{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T23:41:20Z","timestamp":1725493280045},"publisher-location":"Berlin, Heidelberg","reference-count":10,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540006220"},{"type":"electronic","value":"9783540364924"}],"license":[{"start":{"date-parts":[[2003,1,1]],"date-time":"2003-01-01T00:00:00Z","timestamp":1041379200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2003]]},"DOI":"10.1007\/3-540-36492-7_12","type":"book-chapter","created":{"date-parts":[[2007,10,23]],"date-time":"2007-10-23T19:36:10Z","timestamp":1193168170000},"page":"160-174","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Full-Round Differential Attack on the Original Version of the Hash Function Proposed at PKC\u201998"],"prefix":"10.1007","author":[{"given":"Donghoon","family":"Chang","sequence":"first","affiliation":[]},{"given":"Jaechul","family":"Sung","sequence":"additional","affiliation":[]},{"given":"Soohak","family":"Sung","sequence":"additional","affiliation":[]},{"given":"Sangjin","family":"Lee","sequence":"additional","affiliation":[]},{"given":"Jongin","family":"Lim","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2003,2,17]]},"reference":[{"key":"12_CR1","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"56","DOI":"10.1007\/BFb0055720","volume-title":"Advances in CRYPTO\u201998","author":"F. Chabaud","year":"1998","unstructured":"F. Chabaud and A. Joux, Differential Collisions in SHA-0, Advances in CRYPTO\u201998, LNCS 1462, Springer-Verlag, 1998, pp. 56\u201371."},{"key":"12_CR2","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1007\/3-540-60865-6_43","volume-title":"Fast Software Encryption","author":"H. Dobbertin","year":"1996","unstructured":"H. Dobbertin, Cryptanalysis of MD4, Fast Software Encryption, LNCS 1039, Springer-Verlag,1996, pp. 53\u201369."},{"key":"12_CR3","doi-asserted-by":"crossref","unstructured":"H. Dobbertin, Cryptanalysis of MD5 Compress, May. 1996. \nhttp:\/\/www-cse.ucsd.edu\/users\/bsy\/dobbertin.ps","DOI":"10.1007\/3-540-60865-6_43"},{"key":"12_CR4","doi-asserted-by":"crossref","unstructured":"Sanguk Shin, Kyunghyune Rhee, Daehyun Ryu, Sangjin Lee, A New Hash Function Based on MDx-family and Its Application to MAC, Public Key Cryptography\u201998, pp. 234\u2013246. 1998.","DOI":"10.1007\/BFb0054028"},{"key":"12_CR5","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"252","DOI":"10.1007\/3-540-45661-9_20","volume-title":"Fast Software Encryption 2002","author":"D. Han","year":"2002","unstructured":"Daewan Han, Sangwoo Park, Seongtaek Chee, Cryptanalysis of a Hash Function Proposed at PKC\u201998, Fast Software Encryption 2002, LNCS 2365, pp. 252\u2013262."},{"issue":"1","key":"12_CR6","doi-asserted-by":"publisher","first-page":"30","DOI":"10.1049\/el:20000017","volume":"36","author":"P.R. Kasselman","year":"2000","unstructured":"P.R. Kasselman and W.T. Penzhorn, Cryptanalysis of reduced version of HAVAL, Electronics Letters 6th January 2000 Vol.36 No.1, pp. 30\u201331.","journal-title":"Electronics Letters 6th January"},{"key":"12_CR7","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"406","DOI":"10.1007\/3-540-45450-0_31","volume-title":"ACISP 2002","author":"S.W. Park","year":"2002","unstructured":"S.W. Park, S.H. Sung, S.T. Chee, J.I. Lim, On the Security of Reduced Versions of 3-Pass HAVAL, ACISP 2002, LNCS 2384, pp. 406\u2013419."},{"key":"12_CR8","doi-asserted-by":"crossref","unstructured":"R. Rivest, The MD4 message digest algorithm, RFC 1320, Internet Activities Board, Internet Privacy Task Force, Apr. 1992.","DOI":"10.17487\/rfc1320"},{"key":"12_CR9","doi-asserted-by":"crossref","unstructured":"R. Rivest, The MD5 message digest algorithm, RFC 1321, Internet Activities Board, Internet Privacy Task Force, Apr. 1992.","DOI":"10.17487\/rfc1321"},{"key":"12_CR10","series-title":"Lect Notes Comput Sci","first-page":"83","volume-title":"Advances in Cryptology-Auscrypt\u201992","author":"Y. Zheng","year":"1993","unstructured":"Y. Zheng, J. Pieprzyk and J. Sebberry, HAVAL-A one-way hashing algorithm with variable length of output, Advances in Cryptology-Auscrypt\u201992, LNCS 718, Springer-Verlag, 1993, pp. 83\u2013104."}],"container-title":["Lecture Notes in Computer Science","Selected Areas in Cryptography"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-36492-7_12","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,1,16]],"date-time":"2020-01-16T03:03:43Z","timestamp":1579143823000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-36492-7_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2003]]},"ISBN":["9783540006220","9783540364924"],"references-count":10,"URL":"https:\/\/doi.org\/10.1007\/3-540-36492-7_12","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2003]]},"assertion":[{"value":"17 February 2003","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}