{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,11]],"date-time":"2026-03-11T20:46:23Z","timestamp":1773261983257,"version":"3.50.1"},"reference-count":10,"publisher":"Springer Science and Business Media LLC","issue":"3-4","license":[{"start":{"date-parts":[[2006,3,22]],"date-time":"2006-03-22T00:00:00Z","timestamp":1142985600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["AAECC"],"published-print":{"date-parts":[[2006,7,21]]},"DOI":"10.1007\/s00200-006-0009-6","type":"journal-article","created":{"date-parts":[[2006,3,21]],"date-time":"2006-03-21T09:30:51Z","timestamp":1142933451000},"page":"285-289","source":"Crossref","is-referenced-by-count":27,"title":["The Conjugacy Search Problem in Public Key Cryptography: Unnecessary and Insufficient"],"prefix":"10.1007","volume":"17","author":[{"given":"Vladimir","family":"Shpilrain","sequence":"first","affiliation":[]},{"given":"Alexander","family":"Ushakov","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2006,3,22]]},"reference":[{"key":"9_CR1","doi-asserted-by":"crossref","first-page":"287","DOI":"10.4310\/MRL.1999.v6.n3.a3","volume":"6","author":"I. Anshel","year":"1999","unstructured":"Anshel I., Anshel M., Goldfeld D. (1999) An algebraic method for public-key cryptography. Math Res Lett 6, 287\u2013291","journal-title":"Math Res Lett"},{"key":"9_CR2","doi-asserted-by":"crossref","unstructured":"Cha, J.C., Ko, K.H., Lee, S.J., Han, J.W., Cheon, J.H. An Efficient Implementation of Braid Groups. In: ASIACRYPT 2001, Lecture Notes Comp. Sc., vol. 2248, 144\u2013156 (2001)","DOI":"10.1007\/3-540-45682-1_9"},{"key":"9_CR3","doi-asserted-by":"crossref","first-page":"525","DOI":"10.1007\/BF01232254","volume":"117","author":"D. Collins","year":"1994","unstructured":"Collins D. (1994) Relations among the squares of the generators of the braid group. Invent Math 117, 525\u2013529","journal-title":"Invent Math"},{"key":"9_CR4","unstructured":"Garber, D., Kaplan, S., Teicher, M., Tsaban, B., Vishne, U. Length-based conjugacy search in the braid group. Contemp. Math., Amer. Math. Soc. (in press)"},{"key":"9_CR5","doi-asserted-by":"crossref","first-page":"323","DOI":"10.1016\/j.aam.2005.03.002","volume":"35","author":"D. Garber","year":"2005","unstructured":"Garber D., Kaplan S., Teicher M., Tsaban B., Vishne U. (2005) Probabilistic solutions of equations in the braid group. Adv App Math 35, 323\u2013334","journal-title":"Adv App Math"},{"key":"9_CR6","doi-asserted-by":"crossref","unstructured":"Hofheinz, D., Steinwandt, R. A practical attack on some braid group based cryptographic primitives. In: Desmedt, Y.G. (ed.) Public key cryptography, 6th International workshop on practice and theory in public key cryptography, PKC 2003 Proceedings. Lecture Notes Comp. Sc., vol. 2567, pp 187\u2013198, Berlin Heidelberg New York Tokyo: Springer (2002)","DOI":"10.1007\/3-540-36288-6_14"},{"key":"9_CR7","unstructured":"Hughes, J., Tannenbaum, A. Length-based attacks for certain group based encryption rewriting systems. In: Workshop SECI02 Securit\u00e8 de la Communication sur Intenet, September 2002, Tunis, Tunisia. http:\/\/www.network.com\/~hughes\/"},{"key":"9_CR8","doi-asserted-by":"crossref","unstructured":"Ko, K.H., Lee, S.J., Cheon, J.H., Han, J.W., Kang, J., Park, C. New public-key cryptosystem using braid groups. In: Advances in cryptology \u2013 CRYPTO 2000 (Santa Barbara, CA). Lecture Notes Comp. Sc., vol. 1880, pp 166\u2013183, Berlin Heidelberg New York Tokyo: Springer (2000)","DOI":"10.1007\/3-540-44598-6_10"},{"key":"9_CR9","first-page":"1103","volume":"119","author":"K.A. Mihailova","year":"1958","unstructured":"Mihailova K.A. (1958) The occurrence problem for direct products of groups (Russian). Dokl Akad Nauk SSSR 119, 1103\u20131105","journal-title":"Dokl Akad Nauk SSSR"},{"key":"9_CR10","doi-asserted-by":"crossref","unstructured":"Shpilrain, V. Assessing security of some group based cryptosystems. In: Group theory, statistics, and cryptography, 167\u2013177, (Contemp. Math., vol. 360) Providence, RI: Amer. Math. Soc. (2004)","DOI":"10.1090\/conm\/360\/06577"}],"container-title":["Applicable Algebra in Engineering, Communication and Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00200-006-0009-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s00200-006-0009-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00200-006-0009-6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,23]],"date-time":"2019-05-23T15:24:19Z","timestamp":1558625059000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s00200-006-0009-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006,3,22]]},"references-count":10,"journal-issue":{"issue":"3-4","published-print":{"date-parts":[[2006,7,21]]}},"alternative-id":["9"],"URL":"https:\/\/doi.org\/10.1007\/s00200-006-0009-6","relation":{},"ISSN":["0938-1279","1432-0622"],"issn-type":[{"value":"0938-1279","type":"print"},{"value":"1432-0622","type":"electronic"}],"subject":[],"published":{"date-parts":[[2006,3,22]]}}}