{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,8,2]],"date-time":"2022-08-02T17:28:46Z","timestamp":1659461326582},"reference-count":21,"publisher":"Informa UK Limited","issue":"1","content-domain":{"domain":["www.tandfonline.com"],"crossmark-restriction":true},"short-container-title":["International Journal of Computer Mathematics: Computer Systems Theory"],"published-print":{"date-parts":[[2020,1,2]]},"DOI":"10.1080\/23799927.2020.1716074","type":"journal-article","created":{"date-parts":[[2020,1,21]],"date-time":"2020-01-21T07:23:13Z","timestamp":1579591393000},"page":"15-24","update-policy":"http:\/\/dx.doi.org\/10.1080\/tandf_crossmark_01","source":"Crossref","is-referenced-by-count":2,"title":["A cryptographic application of the Thurston norm"],"prefix":"10.1080","volume":"5","author":[{"given":"Ram\u00f3n","family":"Flores","sequence":"first","affiliation":[{"name":"Department of Geometry and Topology, University of Seville, Seville, Spain"}]},{"given":"Delaram","family":"Kahrobaei","sequence":"additional","affiliation":[{"name":"Department of Computer Science, The University of York, York, UK"},{"name":"Department of Computer Science, CUNY Graduate Center, New York University, New York, NY, USA"}]},{"given":"Thomas","family":"Koberda","sequence":"additional","affiliation":[{"name":"Department of Mathematics, University of Virginia, Charlottesville, VA, USA"}]}],"member":"301","published-online":{"date-parts":[[2020,1,29]]},"reference":[{"key":"CIT0001","doi-asserted-by":"publisher","DOI":"10.2140\/agt.2010.10.2315"},{"key":"CIT0002","doi-asserted-by":"publisher","DOI":"10.2140\/gt.2015.19.1111"},{"key":"CIT0003","doi-asserted-by":"publisher","DOI":"10.4310\/MRL.1999.v6.n3.a3"},{"key":"CIT0005","doi-asserted-by":"publisher","DOI":"10.1007\/s00200-006-0003-z"},{"key":"CIT0006","first-page":"137","volume":"33","author":"Birget J.C.","year":"2006","journal-title":"Tatra Mt. Math. Publ."},{"key":"CIT0007","doi-asserted-by":"publisher","DOI":"10.1007\/BF01389176"},{"key":"CIT0008","doi-asserted-by":"publisher","DOI":"10.1090\/conm\/633\/12646"},{"key":"CIT0009","first-page":"14","volume":"29","author":"Chatterji I.","year":"2017","journal-title":"Theor. Appl. Inform."},{"key":"CIT0010","doi-asserted-by":"publisher","DOI":"10.4171\/JEMS\/739"},{"issue":"3","key":"CIT0013","first-page":"8","volume":"28","author":"Flores R.","year":"2016","journal-title":"Theor. Appl. Inform."},{"key":"CIT0014","doi-asserted-by":"publisher","DOI":"10.1016\/j.jalgebra.2018.10.023"},{"key":"CIT0015","doi-asserted-by":"publisher","DOI":"10.1515\/gcc-2016-0013"},{"key":"CIT0017","doi-asserted-by":"publisher","DOI":"10.1090\/conm\/582\/11557"},{"key":"CIT0018","volume-title":"A Practical Cryptanalysis of WalnutDSA","author":"Hart D.","year":"2018"},{"key":"CIT0020","doi-asserted-by":"publisher","DOI":"10.1515\/gcc-2012-0019"},{"key":"CIT0021","doi-asserted-by":"publisher","DOI":"10.1515\/gcc-2019-2002"},{"key":"CIT0023","doi-asserted-by":"publisher","DOI":"10.4171\/JEMS\/756"},{"key":"CIT0028","volume-title":"Thompson's\u00a0Group and\u00a0Public\u00a0Key\u00a0Cryptography","author":"Shpilrain V.","year":"2005"},{"key":"CIT0029","doi-asserted-by":"publisher","DOI":"10.1007\/s00200-006-0006-9"},{"issue":"339","key":"CIT0030","first-page":"99","volume":"59","author":"Thurston W.P.","year":"1986","journal-title":"Mem. Am. Math. Soc."},{"key":"CIT0031","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-013-9170-9"}],"container-title":["International Journal of Computer Mathematics: Computer Systems Theory"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.tandfonline.com\/doi\/pdf\/10.1080\/23799927.2020.1716074","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,2,19]],"date-time":"2020-02-19T04:08:12Z","timestamp":1582085292000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.tandfonline.com\/doi\/full\/10.1080\/23799927.2020.1716074"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,1,2]]},"references-count":21,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2020,1,2]]}},"alternative-id":["10.1080\/23799927.2020.1716074"],"URL":"https:\/\/doi.org\/10.1080\/23799927.2020.1716074","relation":{},"ISSN":["2379-9927","2379-9935"],"issn-type":[{"value":"2379-9927","type":"print"},{"value":"2379-9935","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,1,2]]},"assertion":[{"value":"The publishing and review policy for this title is described in its Aims & Scope.","order":1,"name":"peerreview_statement","label":"Peer Review Statement"},{"value":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=tcom20","URL":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=tcom20","order":2,"name":"aims_and_scope_url","label":"Aim & Scope"},{"value":"2019-08-13","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2020-01-08","order":1,"name":"revised","label":"Revised","group":{"name":"publication_history","label":"Publication History"}},{"value":"2020-01-09","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2020-01-29","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}