{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T15:53:20Z","timestamp":1725551600590},"publisher-location":"Berlin, Heidelberg","reference-count":28,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540307068"},{"type":"electronic","value":"9783540324225"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005]]},"DOI":"10.1007\/11593980_21","type":"book-chapter","created":{"date-parts":[[2005,11,3]],"date-time":"2005-11-03T07:40:20Z","timestamp":1131003620000},"page":"277-289","source":"Crossref","is-referenced-by-count":1,"title":["Modifications of SHA-0 to Prevent Attacks"],"prefix":"10.1007","author":[{"given":"Roshni","family":"Chatterjee","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Moiz A.","family":"Saifee","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Dipanwita","family":"RoyChowdhury","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"key":"21_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"89","DOI":"10.1007\/3-540-60865-6_46","volume-title":"Fast Software Encryption","author":"R. Anderson","year":"1996","unstructured":"Anderson, R., Biham, E.: Tiger: A Fast New Hash Function. In: Gollmann, D. (ed.) FSE 1996. LNCS, vol.\u00a01039, pp. 89\u201397. Springer, Heidelberg (1996)"},{"unstructured":"Bakhtiari, S., Safavi-Naini, R., Pieprzyk, J.: Cryptographic Hash Functions: A Survey, http:\/\/www.securitytechnet.com\/resource\/crypto\/algorithm\/Symmetric\/bakhtiari95cryptographic.pdf","key":"21_CR2"},{"key":"21_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"71","DOI":"10.1007\/3-540-47555-9_6","volume-title":"Advances in Cryptology - EUROCRYPT \u201992","author":"T. Berson","year":"1993","unstructured":"Berson, T.: Differential Cryptanalysis Mod 232 with Applications to MD5. In: Rueppel, R.A. (ed.) EUROCRYPT 1992. LNCS, vol.\u00a0658, pp. 71\u201380. Springer, Heidelberg (1993)"},{"key":"21_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"290","DOI":"10.1007\/978-3-540-28628-8_18","volume-title":"Advances in Cryptology \u2013 CRYPTO 2004","author":"E. Biham","year":"2004","unstructured":"Biham, E., Chen, R.: Near-Collisions of SHA-0 -2004. In: Franklin, M. (ed.) CRYPTO 2004. LNCS, vol.\u00a03152, pp. 290\u2013306. Springer, Heidelberg (2004)"},{"issue":"1","key":"21_CR5","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/BF00630563","volume":"4","author":"E. Biham","year":"1991","unstructured":"Biham, E., Shamir, A.: Differential Cryptanalysis of DES-like Cryptosystems. Journal of Cryptology\u00a04(1), 3\u201372 (1991)","journal-title":"Journal of Cryptology"},{"key":"21_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"194","DOI":"10.1007\/3-540-46766-1_14","volume-title":"Advances in Cryptology - CRYPTO \u201991","author":"B. Boer","year":"1992","unstructured":"Boer, B., Bosselaers, A.: An attack on the last two rounds of MD4. In: Feigenbaum, J. (ed.) CRYPTO 1991. LNCS, vol.\u00a0576, pp. 194\u2013203. Springer, Heidelberg (1992)"},{"doi-asserted-by":"crossref","unstructured":"Boer, B., Bosselaers, A.: Collisions for the Compression Function of MD5. In: Helleseth, T. (ed.) EUROCRYPT 1993. LNCS, vol.\u00a0765, pp. 293\u2013305. Springer, Heidelberg (1994)","key":"21_CR7","DOI":"10.1007\/3-540-48285-7_26"},{"key":"21_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"56","DOI":"10.1007\/BFb0055720","volume-title":"Advances in Cryptology - CRYPTO \u201998","author":"F. Chabaud","year":"1998","unstructured":"Chabaud, F., Joux, A.: Differential Collisions in SHA-0. In: Krawczyk, H. (ed.) CRYPTO 1998. LNCS, vol.\u00a01462, pp. 56\u201371. Springer, Heidelberg (1998)"},{"issue":"4","key":"21_CR9","doi-asserted-by":"publisher","first-page":"253","DOI":"10.1007\/s001459900047","volume":"11","author":"H. Dobbertin","year":"1998","unstructured":"Dobbertin, H.: Cryptanalysis of MD4. Journal of Cryptology\u00a011(4), 253\u2013271 (1998)","journal-title":"Journal of Cryptology"},{"unstructured":"Dobbertin, H.: Cryptanalysis of MD5 Compress. In: Maurer, U.M. (ed.) EUROCRYPT 1996. LNCS, vol.\u00a01070. Springer, Heidelberg (1996)","key":"21_CR10"},{"unstructured":"Dobbertin, H.: The Status of MD5 After a Recent Attack. CryptoBytes (Summer 1996)","key":"21_CR11"},{"key":"21_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"71","DOI":"10.1007\/3-540-60865-6_44","volume-title":"Fast Software Encryption","author":"H. Dobbertin","year":"1996","unstructured":"Dobbertin, H., Bosselaers, A., Preneel, B.: RIPEMD-160, a strengthened version of RIPEMD. In: Gollmann, D. (ed.) FSE 1996. LNCS, vol.\u00a01039, pp. 71\u201382. Springer, Heidelberg (1996)"},{"key":"21_CR13","doi-asserted-by":"crossref","first-page":"239","DOI":"10.1007\/978-1-4419-9226-0_23","volume-title":"Artificial Intelligence and Security in Computing Systems","author":"T.A. Gajewski","year":"2003","unstructured":"Gajewski, T.A., Janicka-Lipska, I., Stoklosa, J.: The FSR-255 family of hash functions with a variable length of hash result. In: Artificial Intelligence and Security in Computing Systems, pp. 239\u2013248. Kluwer Academic Publishers, Dordrecht (2003)"},{"unstructured":"Joux, A.: Collisions in SHA-0. In: Short Talk presented at CRYPTO 2004 Rump Session (2004)","key":"21_CR14"},{"doi-asserted-by":"crossref","unstructured":"Karras, D.A., Zorkadis, V.: A Novel Suite for Evaluating One-Way Hash Functions for Electronic Commerce Applications. In: Proceedings of the 26th EUROMICRO 2000, vol.\u00a02, pp. 2464\u20132468 (2000)","key":"21_CR15","DOI":"10.1109\/EURMIC.2000.874532"},{"doi-asserted-by":"crossref","unstructured":"Kaliski Jr., B.S.: RFC 1319: The MD2 Message-Digest Algorithm. RSA Laboratories (April 1992)","key":"21_CR16","DOI":"10.17487\/rfc1319"},{"unstructured":"National Institute of Standards and Technology, Secure Hash Standard, FIPS Publication-180 (1993)","key":"21_CR17"},{"unstructured":"National Institute of Standards and Technology, Secure Hash Standard, FIPS Publication- 180-1 (1995)","key":"21_CR18"},{"unstructured":"National Institute of Standards and Technology, Secure Hash Standard, FIPS Publication-180-2 (2002)","key":"21_CR19"},{"unstructured":"NIST Brief Comments on Recent Cryptanalytic Attacks on Secure Hashing Functions and the Continued Security Provided by SHA-1, http:\/\/csrc.nist.gov\/news.highlights\/NIST-brief-Comments-on-SHA1-attack.pdf","key":"21_CR20"},{"key":"21_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"58","DOI":"10.1007\/978-3-540-30574-3_6","volume-title":"Topics in Cryptology \u2013 CT-RSA 2005","author":"V. Rijmen","year":"2005","unstructured":"Rijmen, V., Oswald, E.: Update on SHA-1. In: Menezes, A. (ed.) CT-RSA 2005. LNCS, vol.\u00a03376, pp. 58\u201371. Springer, Heidelberg (2005)"},{"key":"21_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"303","DOI":"10.1007\/3-540-38424-3_22","volume-title":"Advances in Cryptology - CRYPTO \u201990","author":"R. Rivest","year":"1991","unstructured":"Rivest, R.: The MD4 Message Digest Algorithm. In: Menezes, A., Vanstone, S.A. (eds.) CRYPTO 1990. LNCS, vol.\u00a0537, pp. 303\u2013311. Springer, Heidelberg (1991)"},{"doi-asserted-by":"crossref","unstructured":"Rivest, R.L.: RFC 1320: The MD4 Message-Digest Algorithm, Network Working Group (1992)","key":"21_CR23","DOI":"10.17487\/rfc1320"},{"doi-asserted-by":"crossref","unstructured":"Rivest, R.: The MD5 Digest Algorithm, Network Working Group Request for Comments: 1321 (April 1992), http:\/\/theory.lcs.mit.edu\/~rivest\/Rivest-MD5.txt","key":"21_CR24","DOI":"10.17487\/rfc1321"},{"unstructured":"Schneier, B.: Applied Cryptography, 2nd edn. John Wiley and Sons, Inc., Chichester","key":"21_CR25"},{"unstructured":"Stallings, W.: Cryptography and Network Security Principles and Practice, 3rd edn. Prentice Hall India, Englewood Cliffs","key":"21_CR26"},{"doi-asserted-by":"crossref","unstructured":"Wang, X., Yin, Y.L., Yu, H.: Collision Search Attacks on SHA-1 (February 13 2005), http:\/\/theory.csail.mit.edu\/~yiqun\/shanote.pdf","key":"21_CR27","DOI":"10.1007\/11535218_1"},{"key":"21_CR28","series-title":"Lecture Notes in Computer Science","first-page":"83","volume-title":"Advances in Cryptology - AUSCRYPT \u201992","author":"Y. Zheng","year":"1993","unstructured":"Zheng, Y., Pieprzyk, J., Seberry, J.: HAVAL - A One-Way Hashing Algorithm with Variable Length of Output. In: Zheng, Y., Seberry, J. (eds.) AUSCRYPT 1992. LNCS, vol.\u00a0718, pp. 83\u2013104. Springer, Heidelberg (1993)"}],"container-title":["Lecture Notes in Computer Science","Information Systems Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11593980_21.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,17]],"date-time":"2020-11-17T20:02:56Z","timestamp":1605643376000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11593980_21"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005]]},"ISBN":["9783540307068","9783540324225"],"references-count":28,"URL":"https:\/\/doi.org\/10.1007\/11593980_21","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2005]]}}}