{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T00:00:45Z","timestamp":1725494445497},"publisher-location":"New York, NY","reference-count":14,"publisher":"Springer New York","isbn-type":[{"type":"print","value":"9780387973173"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/0-387-34805-0_15","type":"book-chapter","created":{"date-parts":[[2007,11,8]],"date-time":"2007-11-08T21:05:53Z","timestamp":1194555953000},"page":"154-163","source":"Crossref","is-referenced-by-count":3,"title":["A Chosen Text Attack on The Modified Cryptographic Checksum Algorithm of Cohen and Huang"],"prefix":"10.1007","author":[{"given":"Bart","family":"Preneel","sequence":"first","affiliation":[]},{"given":"Antoon","family":"Bosselaers","sequence":"additional","affiliation":[]},{"given":"Ren\u00e9","family":"Govaerts","sequence":"additional","affiliation":[]},{"given":"Joos","family":"Vandewalle","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"15_CR1","doi-asserted-by":"crossref","unstructured":"S.G. Akl, \u201cOn the Security of Compressed Encodings\u201d, Advances in Cryptology, Proc. Crypto 83, Plenum Press, New York, p. 209\u2013230.","DOI":"10.1007\/978-1-4684-4730-9_18"},{"key":"15_CR2","unstructured":"E.F. Brickell, \u201cA Survey of Hardware Implementations of RSA\u201d, Advances in Cryptology, Proc. Crypto\u2019 89."},{"key":"15_CR3","doi-asserted-by":"publisher","first-page":"505","DOI":"10.1016\/0167-4048(87)90031-9","volume":"6","author":"F. Cohen","year":"1987","unstructured":"F. Cohen, \u201cA Cryptographic Checksum for Integrity Protection\u201d, Computers & Security, Vol. 6, p. 505\u2013510, 1987.","journal-title":"Computers & Security"},{"key":"15_CR4","unstructured":"I.B. Damg\u00e5rd, \u201cDesign principles for hash functions\u201d, Advances in Cryptology, Proc. Crypto\u2019 89."},{"key":"15_CR5","doi-asserted-by":"crossref","unstructured":"M. Girault, \u201cHash-functions Using Modulo-n Operations\u201d, Advances in Cryptology, Proc. Crypto 86, Springer Verlag, p. 217\u2013226.","DOI":"10.1007\/3-540-39118-5_20"},{"key":"15_CR6","unstructured":"G.H. Hardy and E.M. Wright, \u201cAn introduction to the theory of numbers. 5th edition.\u201d, Oxford University Press, 1979."},{"key":"15_CR7","doi-asserted-by":"crossref","unstructured":"F. Hoornaert, M. Decroos, J. Vandewalle and R. Govaerts, \u201cFast RSA-Hardware: Dream or Reality?\u201d, Advances in Cryptology, Proc. Eurocrypt 88, Springer Verlag, p. 257\u2013264.","DOI":"10.1007\/3-540-45961-8_23"},{"key":"15_CR8","doi-asserted-by":"publisher","first-page":"503","DOI":"10.1016\/0167-4048(88)90204-0","volume":"7","author":"Y.J. Huang","year":"1988","unstructured":"Y.J. Huang and F. Cohen, \u201cSome Weak Points of One Fast Cryptographic Checksum Algorithm and its Improvement\u201d, Computers & Security, Vol. 7, p. 503\u2013505, 1988.","journal-title":"Computers & Security"},{"key":"15_CR9","doi-asserted-by":"crossref","unstructured":"R.R. Jueneman, \u201cA High Speed Manipulation Detection Code\u201d, Advances in Cryptology, Proc. Crypto 86, Springer Verlag, p. 327\u2013347.","DOI":"10.1007\/3-540-47721-7_25"},{"key":"15_CR10","unstructured":"R.C. Merkle, \u201cOne way hash functions and DES\u201d, Advances in Cryptology, Proc. Crypto\u2019 89."},{"key":"15_CR11","unstructured":"S.F. Mj\u00f8lsnes, \u201cA Hash Of Some One-Way Hash functions and Birthdays\u201d, preprint."},{"key":"15_CR12","unstructured":"B. Preneel, R. Govaerts and J. Vandewalle, \u201cCryptographically Secure Hash Functions: an Overview\u201d, Internal Report, ESAT Laboratories K.U.Leuven, 1989."},{"issue":"2","key":"15_CR13","doi-asserted-by":"publisher","first-page":"120","DOI":"10.1145\/359340.359342","volume":"21","author":"R.L. Rivest","year":"1978","unstructured":"R.L. Rivest, A. Shamir and L. Adleman, \u201cA Method for Obtaining Digital Signatures and Public-Key Cryptosystems\u201d, Comm. ACM, Vol. 21, No. 2, p. 120\u2013126, 1978.","journal-title":"Comm. ACM"},{"issue":"5","key":"15_CR14","doi-asserted-by":"publisher","first-page":"603","DOI":"10.1109\/5.4445","volume":"76","author":"G.J. Simmons","year":"1988","unstructured":"G.J. Simmons, \u201cA Survey of Information Authentication\u201d, Proc. IEEE, Vol. 76, No. 5, p. 603\u2013620, 1988.","journal-title":"Proc. IEEE"}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2014 CRYPTO\u2019 89 Proceedings"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/0-387-34805-0_15.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T01:28:04Z","timestamp":1619486884000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/0-387-34805-0_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9780387973173"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/0-387-34805-0_15","relation":{},"subject":[]}}