P. D. Domich, R. Kannan and L. E. Trotter, Jr., Hermite normal form computation using modulo determinant arithmetic, Math. Oper. Res. 12 (1987), 1, 50–59. Google Scholar
B. Eick and D. Kahrobaei, Polycyclic groups: A new platform for cryptology?, preprint 2004, http://arxiv.org/abs/math/0411077.
D. Hofheinz and R. Steinwandt, A practical attack on some braid group based cryptographic primitives, Public Key Cryptography (PKC 2003), Lecture Notes in Comput. Sci. 2567, Springer, Berlin (2002), 187–198. Google Scholar
D. Kahrobaei and H. T. Lam, Heisenberg groups as platform for the AAG key-exchange protocol, IEEE 22nd International Conference on Network Protocols (Raleigh 2014), IEEE Press, Piscataway (2014), 660–664. Google Scholar
K. H. Ko, S. J. Lee, J. H. Cheon, J. W. Han, J. Kang and C. Park, New public-key cryptosystem using braid groups, Advances in Cryptology (CRYPTO 2000), Lecture Notes in Comput. Sci. 1880, Springer, Berlin (2000), 166–183. Google Scholar
S. J. Lee and E. Lee, Potential weaknesses of the commutator key agreement protocol based on braid groups, Advances in Cryptology (EUROCRYPT 2002), Lecture Notes in Comput. Sci. 2332, Springer, Berlin (2002), 14–28. Google Scholar
J. Macdonald, A. Myasnikov, A. Nikolaev and S. Vassileva, Logspace and compressed-word computations in nilpotent groups, preprint 2015, http://arxiv.org/abs/1503.03888.
D. Micciancio and B. Warinschi, A linear space algorithm for computing the hermite normal form, Electronic Colloquium on Computational Complexity, Report No. 74, Department of Computer Science and Engineering, University of California, San Diego, 2000. Google Scholar
A. Myasnikov, V. Shpilrain and A. Ushakov, Random subgroups of braid groups: An approach to cryptanalysis of a braid group based cryptographic protocol, Public Key Cryptography (PKC 2006), Lecture Notes in Comput. Sci. 3958, Springer, Berlin (2006), 302–314. Google Scholar
A. Myasnikov and A. Ushakov, Length based attack and braid groups: Cryptanalysis of Anshel–Anshel–Goldfeld key exchange protocol, Public Key Cryptography (PKC 2007), Lecture Notes in Comput. Sci. 4450, Springer, Berlin (2007), 76–88. Google Scholar
D. Ruinskiy, A. Shamir and B. Tsaban, Length-based cryptanalysis: The case of Thompson's group, J. Math. Cryptol. 1 (2008), 4, 359–372. Google Scholar
V. Shpilrain and A. Ushakov, Thompson's group and public key cryptography, Proceedings of the Third International Conference on Applied Cryptography and Network Security (ACNS'05), Springer, Berlin (2005), 151–163. Google Scholar
V. Shpilrain and A. Ushakov, The conjugacy search problem in public key cryptography: Unnecessary and insufficient, Appl. Algebra Engrg. Comm. Comput. 17 (2006), 3–4, 285–289. Google Scholar