first-page":"287","DOI":"10.4310\/MRL.1999.v6.n3.a3","volume":"6","author":"I. Anshel","year":"1999","unstructured":"Anshel I., Anshel M., Goldfeld D. (1999) An algebraic method for public-key cryptography. Math. Res. Lett. 6, 287\u2013291","journal-title":"Math. Res. Lett."},{"key":"6_CR2","doi-asserted-by":"crossref","first-page":"201","DOI":"10.1007\/BF01389320","volume":"72","author":"K. Appel","year":"1983","unstructured":"Appel K., Schupp P. (1983) Artin groups and infinite Coxeter groups. Invent. Math. 72, 201\u2013220","journal-title":"Invent. Math."},{"key":"6_CR3","unstructured":"Cryptography and braid groups, http:\/\/www.cs.ut.ee\/~lipmaa\/crypto\/link\/public\/braid\/"},{"key":"6_CR4","doi-asserted-by":"crossref","unstructured":"Dehornoy, P. Braid-based cryptography. In: Group theory, statistics, and cryptography, vol. 360, pp. 5\u201333, Contemp. Math., Providence, Am. Math. Soc. (2004)","DOI":"10.1090\/conm\/360\/06566"},{"key":"6_CR5","unstructured":"Garber, D., Kaplan, S., Teicher, M., Tsaban, B., Vishne, U. Length-based conjugacy search in the braid group, preprint. http:\/\/www.arXiv.org\/abs\/math.GR\/0209267"},{"key":"6_CR6","volume-title":"Making, breaking codes: an introduction to cryptology","author":"P. Garrett","year":"2001","unstructured":"Garrett P. (2001) Making, breaking codes: an introduction to cryptology. Prentice Hall, Englewood Cliifs"},{"key":"6_CR7","doi-asserted-by":"crossref","unstructured":"Hofheinz, D., Steinwandt, R. A practical attack on some braid group based cryptographic primitives. In: Y. G. Desmedt (ed.) Public Key Cryptography, 6th International Workshop on Practice and Theory in Public Key Cryptography, PKC 2003 Proceedings, vol. 2567, pp. 187\u2013198, Lecture Notes Comp. Sc., Springer, Berlin Heidelberg New York Tokyo: (2002)","DOI":"10.1007\/3-540-36288-6_14"},{"key":"6_CR8","doi-asserted-by":"crossref","DOI":"10.1093\/oso\/9780198511946.001.0001","volume-title":"Fundamentals of Semigroup Theory","author":"J.M. Howie","year":"1995","unstructured":"Howie J.M. (1995) Fundamentals of Semigroup Theory, vol. 12. London Mathematical Society Monographs Clarendon Press, Oxford"},{"key":"6_CR9","unstructured":"Hughes, J., Tannenbaum, A. Length-based attacks for certain group based encryption rewriting systems. In: Workshop SECI02 Securit\u00e8 de la Communication sur Intenet, September, Tunis, Tunisia (2002). http:\/\/www.network.com\/~hughes\/"},{"key":"6_CR10","doi-asserted-by":"crossref","first-page":"665","DOI":"10.1016\/S0021-8693(03)00167-4","volume":"264","author":"I. Kapovich","year":"2003","unstructured":"Kapovich I., Myasnikov A., Schupp P., Shpilrain V. (2003) Generic-case complexity, decision problems in group theory and random walks. J. Algebra 264, 665\u2013694","journal-title":"J. Algebra"},{"key":"6_CR11","doi-asserted-by":"crossref","first-page":"343","DOI":"10.1016\/j.aim.2003.02.001","volume":"190","author":"I. Kapovich","year":"2005","unstructured":"Kapovich I., Myasnikov A., Schupp P., Shpilrain V. (2005) Average-case complexity and decision problems in group theory. Adv. Math. 190, 343\u2013359","journal-title":"Adv. Math."},{"key":"6_CR12","unstructured":"Ko, K. H. Conjugacy problem in braid groups and applications, I. Overview: Conjugacy problems, their variations, and their applications, preprint. http:\/\/www.kyokan.ms.u-tokyo.ac.jp\/~topology\/files\/KS03a.pdf"},{"key":"6_CR13","doi-asserted-by":"crossref","unstructured":"Ko, K. H., Lee, S.J., Cheon, J.H., Han, J.W., Kang, J., Park, C. New public-key cryptosystem using braid groups. In: Advances in cryptology \u2013 CRYPTO 2000 (Santa Barbara, CA), vol. 1880, pp. 166\u2013183, Lecture Notes Comp. Sc. Springer, Berlin Heidelberg New York Tokyo: (2000)","DOI":"10.1007\/3-540-44598-6_10"},{"key":"6_CR14","doi-asserted-by":"crossref","unstructured":"Lyndon, R.C., Schupp, P.E. Combinatorial Group Theory, Ergebnisse der Mathematik, band 89, Springer 1977. Reprinted in the Springer Classics in Mathematics series (2000)","DOI":"10.1007\/978-3-642-61896-3"},{"key":"6_CR15","doi-asserted-by":"crossref","unstructured":"Myasnikov, A.D., Myasnikov, A.G., Shpilrain V. On the Andrews-Curtis equivalence. In: Combinatorial and geometric group theory, vol. 296, pp. 183\u2013198, Contemp. Math. Providence, Am. Math. Soc. (2002)","DOI":"10.1090\/conm\/296\/05074"},{"key":"6_CR16","unstructured":"Myasnikov, A.G., Ushakov, A. Random van Kampen diagrams, preprint"},{"key":"6_CR17","doi-asserted-by":"crossref","first-page":"15","DOI":"10.1016\/0022-4049(95)00094-1","volume":"110","author":"D. Peifer","year":"1996","unstructured":"Peifer D. (1996) Artin groups of extra-large type are automatic. J. Pure Appl. Alg. 110, 15\u201356","journal-title":"J. Pure Appl. Alg."},{"key":"6_CR18","doi-asserted-by":"crossref","unstructured":"Shpilrain, V. Assessing security of some group based cryptosystems. In: Group theory, statistics, and cryptography, vol. 360, pp. 167\u2013177, Contemp. Math. Providence, Am. Math. Soc. (2004)","DOI":"10.1090\/conm\/360\/06577"}],"container-title":["Applicable Algebra in Engineering, Communication and Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00200-006-0006-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s00200-006-0006-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00200-006-0006-9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,2,4]],"date-time":"2024-02-04T15:11:36Z","timestamp":1707059496000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s00200-006-0006-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006,5,30]]},"references-count":18,"journal-issue":{"issue":"3-4","published-print":{"date-parts":[[2006,7,21]]}},"alternative-id":["6"],"URL":"https:\/\/doi.org\/10.1007\/s00200-006-0006-9","relation":{},"ISSN":["0938-1279","1432-0622"],"issn-type":[{"value":"0938-1279","type":"print"},{"value":"1432-0622","type":"electronic"}],"subject":[],"published":{"date-parts":[[2006,5,30]]}}}