{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,6,13]],"date-time":"2022-06-13T13:32:58Z","timestamp":1655127178224},"reference-count":9,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2009,6,18]],"date-time":"2009-06-18T00:00:00Z","timestamp":1245283200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Des. Codes Cryptogr."],"published-print":{"date-parts":[[2010,1]]},"DOI":"10.1007\/s10623-009-9307-x","type":"journal-article","created":{"date-parts":[[2009,6,16]],"date-time":"2009-06-16T23:38:56Z","timestamp":1245195536000},"page":"29-41","source":"Crossref","is-referenced-by-count":2,"title":["Security analysis of word problem-based cryptosystems"],"prefix":"10.1007","volume":"54","author":[{"given":"Fran\u00e7oise","family":"Levy-dit-Vehel","sequence":"first","affiliation":[]},{"given":"Ludovic","family":"Perret","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2009,6,18]]},"reference":[{"key":"9307_CR1","doi-asserted-by":"crossref","unstructured":"Abisha P.J., Thomas D.G., Subramanian K.G.: Public key cryptosystems based on free partially commutative monoids and groups. In: Proceedings of INDOCRYPT 2003, LNCS, vol. 2904, pp. 218\u2013227. Springer, Berlin, Heidelberg (2003).","DOI":"10.1007\/978-3-540-24582-7_16"},{"key":"9307_CR2","doi-asserted-by":"crossref","first-page":"171","DOI":"10.1145\/322290.322301","volume":"29","author":"R.V. Book","year":"1982","unstructured":"Book R.V.: Confluent and other types of thue systems. J. ACM 29, 171\u2013182 (1982)","journal-title":"J. ACM"},{"key":"9307_CR3","doi-asserted-by":"crossref","unstructured":"Book R.V., Otto F.: String-Rewriting Systems. Texts and Monographs in Computer Science. Springer-Verlag, New York (1993).","DOI":"10.1007\/978-1-4613-9771-7"},{"issue":"10","key":"9307_CR4","doi-asserted-by":"crossref","first-page":"1037","DOI":"10.1016\/j.aml.2005.11.014","volume":"19","author":"M.I. Gonz\u00e1lez-Vasco","year":"2006","unstructured":"Gonz\u00e1lez-Vasco M.I., Steinwandt R.: Pitfalls in public key systems based on free partially commutative monoids and groups. Appl. Math. Lett. 19(10), 1037\u20131041 (2006)","journal-title":"Appl. Math. Lett."},{"issue":"5","key":"9307_CR5","doi-asserted-by":"crossref","first-page":"335","DOI":"10.1007\/s00200-003-0135-3","volume":"14","author":"M.I. Gonz\u00e1lez-Vasco","year":"2004","unstructured":"Gonz\u00e1lez-Vasco M.I., Steinwandt R.: A reaction attack on a public key cryptosystem based on the word problem. Appl. Algebra Eng. Commun. Comput. 14(5), 335\u2013340 (2004)","journal-title":"Appl. Algebra Eng. Commun. Comput."},{"key":"9307_CR6","unstructured":"Levy-dit-Vehel F., Perret L.: On the Wagner\u2013Magyarik cryptosystem. Revised Selected Papers of WCC 2005 Conference, LNCS, vol. 3969, pp. 316\u2013329. Springer, Berlin (2006)."},{"key":"9307_CR7","first-page":"1","volume":"44","author":"P.S. Novikov","year":"1955","unstructured":"Novikov P.S.: On the algorithmic unsolvability of the word problem in group theory. Trudy Mat. Inst. Steklov 44, 1\u2013143 (1955)","journal-title":"Trudy Mat. Inst. Steklov"},{"key":"9307_CR8","doi-asserted-by":"crossref","unstructured":"Wagner N.R., Magyarik M.R.: A public key cryptosystem based on the word problem. In: Proceedings of CRYPTO\u201984, LNCS, vol. 96, pp. 19\u201336. Springer-Verlag, Berlin.","DOI":"10.1007\/3-540-39568-7_3"},{"key":"9307_CR9","doi-asserted-by":"crossref","first-page":"99","DOI":"10.1016\/S0747-7171(88)80024-5","volume":"6","author":"C. Wrathall","year":"1988","unstructured":"Wrathall C.: The word problem for free partially commutative groups. J. Symb. Comput. 6, 99\u2013104 (1988)","journal-title":"J. Symb. Comput."}],"container-title":["Designs, Codes and Cryptography"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-009-9307-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10623-009-9307-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-009-9307-x","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,30]],"date-time":"2019-05-30T15:58:26Z","timestamp":1559231906000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10623-009-9307-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,6,18]]},"references-count":9,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2010,1]]}},"alternative-id":["9307"],"URL":"https:\/\/doi.org\/10.1007\/s10623-009-9307-x","relation":{},"ISSN":["0925-1022","1573-7586"],"issn-type":[{"value":"0925-1022","type":"print"},{"value":"1573-7586","type":"electronic"}],"subject":[],"published":{"date-parts":[[2009,6,18]]}}}