{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T17:31:21Z","timestamp":1725471081519},"publisher-location":"Berlin, Heidelberg","reference-count":11,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540365976"},{"type":"electronic","value":"9783540365983"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1007\/11799313_7","type":"book-chapter","created":{"date-parts":[[2006,10,5]],"date-time":"2006-10-05T14:02:13Z","timestamp":1160056933000},"page":"89-110","source":"Crossref","is-referenced-by-count":19,"title":["Cryptanalysis of the Full HAVAL with 4 and 5 Passes"],"prefix":"10.1007","author":[{"given":"Hongbo","family":"Yu","sequence":"first","affiliation":[]},{"given":"Xiaoyun","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Aaram","family":"Yun","sequence":"additional","affiliation":[]},{"given":"Sangwoo","family":"Park","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"7_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"228","DOI":"10.1007\/978-3-540-40061-5_14","volume-title":"Advances in Cryptology - ASIACRYPT 2003","author":"B.V. Rompay","year":"2003","unstructured":"Rompay, B.V., Biryukov, A., Preneel, B., Vandewalle, J.: Cryptanalysis of 3-Pass HAVAL. In: Laih, C.-S. (ed.) ASIACRYPT 2003. LNCS, vol.\u00a02894, pp. 228\u2013245. Springer, Heidelberg (2003)"},{"key":"7_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"324","DOI":"10.1007\/978-3-540-30598-9_23","volume-title":"Security in Communication Networks","author":"H. Yoshida","year":"2005","unstructured":"Yoshida, H., Biryukov, A., Canniere, C.D., Lano, J., Preneel, B.: Non-randomness of the Full 4 and 5-Pass HAVAL. In: Blundo, C., Cimato, S. (eds.) SCN 2004. LNCS, vol.\u00a03352, pp. 324\u2013336. Springer, Heidelberg (2005)"},{"key":"7_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"303","DOI":"10.1007\/3-540-38424-3_22","volume-title":"Advances in Cryptology - CRYPTO \u201990","author":"R.L. Rivest","year":"1991","unstructured":"Rivest, R.L.: The MD4 Message Digest Algorithm. In: Menezes, A., Vanstone, S.A. (eds.) CRYPTO 1990. LNCS, vol.\u00a0537, pp. 303\u2013311. Springer, Heidelberg (1991)"},{"doi-asserted-by":"crossref","unstructured":"Rivest, R.L.: The MD5 Message-Digest Algorithm, Request for Comments(RFC 1320), Internet Activities Board, Internet Privacy Task Force (1992)","key":"7_CR4","DOI":"10.17487\/rfc1321"},{"issue":"5","key":"7_CR5","doi-asserted-by":"publisher","first-page":"545","DOI":"10.1360\/122004-107","volume":"48","author":"X.Y. Wang","year":"2005","unstructured":"Wang, X.Y., Feng, D., Yu, X.: An attack on Hash Function HAVAL-128. Science in China Ser. F. Information Sciences\u00a048(5), 545\u2013556 (2005)","journal-title":"Information Sciences"},{"key":"7_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/11426639_1","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2005","author":"X.Y. Wang","year":"2005","unstructured":"Wang, X.Y., Lai, X.J., Feng, D., Chen, H., Yu, X.: Cryptanalysis for Hash Functions MD4 and RIPEMD. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol.\u00a03494, pp. 1\u201318. Springer, Heidelberg (2005)"},{"key":"7_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1007\/11426639_2","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2005","author":"X.Y. Wang","year":"2005","unstructured":"Wang, X.Y., Yu, H.B.: How to Break MD5 and Other Hash Functions. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol.\u00a03494, pp. 19\u201335. Springer, Heidelberg (2005)"},{"key":"7_CR8","series-title":"Lecture Notes in Computer Science","first-page":"1","volume-title":"Advances in Cryptology \u2013 CRYPTO 2005","author":"X.Y. Wang","year":"2005","unstructured":"Wang, X.Y., Yu, H.B., Yin, Y.L.: Efficient Collision Search Attacks on SHA-0. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol.\u00a03621, pp. 1\u201316. Springer, Heidelberg (2005)"},{"key":"7_CR9","series-title":"Lecture Notes in Computer Science","first-page":"17","volume-title":"Advances in Cryptology \u2013 CRYPTO 2005","author":"X.Y. Wang","year":"2005","unstructured":"Wang, X.Y., Yin, Y.L., Yu, H.B.: Finding collisions on the Full SHA-1. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol.\u00a03621, pp. 17\u201336. Springer, Heidelberg (2005)"},{"unstructured":"Wang, X.Y.: The Collision attack on SHA-0, in Chinese (1997) (to appear), www.infosec.sdu.edu.cn","key":"7_CR10"},{"key":"7_CR11","series-title":"Lecture Notes in Computer Science","first-page":"83","volume-title":"Advances in Cryptology - AUSCRYPT \u201992","author":"Y. Zheng","year":"1993","unstructured":"Zheng, Y., Pieprzyk, J., Seberry, J.: HAVAL \u2014 A One-way Hashing Algorithm with Variable Length of Output. In: Zheng, Y., Seberry, J. (eds.) AUSCRYPT 1992. LNCS, vol.\u00a0718, pp. 83\u2013104. Springer, Heidelberg (1993)"}],"container-title":["Lecture Notes in Computer Science","Fast Software Encryption"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11799313_7.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,17]],"date-time":"2020-11-17T20:11:09Z","timestamp":1605643869000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11799313_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"ISBN":["9783540365976","9783540365983"],"references-count":11,"URL":"https:\/\/doi.org\/10.1007\/11799313_7","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2006]]}}}