Key agreement, the Algebraic Eraser$^{TM}$, and lightweight cryptography by I. Anshel, M. Anshel, D. Goldfeld, and S. Lemieux Designing key transport protocols using combinatorial group theory by G. Baumslag, T. Camps, B. Fine, G. Rosenberger, and X. Xu Geometric key establishment by A. Berenstein and L. Chernyak Using shifted conjugacy in braid-based cryptography by P. Dehornoy Length-based conjugacy search in the braid group by D. Garber, S. Kaplan, M. Teicher, B. Tsaban, and U. Vishne Towards provable security for cryptographic constructions arising from combinatorial group theory by M. I. Gonzalez Vasco, R. Steinwandt, and J. L. Villar Constructions in public-key cryptography over matrix groups by D. Grigoriev and I. Ponomarenko A practical attack on the root problem in braid groups by A. Groch, D. Hofheinz, and R. Steinwandt An attack on a group-based cryptoraphic scheme by D. Hofheinz and D. Unruh Algebraic problems in symmetric cryptography: Two recent results on highly nonlinear functions by N. G. Leander Inverting the Burau and Lawrence-Krammer representations by E. Lee A new key exchange protocol based on the decomposition problem by V. Shpilrain and A. Ushakov Using the subgroup membership search problem in public key cryptography by V. Shpilrain and G. Zapata.