{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,6]],"date-time":"2026-03-06T14:16:28Z","timestamp":1772806588147,"version":"3.50.1"},"reference-count":25,"publisher":"American Institute of Mathematical Sciences (AIMS)","issue":"3","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["AMC"],"published-print":{"date-parts":[[2021]]},"DOI":"10.3934\/amc.2020073","type":"journal-article","created":{"date-parts":[[2020,4,13]],"date-time":"2020-04-13T05:01:22Z","timestamp":1586754082000},"page":"397-413","source":"Crossref","is-referenced-by-count":1,"title":["Ironwood meta key agreement and authentication protocol"],"prefix":"10.3934","volume":"15","author":[{"given":"Iris","family":"Anshel","sequence":"first","affiliation":[]},{"given":"Derek","family":"Atkins","sequence":"additional","affiliation":[]},{"given":"Dorian","family":"Goldfeld","sequence":"additional","affiliation":[]},{"given":"Paul E.","family":"Gunnells","sequence":"additional","affiliation":[]}],"member":"2321","reference":[{"key":"key-10.3934\/amc.2020073-1","doi-asserted-by":"publisher","DOI":"10.1090\/conm\/418\/07943"},{"key":"key-10.3934\/amc.2020073-2","unstructured":"<p>I. Anshel, D. Atkins, D. Goldfeld and P. E. Gunnells, <i>Defeating the Ben-Zvi, Blackburn, and Tsaban Attack on the Algebraic Eraser<\/i>, arXiv: 1601.04780v1 [cs.CR].<\/p>"},{"key":"key-10.3934\/amc.2020073-3","unstructured":"<p>I. Anshel, D. Atkins, D. Goldfeld and P. E. Gunnells, <i>WalnutDSA<\/i>$^{TM}$<i>: A Lightweight Quantum Resistant Digital Signature Algorithm<\/i>, <a href=\"https:\/\/eprint.iacr.org\/2017\/058.pdf\" target=\"_blank\">https:\/\/eprint.iacr.org\/2017\/058.pdf<\/a>.<\/p>"},{"key":"key-10.3934\/amc.2020073-4","doi-asserted-by":"publisher","DOI":"10.4310\/MRL.1999.v6.n3.a3"},{"key":"key-10.3934\/amc.2020073-5","doi-asserted-by":"publisher","DOI":"10.2307\/1969218"},{"key":"key-10.3934\/amc.2020073-6","unstructured":"<p>D. Atkins and D. Goldfeld, Addressing the algebraic eraser over the air protocol, <a href=\"https:\/\/eprint.iacr.org\/2016\/205.pdf\" target=\"_blank\">https:\/\/eprint.iacr.org\/2016\/205.pdf<\/a>.<\/p>"},{"key":"key-10.3934\/amc.2020073-7","doi-asserted-by":"crossref","unstructured":"<p>A. Ben-Zvi, S. R. Blackburn and B. Tsaban, A practical cryptanalysis of the algebraic eraser, <i>Advances in Cryptology - CRYPTO 2016, Part I, Lecture Notes in Comput. Sci., Springer, Berlin<\/i>, <b>9814<\/b> (2016), 179\u2013189. <a href=\"http:\/\/eprint.iacr.org\/2015\/1102\" target=\"_blank\">http:\/\/eprint.iacr.org\/2015\/1102<\/a>.<\/p>","DOI":"10.1007\/978-3-662-53018-4_7"},{"key":"key-10.3934\/amc.2020073-8","doi-asserted-by":"crossref","unstructured":"<p>S. R. Blackburn and M. J. B. Robshaw, On the security of the algebraic eraser tag authentication protocol, <i>Applied Cryptography and Network Security, Lecture Notes in Comput. Sci., Springer<\/i>, <b>9696<\/b> (2016), 3\u201317. <a href=\"http:\/\/eprint.iacr.org\/2016\/091\" target=\"_blank\">http:\/\/eprint.iacr.org\/2016\/091<\/a>.<\/p>","DOI":"10.1007\/978-3-319-39555-5_1"},{"key":"key-10.3934\/amc.2020073-9","unstructured":"<p>M. D&#252;ll, B. Haase, G. Hinterw&#228;lder, M. Hutter, C. Paar, A. H. S&#225;nchez and P. Schwabe, High-speed Curve25519 on 8-bit, 16-bit, and 32-bit microcontrollers, <a href=\"https:\/\/eprint.iacr.org\/2015\/343.pdf\" target=\"_blank\">https:\/\/eprint.iacr.org\/2015\/343.pdf<\/a>.<\/p>"},{"key":"key-10.3934\/amc.2020073-10","doi-asserted-by":"publisher","DOI":"10.1090\/conm\/418\/07947"},{"key":"key-10.3934\/amc.2020073-11","doi-asserted-by":"publisher","DOI":"10.1016\/j.jalgebra.2005.02.002"},{"key":"key-10.3934\/amc.2020073-12","unstructured":"<p>D. Goldfeld and P. E. Gunnells, Defeating the Kalka-Teicher-Tsaban linear algebra attack on the Algebraic Eraser, (2012), arXiv: 1202.0598.<\/p>"},{"key":"key-10.3934\/amc.2020073-13"},{"key":"key-10.3934\/amc.2020073-14","doi-asserted-by":"publisher","DOI":"10.1145\/237814.237866"},{"key":"key-10.3934\/amc.2020073-15","unstructured":"<p>P. E. Gunnells, On the cryptanalysis of the generalized simultaneous conjugacy search problem and the security of the Algebraic Eraser, arXiv: 1105.1141v1 [cs.CR].<\/p>"},{"key":"key-10.3934\/amc.2020073-16","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-36288-6_14"},{"key":"key-10.3934\/amc.2020073-17","doi-asserted-by":"publisher","DOI":"10.1016\/j.aam.2012.03.001"},{"key":"key-10.3934\/amc.2020073-18","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-44598-6_10"},{"key":"key-10.3934\/amc.2020073-19","unstructured":"<p>C. Lomont, The hidden subgroup problem - review and open problems, (2004), arXiv: quant-ph\/0411037.<\/p>"},{"key":"key-10.3934\/amc.2020073-20","doi-asserted-by":"publisher","DOI":"10.1090\/conm\/233\/03427"},{"key":"key-10.3934\/amc.2020073-21","doi-asserted-by":"crossref","unstructured":"<p>C. Mulland and B. Tsaban, $ \\rm SL _2$ homomorphic hash functions: Worst case to average case reduction and short collision search, <i>Des. Codes Cryptogr.<\/i>, <b>81<\/b> (2016), 83\u2013107, arXiv: 1306.5646v3 [cs.CR].<\/p>","DOI":"10.1007\/s10623-015-0129-8"},{"key":"key-10.3934\/amc.2020073-22","doi-asserted-by":"publisher","DOI":"10.1515\/GCC.2009.63"},{"key":"key-10.3934\/amc.2020073-23","unstructured":"<p>A. Myasnikov, V. Shpilrain and A. Ushakov, <i>Group-Based Cryptography<\/i>, Advanced Courses in Mathematics, CRM Barcelona Birkh\u00e4user, Basel, 2008.<\/p>"},{"key":"key-10.3934\/amc.2020073-24","doi-asserted-by":"publisher","DOI":"10.1137\/S0097539795293172"},{"key":"key-10.3934\/amc.2020073-25"}],"container-title":["Advances in Mathematics of Communications"],"original-title":[],"link":[{"URL":"https:\/\/www.aimsciences.org\/article\/exportPdf?id=e4c15236-7253-42a3-b7ad-502b33f1041a","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,6]],"date-time":"2026-03-06T10:00:41Z","timestamp":1772791241000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.aimsciences.org\/\/article\/doi\/10.3934\/amc.2020073"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"references-count":25,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2021]]}},"URL":"https:\/\/doi.org\/10.3934\/amc.2020073","relation":{},"ISSN":["1930-5346","1930-5338"],"issn-type":[{"value":"1930-5346","type":"print"},{"value":"1930-5338","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021]]}}}