{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T17:52:19Z","timestamp":1725472339040},"publisher-location":"Berlin, Heidelberg","reference-count":10,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540491125"},{"type":"electronic","value":"9783540491149"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1007\/11927587_4","type":"book-chapter","created":{"date-parts":[[2006,11,8]],"date-time":"2006-11-08T00:12:43Z","timestamp":1162944763000},"page":"22-28","source":"Crossref","is-referenced-by-count":4,"title":["Hashing with Polynomials"],"prefix":"10.1007","author":[{"given":"Vladimir","family":"Shpilrain","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"4_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"93","DOI":"10.1007\/3-540-69710-1_7","volume-title":"Fast Software Encryption","author":"K.S. Abdukhalikov","year":"1998","unstructured":"Abdukhalikov, K.S., Kim, C.: On the Security of the Hashing Scheme Based on SL\n                           2. In: Vaudenay, S. (ed.) FSE 1998. LNCS, vol.\u00a01372, pp. 93\u2013102. Springer, Heidelberg (1998)"},{"key":"4_CR2","unstructured":"Charles, D., Goren, E., Lauter, K.: Cryptographic hash functions from expander graphs (preprint), \n                    \n                      http:\/\/www.math.mcgill.ca\/goren\/PAPERSpublic\/Hashfunction.pdf"},{"key":"4_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"322","DOI":"10.1007\/BFb0000444","volume-title":"Advances in Cryptology - ASIACRYPT 1994","author":"C. Charnes","year":"1995","unstructured":"Charnes, C., Pieprzyk, J.: Attacking the SL\n                           2 hashing scheme. In: Safavi-Naini, R., Pieprzyk, J.P. (eds.) ASIACRYPT 1994. LNCS, vol.\u00a0917, pp. 322\u2013330. Springer, Heidelberg (1995)"},{"key":"4_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"165","DOI":"10.1007\/11761679_11","volume-title":"Advances in Cryptology - EUROCRYPT 2006","author":"S. Contini","year":"2006","unstructured":"Contini, S., Lenstra, A.K., Steinfeld, R.: VSH, an Efficient and Provable Collision-Resistant Hash Function. In: Vaudenay, S. (ed.) EUROCRYPT 2006. LNCS, vol.\u00a04004, pp. 165\u2013182. Springer, Heidelberg (2006)"},{"key":"4_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"257","DOI":"10.1007\/3-540-60693-9_27","volume-title":"Cryptography and Coding","author":"W. Geiselmann","year":"1995","unstructured":"Geiselmann, W.: A Note on the Hash Function of Tillich and Z\u00e9mor. In: Boyd, C. (ed.) Cryptography and Coding 1995. LNCS, vol.\u00a01025, pp. 257\u2013263. Springer, Heidelberg (1995)"},{"key":"4_CR6","first-page":"330","volume":"53","author":"S. Landau","year":"2006","unstructured":"Landau, S.: Find Me a Hash. Notices Amer. Math. Soc.\u00a053, 330\u2013332 (2006)","journal-title":"Notices Amer. Math. Soc."},{"key":"4_CR7","volume-title":"Handbook of Applied Cryptography","author":"A. Menezes","year":"1997","unstructured":"Menezes, A., van Oorschot, P., Vanstone, S.: Handbook of Applied Cryptography. CRC Press, Boca Raton (1997)"},{"key":"4_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"287","DOI":"10.1007\/3-540-44598-6_18","volume-title":"Advances in Cryptology - CRYPTO 2000","author":"R. Steinwandt","year":"2000","unstructured":"Steinwandt, R., Grassl, M., Geiselmann, W., Beth, T.: Weaknesses in the \n                    \n                      \n                    \n                    ${SL}_{2}({F}_{2^{n}})$\n                   Hashing Scheme. In: Bellare, M. (ed.) CRYPTO 2000. LNCS, vol.\u00a01880, pp. 287\u2013299. Springer, Heidelberg (2000)"},{"key":"4_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"40","DOI":"10.1007\/3-540-48658-5_5","volume-title":"Advances in Cryptology - CRYPTO \u201994","author":"J.-P. Tillich","year":"1994","unstructured":"Tillich, J.-P., Z\u00e9mor, G.: Hashing with SL\n                           2. In: Desmedt, Y.G. (ed.) CRYPTO 1994. LNCS, vol.\u00a0839, pp. 40\u201349. Springer, Heidelberg (1994)"},{"key":"4_CR10","series-title":"Lecture Notes in Computer Science","first-page":"17","volume-title":"Advances in Cryptology \u2013 CRYPTO 2005","author":"X. Wang","year":"2005","unstructured":"Wang, X., Yin, Y.L., Yu, H.: Finding Collisions in the Full SHA-1. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol.\u00a03621, pp. 17\u201336. Springer, Heidelberg (2005)"}],"container-title":["Lecture Notes in Computer Science","Information Security and Cryptology \u2013 ICISC 2006"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11927587_4.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T03:46:53Z","timestamp":1619495213000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11927587_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"ISBN":["9783540491125","9783540491149"],"references-count":10,"URL":"https:\/\/doi.org\/10.1007\/11927587_4","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2006]]}}}