{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T04:07:21Z","timestamp":1742962041883,"version":"3.40.3"},"reference-count":15,"publisher":"Springer Science and Business Media LLC","issue":"3-4","license":[{"start":{"date-parts":[[2012,4,5]],"date-time":"2012-04-05T00:00:00Z","timestamp":1333584000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["AAECC"],"published-print":{"date-parts":[[2012,11]]},"DOI":"10.1007\/s00200-012-0170-z","type":"journal-article","created":{"date-parts":[[2012,4,4]],"date-time":"2012-04-04T07:03:10Z","timestamp":1333522990000},"page":"143-149","source":"Crossref","is-referenced-by-count":11,"title":["Cryptanalysis of a key exchange protocol based on the endomorphisms ring End $${(\\mathbb{Z}_{p} \\times \\mathbb{Z}_{p^2})}$$"],"prefix":"10.1007","volume":"23","author":[{"given":"Abdel Alim","family":"Kamal","sequence":"first","affiliation":[]},{"given":"Amr M.","family":"Youssef","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2012,4,5]]},"reference":[{"key":"170_CR1","doi-asserted-by":"crossref","first-page":"91","DOI":"10.1007\/s00200-011-0138-4","volume":"22","author":"J.J. Climent","year":"2011","unstructured":"Climent J.J., Navarro P.R., Tortosa L.: On the arithmetic of the endomorphisms ring $${End(\\mathbb{Z}_p \\times Z_p^2)}$$ . Appl. Algebra Eng. Commun. Comput. 22, 91\u2013108 (2011)","journal-title":"Appl. Algebra Eng. Commun. Comput."},{"key":"170_CR2","doi-asserted-by":"crossref","first-page":"257","DOI":"10.1007\/BF02757282","volume":"18","author":"G.M. Bergman","year":"1974","unstructured":"Bergman G.M.: Examples in PI ring theory. Israel J. Math. 18, 257\u2013277 (1974)","journal-title":"Israel J. Math."},{"key":"170_CR3","doi-asserted-by":"crossref","DOI":"10.1090\/surv\/177","volume-title":"Non-Commutative Cryptography and Complexity of Group-Theoretic Problems in Mathematical, Surveys and Monographs. Vol. 177","author":"A. Myasnikov","year":"2011","unstructured":"Myasnikov A., Shpilrain V., Ushakov A.: Non-Commutative Cryptography and Complexity of Group-Theoretic Problems in Mathematical, Surveys and Monographs. Vol. 177, American Mathematical Society, Providence (2011)"},{"unstructured":"Tsaban, B.: Combinatorial Group Theory and Cryptography Bulletin (CGC Bulletin). http:\/\/u.cs.biu.ac.il\/~tsaban\/CGC\/cgc.html","key":"170_CR4"},{"doi-asserted-by":"crossref","unstructured":"Stickel, E.: A new method for exchanging secret keys. In: Proceedings of the thrid International Conference on Information Technology and Applications (ICITA\u201905), pp. 426\u2013430. Sidney (2005)","key":"170_CR5","DOI":"10.1109\/ICITA.2005.33"},{"doi-asserted-by":"crossref","unstructured":"Shpilrain, V.: Cryptanalysis of Stickel\u2019s key exchange scheme. In: Computer Science in Russia-CSR\u201908, Lecture Notes in Computer Science, vol. 5010, pp. 283\u2013288. Springer, Berlin (2008)","key":"170_CR6","DOI":"10.1007\/978-3-540-79709-8_29"},{"key":"170_CR7","first-page":"151","volume":"66","author":"M. Sramka","year":"2008","unstructured":"Sramka M.: On the security of Stickel\u2019s key exchange scheme. Comb. Math. Comb. Comput. 66, 151\u2013159 (2008)","journal-title":"Comb. Math. Comb. Comput."},{"issue":"4","key":"170_CR8","first-page":"365","volume":"4","author":"C. Mullan","year":"2011","unstructured":"Mullan C.: Cryptanalysing variants of Stickel\u2019s key agreement protocol. Math. Crypt. 4(4), 365\u2013373 (2011)","journal-title":"Math. Crypt."},{"unstructured":"Mullan, C.: Some Results in Group-Based Cryptography, Thesis submitted to the University of London for the Degree of Doctor of Philosophy (2011)","key":"170_CR9"},{"doi-asserted-by":"crossref","unstructured":"Cha, J.C., Ko, K.H., Lee, S., Han, J.W., Cheon, J.H.: An efficient implementation of braid groups. In: Advances in Cryptology-ASIACRYPT\u201901, Lecture Notes in Computer Science, vol. 2248, pp. 144\u2013156. Springer, Berlin (2001)","key":"170_CR10","DOI":"10.1007\/3-540-45682-1_9"},{"key":"170_CR11","first-page":"166","volume-title":"Advances in Cryptology-CRYPTO\u201900, Lecture Notes in Computer Science, vol. 1880","author":"K.H. Ko","year":"2000","unstructured":"Ko K.H., Lee S., Cheon J.H., Han J.W., Kang J.S., Park C.: New public-key cryptosystem using braid groups. In: Bellare, M. (ed.) Advances in Cryptology-CRYPTO\u201900, Lecture Notes in Computer Science, vol. 1880, pp. 166\u2013183. Springer, Berlin (2000)"},{"doi-asserted-by":"crossref","unstructured":"Hughes, J.: A linear algebraic attack on the AAFG1 braid group cryptosystem. In: Australian Conference on Information Security and Privacy-ACISP\u201902, Lecture Notes in Computer Science, vol. 2384, pp. 176\u2013189. Springer, Berlin (2002)","key":"170_CR12","DOI":"10.1007\/3-540-45450-0_15"},{"doi-asserted-by":"crossref","unstructured":"Cheon, J.H., Jun, B.: A Polynomial Time Algorithm for the Braid Diffie-Hellman Conjugacy Problem. In: Advances in Cryptology-CRYPTO\u201903, Lecture Notes in Computer Science, vol. 2729, pp. 212\u2013225. Springer, Berlin (2003)","key":"170_CR13","DOI":"10.1007\/978-3-540-45146-4_13"},{"doi-asserted-by":"crossref","unstructured":"Lee, E., Park, J.H.: Cryptanalysis of the public-key encryption based on braid groups. In: Advances in cryptology-EUROCRYPT\u201903, Lecture Notes in Computer Science, vol. 2656, pp. 477\u2013490. Springer, Berlin (2003)","key":"170_CR14","DOI":"10.1007\/3-540-39200-9_30"},{"key":"170_CR15","doi-asserted-by":"crossref","first-page":"257","DOI":"10.1007\/s00200-006-0007-8","volume":"17","author":"A.G. Kalka","year":"2006","unstructured":"Kalka A.G.: Representation attacks on the braid Diffie-Hellman public key encryption. Appl. Algebra Eng. Commun. Comput. 17, 257\u2013266 (2006)","journal-title":"Appl. Algebra Eng. Commun. Comput."}],"container-title":["Applicable Algebra in Engineering, Communication and Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00200-012-0170-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s00200-012-0170-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00200-012-0170-z","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T09:23:22Z","timestamp":1742894602000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s00200-012-0170-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,4,5]]},"references-count":15,"journal-issue":{"issue":"3-4","published-print":{"date-parts":[[2012,11]]}},"alternative-id":["170"],"URL":"https:\/\/doi.org\/10.1007\/s00200-012-0170-z","relation":{},"ISSN":["0938-1279","1432-0622"],"issn-type":[{"type":"print","value":"0938-1279"},{"type":"electronic","value":"1432-0622"}],"subject":[],"published":{"date-parts":[[2012,4,5]]}}}