{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,10]],"date-time":"2024-09-10T12:42:38Z","timestamp":1725972158940},"reference-count":68,"publisher":"Springer Science and Business Media LLC","issue":"5-6","license":[{"start":{"date-parts":[[2011,11,29]],"date-time":"2011-11-29T00:00:00Z","timestamp":1322524800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["AAECC"],"published-print":{"date-parts":[[2011,12]]},"DOI":"10.1007\/s00200-011-0157-1","type":"journal-article","created":{"date-parts":[[2011,11,28]],"date-time":"2011-11-28T08:32:49Z","timestamp":1322469169000},"page":"375-391","source":"Crossref","is-referenced-by-count":1,"title":["Affine braid groups: a better platform than braid groups for cryptology?"],"prefix":"10.1007","volume":"22","author":[{"given":"Ping","family":"Zhu","sequence":"first","affiliation":[]},{"given":"Qiaoyan","family":"Wen","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2011,11,29]]},"reference":[{"issue":"9","key":"157_CR1","doi-asserted-by":"crossref","first-page":"3455","DOI":"10.1090\/S0002-9947-02-02944-6","volume":"354","author":"D. Allcock","year":"2002","unstructured":"Allcock D.: Braid pictures for Artin groups. Trans. Am. Math. Soc. 354(9), 3455\u20133474 (2002)","journal-title":"Trans. Am. Math. Soc."},{"key":"157_CR2","unstructured":"Anshel, I., Anshel, M., Fisher, B., Goldfeld, D.: New key agreement protocols in braid group cryptography. In: Proceedings of 2001 Conference Topics in Cryptology: Crypt. Track RSA. Lect. Notes Comput. Sci. 2020, 13\u201327 (2001)"},{"key":"157_CR3","doi-asserted-by":"crossref","first-page":"287","DOI":"10.4310\/MRL.1999.v6.n3.a3","volume":"6","author":"I. Anshel","year":"1999","unstructured":"Anshel I., Anshel M., Goldfeld D.: An algebraic method for public-key cryptography. Math. Res. Lett. 6, 287\u2013292 (1999)","journal-title":"Math. Res. Lett."},{"key":"157_CR4","doi-asserted-by":"crossref","first-page":"205","DOI":"10.1007\/s00200-006-0003-z","volume":"17","author":"G. Baumslag","year":"2006","unstructured":"Baumslag G., Fine B., Xu X.: Cryptosystems using linear groups. Appl. Algebra Eng. Commun. Comput. 17, 205\u2013217 (2006)","journal-title":"Appl. Algebra Eng. Commun. Comput."},{"issue":"5","key":"157_CR5","doi-asserted-by":"crossref","first-page":"647","DOI":"10.1016\/j.ansens.2003.01.001","volume":"36","author":"D. Bessis","year":"2003","unstructured":"Bessis D.: The dual braid monoid. Ann. Sci. Ecole Norm. Sup. 36(5), 647\u2013683 (2003)","journal-title":"Ann. Sci. Ecole Norm. Sup."},{"key":"157_CR6","doi-asserted-by":"crossref","first-page":"471","DOI":"10.1090\/S0894-0347-00-00361-1","volume":"14","author":"S. Bigelow","year":"2001","unstructured":"Bigelow S.: Braid groups are linear. J. Am. Math. Soc. 14, 471\u2013486 (2001)","journal-title":"J. Am. Math. Soc."},{"key":"157_CR7","doi-asserted-by":"crossref","first-page":"221","DOI":"10.4171\/GGD\/12","volume":"1","author":"J. Birman","year":"2007","unstructured":"Birman J., Gebhardt V., Gonz\u00e1lez-Meneses J.: Conjugacy in Garside groups I: cyclings, powers, and rigidity. Groups Geom. Dyn. 1, 221\u2013279 (2007)","journal-title":"Groups Geom. Dyn."},{"issue":"2","key":"157_CR8","doi-asserted-by":"crossref","first-page":"746","DOI":"10.1016\/j.jalgebra.2007.02.002","volume":"316","author":"J. Birman","year":"2007","unstructured":"Birman J., Gebhardt V., Gonz\u00e1lez-Meneses J.: Conjugacy in Garside groups III: periodic braids. J. Algebra 316(2), 746\u2013776 (2007)","journal-title":"J. Algebra"},{"issue":"1","key":"157_CR9","first-page":"16","volume":"2","author":"J. Birman","year":"2008","unstructured":"Birman J., Gebhardt V., Gonz\u00e1lez-Meneses J.: Conjugacy in Garside groups II: structure of the ultra summit set. Groups Geom. Dynam. 2(1), 16\u201331 (2008)","journal-title":"Groups Geom. Dynam."},{"issue":"2","key":"157_CR10","doi-asserted-by":"crossref","first-page":"322","DOI":"10.1006\/aima.1998.1761","volume":"139","author":"J. Birman","year":"1998","unstructured":"Birman J., Ko K., Lee S.: A new approach to the word and conjugacy problems in the braid groups. Adv. Math. 139(2), 322\u2013353 (1998)","journal-title":"Adv. Math."},{"key":"157_CR11","doi-asserted-by":"crossref","first-page":"57","DOI":"10.1007\/BF01389827","volume":"12","author":"E. Brieskorn","year":"1971","unstructured":"Brieskorn E.: Die Fundamentalgruppe des Raumes der regul\u00e4ren Orbits einer endlichen komplexen Spiegelungsgruppe. Invent. Math. 12, 57\u201361 (1971)","journal-title":"Invent. Math."},{"key":"157_CR12","doi-asserted-by":"crossref","first-page":"245","DOI":"10.1007\/BF01406235","volume":"17","author":"E. Brieskorn","year":"1972","unstructured":"Brieskorn E., Saito K.: Artin-gruppen und Coxeter-gruppen. Invent. Math. 17, 245\u2013271 (1972)","journal-title":"Invent. Math."},{"issue":"6","key":"157_CR13","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1142\/S0218216505004044","volume":"14","author":"R. Budney","year":"2005","unstructured":"Budney R.: On the image of the Lawrence-Krammer representation. J. Knot Theory Ramif. 14(6), 1\u201317 (2005)","journal-title":"J. Knot Theory Ramif."},{"key":"157_CR14","unstructured":"Cao, Z.F., Dong, X.L., Wang, L.C.: New public key cryptosystems using polynomials over non-commutative rings. Preprint, p. 35. http:\/\/eprint.iacr.org\/2007\/009 (2007)"},{"issue":"4","key":"157_CR15","doi-asserted-by":"crossref","first-page":"671","DOI":"10.1007\/BF01444642","volume":"292","author":"R. Charney","year":"1992","unstructured":"Charney R.: Artin groups of finite type are biautomatic. Math. Ann. 292(4), 671\u2013683 (1992)","journal-title":"Math. Ann."},{"issue":"3","key":"157_CR16","doi-asserted-by":"crossref","first-page":"584","DOI":"10.1007\/s00014-003-0764-y","volume":"78","author":"R. Charney","year":"2003","unstructured":"Charney R., Peifer D.: The K(\u03c0, 1)-conjecture for the affine braid groups. Comment. Math. Helv. 78(3), 584\u2013600 (2003)","journal-title":"Comment. Math. Helv."},{"key":"157_CR17","unstructured":"Cheon, J., Jun, B.: A Polynomial Time Algorithm for the Braid Diffie-Hellman Conjugacy Problem. In: CRYPTO 2003. Lect Notes Comput. Sci. 2729, 212\u2013225 (2003)"},{"key":"157_CR18","doi-asserted-by":"crossref","first-page":"101","DOI":"10.1007\/BF02785852","volume":"131","author":"A.M. Cohen","year":"2002","unstructured":"Cohen A.M., Wales D.B.: Linearity of Artin groups of finite type. Israel J. Math. 131, 101\u2013123 (2002)","journal-title":"Israel J. Math."},{"issue":"1","key":"157_CR19","doi-asserted-by":"crossref","first-page":"525","DOI":"10.1007\/BF01232254","volume":"117","author":"D. Collins","year":"1994","unstructured":"Collins D.: Relations among the squares of the generators of the braid group. Invent. Math. 117(1), 525\u2013529 (1994)","journal-title":"Invent. Math."},{"key":"157_CR20","unstructured":"Crisp, J.: Injective maps between Artin groups. In: Geometrical Group Theory Down Under, Proceedings of Special Year Geometric Group Theory, pp. 119\u2013137. Canberra, Australia (1996)"},{"issue":"2","key":"157_CR21","doi-asserted-by":"crossref","first-page":"200","DOI":"10.1006\/aima.1997.1605","volume":"125","author":"P. Dehornoy","year":"1997","unstructured":"Dehornoy P.: A fast method for comparing braids. Adv. Math. 125(2), 200\u2013235 (1997)","journal-title":"Adv. Math."},{"key":"157_CR22","doi-asserted-by":"crossref","first-page":"5","DOI":"10.1090\/conm\/360\/06566","volume":"360","author":"P. Dehornoy","year":"2004","unstructured":"Dehornoy P.: Braid-based cryptography. Contemp. Math. 360, 5\u201333 (2004)","journal-title":"Contemp. Math."},{"key":"157_CR23","doi-asserted-by":"crossref","unstructured":"Dehornoy, P., Dynnikov, I., Rolfsen, D., Wiest, B.: Ordering Braids. Math. Surv. Monogr. 148, Am. Math. Soc. (2008)","DOI":"10.1090\/surv\/148"},{"issue":"3","key":"157_CR24","doi-asserted-by":"crossref","first-page":"569","DOI":"10.1112\/S0024611599012071","volume":"79","author":"P. Dehornoy","year":"1999","unstructured":"Dehornoy P., Paris L.: Gaussian groups and garside groups, two generalizations of artin groups. Proc. London Math. Soc. 79(3), 569\u2013604 (1999)","journal-title":"Proc. London Math. Soc."},{"key":"157_CR25","doi-asserted-by":"crossref","first-page":"273","DOI":"10.1007\/BF01406236","volume":"17","author":"P. Deligne","year":"1972","unstructured":"Deligne P.: Les immeubles des groupes de tresses g\u00e9n\u00e9ralis\u00e9s. Invent. Math. 17, 273\u2013302 (1972)","journal-title":"Invent. Math."},{"issue":"1","key":"157_CR26","doi-asserted-by":"crossref","first-page":"39","DOI":"10.1016\/S0021-8693(03)00327-2","volume":"268","author":"F. Digne","year":"2003","unstructured":"Digne F.: On the linearity of Artin braid groups. J. Algebra 268(1), 39\u201357 (2003)","journal-title":"J. Algebra"},{"issue":"1","key":"157_CR27","doi-asserted-by":"crossref","first-page":"23","DOI":"10.4171\/CMH\/41","volume":"81","author":"F. Digne","year":"2006","unstructured":"Digne F.: Pr\u00e9sentations duales des groupes de tresses de type affine \u00c3. Commun. Math. Helv. 81(1), 23\u201347 (2006)","journal-title":"Commun. Math. Helv."},{"key":"157_CR28","unstructured":"Dynnikov, I.A.: On a Yang-Baxter mapping and the Dehornoy ordering. Uspekhi Mat. Nauk 57(3), 151\u2013152 (2002) (Russian); English Translation in Russ. Math. Surv. 57(3), 592\u2013594 (2002)"},{"key":"157_CR29","unstructured":"Eick, B., Kahrobaei, D.: Polycyclic Groups: A New Platform for Cryptology? Preprint, p. 7. http:\/\/arxiv.org\/abs\/math\/0411077 (2004)"},{"issue":"4","key":"157_CR30","doi-asserted-by":"crossref","first-page":"479","DOI":"10.1093\/qmath\/45.4.479","volume":"45","author":"E. El-Rifai","year":"1994","unstructured":"El-Rifai E., Morton H.: Algorithms for positive braids. Quart. J. Math. 45(4), 479\u2013497 (1994)","journal-title":"Quart. J. Math."},{"key":"157_CR31","doi-asserted-by":"crossref","DOI":"10.1201\/9781439865699","volume-title":"Word Processing in Groups","author":"D.B.A. Epstein","year":"1992","unstructured":"Epstein D.B.A., Paterson M.S., Camon G.W., Holt D.F., Levy S.V., Thurston W.P.: Word Processing in Groups. Jones and Bartlett Publishers, Boston, MA, USA (1992)"},{"issue":"11","key":"157_CR32","doi-asserted-by":"crossref","first-page":"4207","DOI":"10.1080\/00927870600876375","volume":"34","author":"N. Franco","year":"2006","unstructured":"Franco N.: Conjugacy problem for subgroups with applications to Artin groups and braid type group. Commun. Algebra 34(11), 4207\u20134215 (2006)","journal-title":"Commun. Algebra"},{"issue":"1","key":"157_CR33","doi-asserted-by":"crossref","first-page":"112","DOI":"10.1016\/S0021-8693(03)00292-8","volume":"266","author":"N. Franco","year":"2003","unstructured":"Franco N., Gonz\u00e1lez-Meneses J.: Conjugacy problem for braid groups and Garside groups. J. Algebra 266(1), 112\u2013132 (2003)","journal-title":"J. Algebra"},{"key":"157_CR34","doi-asserted-by":"crossref","first-page":"329","DOI":"10.1142\/9789814291415_0006","volume-title":"Braids: Introductory Lectures on Braids, Configurations and Their Applications","author":"D. Garber","year":"2009","unstructured":"Garber D.: Braid group cryptography. In: Berrick, J., Cohen, F.R., Hanbury, E. (eds.) Braids: Introductory Lectures on Braids, Configurations and Their Applications, pp. 329\u2013403. World Scientific, Singapore (2009)"},{"key":"157_CR35","doi-asserted-by":"crossref","first-page":"323","DOI":"10.1016\/j.aam.2005.03.002","volume":"35","author":"D. Garber","year":"2005","unstructured":"Garber D., Kaplan S., Teicher M., Tsaban B., Vishne U.: Probabilistic solutions of equations in the braid group. Adv. Appl. Math. 35, 323\u2013334 (2005)","journal-title":"Adv. Appl. Math."},{"key":"157_CR36","doi-asserted-by":"crossref","first-page":"75","DOI":"10.1090\/conm\/418\/07947","volume":"418","author":"D. Garber","year":"2006","unstructured":"Garber D., Kaplan S., Teicher M., Tsaban B., Vishne U.: Length-based conjugacy search in the braid group. Contemp. Math. 418, 75\u201387 (2006)","journal-title":"Contemp. Math."},{"issue":"1","key":"157_CR37","doi-asserted-by":"crossref","first-page":"235","DOI":"10.1093\/qmath\/20.1.235","volume":"20","author":"F. Garside","year":"1969","unstructured":"Garside F.: The braid group and other groups. Quart. J. Math. 20(1), 235\u2013254 (1969)","journal-title":"Quart. J. Math."},{"issue":"1","key":"157_CR38","doi-asserted-by":"crossref","first-page":"282","DOI":"10.1016\/j.jalgebra.2005.02.002","volume":"292","author":"V. Gebhardt","year":"2005","unstructured":"Gebhardt V.: A new approach to the conjugacy problem in Garside groups. J. Algebra 292(1), 282\u2013302 (2005)","journal-title":"J. Algebra"},{"issue":"1","key":"157_CR39","doi-asserted-by":"crossref","first-page":"85","DOI":"10.1007\/s00209-009-0502-2","volume":"265","author":"V. Gebhardt","year":"2010","unstructured":"Gebhardt V., Gonz\u00e1lez-Meneses J.: The cyclic sliding operation in Garside groups. Math. Z. 265(1), 85\u2013114 (2010)","journal-title":"Math. Z."},{"issue":"1","key":"157_CR40","doi-asserted-by":"crossref","first-page":"125","DOI":"10.2307\/2944334","volume":"134","author":"S. Gersten","year":"1991","unstructured":"Gersten S., Short H.: Rational subgroups of biautomatic groups. Ann. Math. 134(1), 125\u2013158 (1991)","journal-title":"Ann. Math."},{"issue":"1","key":"157_CR41","doi-asserted-by":"crossref","first-page":"641","DOI":"10.1007\/BF01232283","volume":"105","author":"S. Gersten","year":"1991","unstructured":"Gersten S., Short H.: Small cancellation theory and automatic groups: part II. Invent. Math. 105(1), 641\u2013662 (1991)","journal-title":"Invent. Math."},{"key":"157_CR42","doi-asserted-by":"crossref","first-page":"187","DOI":"10.1007\/3-540-36288-6_14","volume":"2567","author":"D. Hofheinz","year":"2002","unstructured":"Hofheinz D., Steinwandt R.: A practical attack on some braid group based cryptographic primitives. Lect. Notes Comput. Sci. 2567, 187\u2013198 (2002)","journal-title":"Lect. Notes Comput. Sci."},{"key":"157_CR43","doi-asserted-by":"crossref","first-page":"176","DOI":"10.1007\/3-540-45450-0_15","volume":"2384","author":"J. Hughes","year":"2002","unstructured":"Hughes J.: A linear algebraic attack on the AAFG1 braid group cryptosystem. Lect. Notes Comput. Sci. 2384, 176\u2013189 (2002)","journal-title":"Lect. Notes Comput. Sci."},{"key":"157_CR44","unstructured":"Hughes, J., Tannenbaum, A.: Length-based attacks for certain group based encryption rewriting systems. In: S\u00c9curit\u00e9 des Communications sur Internet (SECI02), H\u00f4tel El Mechtel. Tunis, Tunisie, pp. 5\u201312 (2002)"},{"key":"157_CR45","doi-asserted-by":"crossref","DOI":"10.1017\/CBO9780511623646","volume-title":"Reflection Groups and Coxeter Groups","author":"J. Humphreys","year":"1990","unstructured":"Humphreys J.: Reflection Groups and Coxeter Groups. Cambridge University Press, Cambridge (1990)"},{"key":"157_CR46","first-page":"641","volume":"30","author":"D. Johnson","year":"1985","unstructured":"Johnson D., Albar M.: The centre of the circular braid group. Math. Japon. 30, 641\u2013645 (1985)","journal-title":"Math. Japon."},{"issue":"3","key":"157_CR47","doi-asserted-by":"crossref","first-page":"257","DOI":"10.1007\/s00200-006-0007-8","volume":"17","author":"A. Kalka","year":"2006","unstructured":"Kalka A.: Representation attacks on the braid Diffie-Hellman public key encryption. Appl. Algebra Eng. Commun. Comput. 17(3), 257\u2013266 (2006)","journal-title":"Appl. Algebra Eng. Commun. Comput."},{"issue":"2","key":"157_CR48","doi-asserted-by":"crossref","first-page":"665","DOI":"10.1016\/S0021-8693(03)00167-4","volume":"264","author":"I. Kapovich","year":"2003","unstructured":"Kapovich I., Myasnikov A., Schupp P., Shpilrain V.: Generic-case complexity, decision problems in group theory, and random walks. J. Algebra 264(2), 665\u2013694 (2003)","journal-title":"J. Algebra"},{"key":"157_CR49","doi-asserted-by":"crossref","first-page":"85","DOI":"10.1142\/S0218196702000997","volume":"12","author":"R. Kent IV","year":"2002","unstructured":"Kent IV R., Peifer D.: A geometric and algebraic description of annular braid groups. Int. J. Algebra Comput. 12, 85\u201397 (2002)","journal-title":"Int. J. Algebra Comput."},{"key":"157_CR50","doi-asserted-by":"crossref","first-page":"166","DOI":"10.1007\/3-540-44598-6_10","volume":"1880","author":"K. Ko","year":"2000","unstructured":"Ko K., Lee S., Cheon J., Han J., Kang J., Park C.: New public-key cryptosystem using braid groups. CRYPTO 2000, Lect. Notes Comput. Sci. 1880, 166\u2013183 (2000)","journal-title":"Notes Comput. Sci."},{"issue":"1","key":"157_CR51","doi-asserted-by":"crossref","first-page":"131","DOI":"10.2307\/3062152","volume":"155","author":"D. Krammer","year":"2002","unstructured":"Krammer D.: Braid groups are linear. Ann. Math. 155(1), 131\u2013156 (2002)","journal-title":"Ann. Math."},{"issue":"5","key":"157_CR52","doi-asserted-by":"crossref","first-page":"715","DOI":"10.1142\/S021821659700039X","volume":"6","author":"C. Labruere","year":"1997","unstructured":"Labruere C.: Generalized braid groups and mapping class groups. J. Knot Theory Ramif. 6(5), 715\u2013726 (1997)","journal-title":"J. Knot Theory Ramif."},{"issue":"3","key":"157_CR53","doi-asserted-by":"crossref","first-page":"1121","DOI":"10.1080\/00927870701715605","volume":"36","author":"E. Lee","year":"2008","unstructured":"Lee E., Lee S.: Abelian subgroups of Garside groups. Commun. Algebra 36(3), 1121\u20131139 (2008)","journal-title":"Commun. Algebra"},{"key":"157_CR54","unstructured":"McCammond, J.: Dual euclidean Artin groups and the failure of the lattice property. Preprint, p. 40. http:\/\/www.math.ucsb.edu\/~mccammon\/papers\/lattice-failure.pdf (2011)"},{"key":"157_CR55","doi-asserted-by":"crossref","first-page":"302","DOI":"10.1007\/11745853_20","volume":"3958","author":"A. Myasnikov","year":"2006","unstructured":"Myasnikov A., Shpilrain V., Ushakov A.: Random subgroups of braid groups: an approach to cryptanalysis of a braid group based cryptographic protocol. Lect. Notes Comput. Sci. 3958, 302\u2013314 (2006)","journal-title":"Lect. Notes Comput. Sci."},{"key":"157_CR56","volume-title":"Group-based Cryptography","author":"A. Myasnikov","year":"2008","unstructured":"Myasnikov A., Shpilrain V., Ushakov A.: Group-based Cryptography. Birkh\u00e4user Verlag, Springer, Berlin (2008)"},{"key":"157_CR57","unstructured":"Myasnikov, A., Ushakov, A.: Length based attack and braid groups: Cryptanalysis of Anshel-Anshel-Goldfeld key exchange protocol. In: Public Key Cryptography PKC 2007. Lect. Notes Comput. Sci. 4450, 76\u201388 (2007)"},{"key":"157_CR58","volume-title":"Handbook of Teichm\u00fcller Theory, vol 2","author":"L. Paris","year":"2008","unstructured":"Paris L.: Braid groups and Artin groups. In: Papadopoulus, A. (ed.) Handbook of Teichm\u00fcller Theory, vol 2, EMS Publishing House, Zurich (2008)"},{"key":"157_CR59","doi-asserted-by":"crossref","first-page":"843","DOI":"10.1016\/S1631-073X(02)02370-1","volume":"334","author":"M. Picantin","year":"2002","unstructured":"Picantin M.: Explicit presentations for the dual braid monoids. C. R. Acad. Sci. Paris, Ser. I 334, 843\u2013848 (2002)","journal-title":"C. R. Acad. Sci. Paris, Ser. I"},{"key":"157_CR60","doi-asserted-by":"crossref","unstructured":"Ram, A., Ramagge, J.: Affine Hecke algebras, cyclotomic Hecke algebras and Clifford theory. A Tribute to CS Seshadri: A Collection of Articles on Geometry and Representation Theory (2003)","DOI":"10.1007\/978-93-86279-11-8_26"},{"key":"157_CR61","doi-asserted-by":"crossref","first-page":"151","DOI":"10.1007\/11496137_11","volume":"3531","author":"V. Shpilrain","year":"2005","unstructured":"Shpilrain V., Ushakov A.: Thompson\u2019s group and public key cryptography. Lect. Notes Comput. Sci. 3531, 151\u2013163 (2005)","journal-title":"Lect. Notes Comput. Sci."},{"issue":"2","key":"157_CR62","doi-asserted-by":"crossref","first-page":"420","DOI":"10.1016\/j.dam.2005.03.015","volume":"154","author":"H. Sibert","year":"2006","unstructured":"Sibert H., Dehornoy P., Girault M.: Entity authentication schemes using braid word reduction. Discrete Appl. Math. 154(2), 420\u2013436 (2006)","journal-title":"Discrete Appl. Math."},{"issue":"2","key":"157_CR63","first-page":"384","volume":"48","author":"V. Sidelnikov","year":"1994","unstructured":"Sidelnikov V., Cherepnev M., Yaschenko V.: Systems of open distribution of keys on the basis of noncommutative semigroups. Russ. Acad. Sci. Dokl. Math. 48(2), 384\u2013386 (1994)","journal-title":"Russ. Acad. Sci. Dokl. Math."},{"issue":"1","key":"157_CR64","doi-asserted-by":"crossref","first-page":"96","DOI":"10.1016\/0021-8693(66)90053-6","volume":"4","author":"J. Tits","year":"1966","unstructured":"Tits J.: Normalisateurs de tores I Groupes de Coxeteretendus. J. Algebra 4(1), 96\u2013116 (1966)","journal-title":"J. Algebra"},{"key":"157_CR65","doi-asserted-by":"crossref","first-page":"469","DOI":"10.1007\/s002200000221","volume":"212","author":"A. Vershik","year":"2000","unstructured":"Vershik A., Nechaev S., Bikbov R.: Statistical properties of braid groups with application to braid groups and growth of heaps. Commun. Math. Phys. 212, 469\u2013501 (2000)","journal-title":"Commun. Math. Phys."},{"key":"157_CR66","unstructured":"Wagner, N., Magyarik, M.: A public key cryptosystem based on the word problem. In: CRYPTO 1984. Lect. Notes Comput. Sci. 196, 19\u201336 (1985)"},{"key":"157_CR67","doi-asserted-by":"crossref","first-page":"524","DOI":"10.1007\/s11432-010-0046-4","volume":"53","author":"L.C. Wang","year":"2010","unstructured":"Wang L.C., Wang L.H., Cao Z.F., Yang Y.X., Niu X.X.: Conjugate adjoining problem in braid groups and new design of braid-based signatures. Sci. China Inform. Sci. 53, 524\u2013536 (2010)","journal-title":"Sci. China Inform. Sci."},{"key":"157_CR68","unstructured":"Zheng, H.: General cycling operations in Garside groups. Preprint, p. 22. http:\/\/arxiv.org\/abs\/math\/0605741 (2006)"}],"container-title":["Applicable Algebra in Engineering, Communication and Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00200-011-0157-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s00200-011-0157-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00200-011-0157-1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,20]],"date-time":"2019-06-20T02:56:53Z","timestamp":1560999413000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s00200-011-0157-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,11,29]]},"references-count":68,"journal-issue":{"issue":"5-6","published-print":{"date-parts":[[2011,12]]}},"alternative-id":["157"],"URL":"https:\/\/doi.org\/10.1007\/s00200-011-0157-1","relation":{},"ISSN":["0938-1279","1432-0622"],"issn-type":[{"value":"0938-1279","type":"print"},{"value":"1432-0622","type":"electronic"}],"subject":[],"published":{"date-parts":[[2011,11,29]]}}}