{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,17]],"date-time":"2026-04-17T22:16:28Z","timestamp":1776464188222,"version":"3.51.2"},"publisher-location":"New York, NY","reference-count":20,"publisher":"Springer New York","isbn-type":[{"value":"9780387973173","type":"print"},{"value":"9780387348056","type":"electronic"}],"license":[{"start":{"date-parts":[[1990,1,1]],"date-time":"1990-01-01T00:00:00Z","timestamp":631152000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1990]]},"DOI":"10.1007\/0-387-34805-0_40","type":"book-chapter","created":{"date-parts":[[2007,11,9]],"date-time":"2007-11-09T02:05:53Z","timestamp":1194573953000},"page":"428-446","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":462,"title":["One Way Hash Functions and DES"],"prefix":"10.1007","author":[{"given":"Ralph C.","family":"Merkle","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2001,7,6]]},"reference":[{"key":"40_CR1","unstructured":"\u201cSecrecy, Authentication, and Public Key Systems\u201d, Stanford Ph.D. thesis, 1979, by Ralph C. Merkle."},{"key":"40_CR2","unstructured":"\u201cA Certified Digital Signature\u201d, unpublished paper. 1979. To appear in Crypto\u2019 89."},{"key":"40_CR3","doi-asserted-by":"crossref","unstructured":"\u201cUniversal One-Way Hash Functions and their Cryptographic Applications\u201d. Moni Naor and Moti Yung. Proceedings of the Twenty First Annual ACM Symposium on Theory of Computing, Seattle, Washington May 15\u201317. 1989. page 33\u201343.","DOI":"10.1145\/73007.73011"},{"key":"40_CR4","unstructured":"\u201cA High Speed Manipulation Detection Code\u201d, by Robert R. Jueneman, Advances in Cryptology-CRYPTO\u2019 86, Springer Verlag. Lecture Notes on Computer Science, Vol. 263. page 327 to 346."},{"key":"40_CR5","unstructured":"\u201cAnother Birthday Attack\u201d by Don Coppersmith, Advances in Cryptology-CRYPTO\u2019 85. Springer Verlag, Lecture Notes on Computer Science, Vol. 218, pages 14 to 17."},{"key":"40_CR6","unstructured":"\u201cA digital signature based on a conventional encryption function\u201d. by Ralph C. Merkle, Advances in Cryptology CRYPTO 87, Springer Verlag, Lecture Notes on Computer Science, Vol. 293. page 369\u2013378."},{"key":"40_CR7","unstructured":"\u201cCryptography and Data Security\u201d, by Dorothy E. R. Denning. Addison-Wesley 1982. page 170."},{"issue":"7","key":"40_CR8","doi-asserted-by":"crossref","first-page":"465 to 467","DOI":"10.1145\/358699.358718","volume":"24","author":"R. C. Merkle","year":"1981","unstructured":"\u201cOn the security of multiple encryption\u201d. by Ralph C. Merkle. CACM Vol. 24 No. 7, July 1981 pages 465 to 467.","journal-title":"CACM"},{"key":"40_CR9","unstructured":"\u201cResults of an initial attempt to cryptanalyze the NBS Data Encryption Standard\u201d. by Martin Hellman et. al., Information Systems lab. report SEL 76-042, Stanford University 1976."},{"key":"40_CR10","doi-asserted-by":"crossref","first-page":"656","DOI":"10.1002\/j.1538-7305.1949.tb00928.x","volume":"28","author":"C. E. Shannon","year":"1949","unstructured":"\u201cCommunication Theory of Secrecy Systems\u201d, by C. E. Shannon, Bell Sys. Tech. Jour. 28 (Oct. 1949) 656\u2013715","journal-title":"Bell Sys. Tech. Jour."},{"issue":"9","key":"40_CR11","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1109\/MCOM.1985.1092643","volume":"23","author":"R. R. Jueneman","year":"1985","unstructured":"\u201cMessage Authentication\u201d by R. R. Jueneman. S. M. Matyas, C. H. Meyer, IEEE Communications Magazine, Vol. 23, No. 9. September 1985 pages 29\u201340.","journal-title":"IEEE Communications Magazine"},{"issue":"10A","key":"40_CR12","first-page":"5658","volume":"27","author":"S. M. Matyas","year":"1985","unstructured":"\u201cGenerating strong one-way functions with cryptographic algorithm\u201d, by S. M. Matyas. C. H. Meyer, and J. Oseas, IBM Technical Disclosure Bulletin, Vol. 27, No. 10A. March 1985 pages 5658\u20135659","journal-title":"IBM Technical Disclosure Bulletin"},{"key":"40_CR13","unstructured":"\u201cAnalysis of Jueneman\u2019s MDC Scheme\u201d. by Don Coppersmith, preliminary version June 9.1988. Analysis of the system presented in [4]."},{"issue":"5","key":"40_CR14","doi-asserted-by":"publisher","first-page":"550","DOI":"10.1109\/5.4441","volume":"76","author":"M.E. Smid","year":"1988","unstructured":"\u201cThe Data Encryption Standard: Past and Future\u201d by M.E. Smid and D.K. Branstad, Proc. of the IEEE, Vol 76 No. 5 pp 550\u2013559, May 1988","journal-title":"Proc. of the IEEE"},{"key":"40_CR15","unstructured":"\u201cDefending Secrets, Sharing Data: New Locks and Keys for Electronic Information\u201d, U.S. Congress. Office of Technology Assessment OTA-CIT-310, U.S. Government Printing Office, October 1987"},{"key":"40_CR16","doi-asserted-by":"crossref","unstructured":"\u201cExhaustive cryptanalysis of the NBS data encryption standard\u201d. Computer, June 1977. pages 74\u201378","DOI":"10.1109\/C-M.1977.217750"},{"key":"40_CR17","unstructured":"\u201cCryptograhy: a new dimension in data security\u201d, by Carl H. Meyer and Stephen M. Matyas, Wiley 1982."},{"key":"40_CR18","unstructured":"\u201cSecure program code with modification detection code\u201d. by Carl H. Meyer and Michael Schilling; Proceedings of the 5th Worldwide Congress on Computers and Communication Security and Protection \u2014 SECURICOM 88. pp. 111\u2013130, SEDEP, 8. Rud de la Michodiese, 75002. Paris, France."},{"key":"40_CR19","unstructured":"\u201cCryptography \u2014 A State of the Art Review,\u201d by Carl H. Meyer, COMEURO 89. Hamburg, May 8\u201312, 1989. Proceedings-VLSI and Computer Peripherals, 3rd Annual European Computer Conference, pp. 150\u2013154."},{"key":"40_CR20","unstructured":"\u201cDesign Principles for Hash Functions\u201d by Ivan Damgaard. Crypto\u2019 89."}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2014 CRYPTO\u2019 89 Proceedings"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/0-387-34805-0_40","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,22]],"date-time":"2025-01-22T05:29:14Z","timestamp":1737523754000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/0-387-34805-0_40"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1990]]},"ISBN":["9780387973173","9780387348056"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/0-387-34805-0_40","relation":{},"ISSN":["0302-9743"],"issn-type":[{"value":"0302-9743","type":"print"}],"subject":[],"published":{"date-parts":[[1990]]},"assertion":[{"value":"6 July 2001","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}