{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,30]],"date-time":"2025-07-30T15:23:23Z","timestamp":1753889003841},"publisher-location":"Berlin, Heidelberg","reference-count":23,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540545088"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/3-540-38424-3_34","type":"book-chapter","created":{"date-parts":[[2007,12,3]],"date-time":"2007-12-03T13:05:56Z","timestamp":1196687156000},"page":"477-501","source":"Crossref","is-referenced-by-count":18,"title":["Fast Software Encryption Functions"],"prefix":"10.1007","author":[{"given":"Ralph C.","family":"Merkle","sequence":"first","affiliation":[]}],"member":"297","reference":[{"unstructured":"\u201cSecrecy, Authentication, and Public Key Systems\u201d, Stanford Ph.D. thesis, 1979, by Ralph C. Merkle.","key":"34_CR1"},{"unstructured":"\u201cA Certified Digital Signature\u201d, Crypto\u2019 89.","key":"34_CR2"},{"unstructured":"Moti Yung, private communication.","key":"34_CR3"},{"unstructured":"\u201cA High Speed Manipulation Detection Code\u201d, by Robert R. Jueneman, Advances in Cryptology-CRYPTO\u2019 86, Springer Verlag, Lecture Notes on Computer Science, Vol. 263, page 327 to 346.","key":"34_CR4"},{"unstructured":"\u201cAnother Birthday Attack\u201d by Don Coppersmith, Advances in Cryptology-CRYPTO\u2019 85, Springer Verlag, Lecture Notes on Computer Science, Vol. 218, pages 14 to 17.","key":"34_CR5"},{"unstructured":"\u201cA digital signature based on a conventional encryption function\u201d, by Ralph C. Merkle, Advances in Cryptology CRYPTO 87, Springer Verlag, Lecture Notes on Computer Science, Vol. 293, page 369\u2013378.","key":"34_CR6"},{"unstructured":"\u201cCryptography and Data Security\u201d, by Dorothy E. R. Denning, Addison-Wesley 1982, page 170.","key":"34_CR7"},{"doi-asserted-by":"crossref","unstructured":"\u201cOn the security of multiple encryption\u201d, by Ralph C. Merkle, CACM Vol. 24 No. 7, July 1981 pages 465 to 467.","key":"34_CR8","DOI":"10.1145\/358699.358718"},{"unstructured":"\u201cResults of an initial attempt to cryptanalyze the NBS Data Encryption Standard\u201d, by Martin Hellman et al., Information Systems lab. report SEL 76-042, Stanford Univer-sity 1976.","key":"34_CR9"},{"doi-asserted-by":"crossref","unstructured":"\u201cCommunication Theory of Secrecy Systems\u201d, by C. E. Shannon, Bell Sys. Tech. Jour. 28 (Oct. 1949) 656\u2013715","key":"34_CR10","DOI":"10.1002\/j.1538-7305.1949.tb00928.x"},{"doi-asserted-by":"crossref","unstructured":"\u201cMessage Authentication\u201d by R. R. Jueneman, S. M. Matyas, C. H. Meyer, IEEE Communications Magazine, Vol. 23, No. 9, September 1985 pages 29\u201340.","key":"34_CR11","DOI":"10.1109\/MCOM.1985.1092643"},{"unstructured":"\u201cGenerating strong one-way functions with cryptographic algorithm\u201d, by S. M. Matyas, C. H. Meyer, and J. Oseas, IBM Technical Disclosure Bulletin, Vol. 27, No. 10A, March 1985 pages 5658\u20135659","key":"34_CR12"},{"unstructured":"\u201cAnalysis of Jueneman\u2019s MDC Scheme\u201d, by Don Coppersmith, preliminary version June 9, 1988. Analysis of the system presented in [4].","key":"34_CR13"},{"doi-asserted-by":"crossref","unstructured":"\u201cThe Data Encryption Standard: Past and Future\u201d by M.E. Smid and D.K. Branstad, Proc. of the IEEE, Vol 76 No. 5 pp 550\u2013559, May 1988","key":"34_CR14","DOI":"10.1109\/5.4441"},{"unstructured":"\u201cDefending Secrets, Sharing Data: New Locks and Keys for Electronic Information\u201d, U.S. Congress, Office of Technology Assessment, OTA-CIT-310, U.S. Government Printing Office, October 1987","key":"34_CR15"},{"doi-asserted-by":"crossref","unstructured":"\u201cExhaustive cryptanalysis of the NBS data encryption standard\u201d, by Whitfield Diffie and Martin Hellman, Computer, June 1977, pages 74\u201378","key":"34_CR16","DOI":"10.1109\/C-M.1977.217750"},{"unstructured":"\u201cCryptography: a new dimension in data security\u201d, by Carl H. Meyer and Stephen M. Matyas, Wiley 1982.","key":"34_CR17"},{"unstructured":"\u201cOne Way Hash Functions and DES\u201d, by Ralph C. Merkle, Crypto\u2019 89.","key":"34_CR18"},{"unstructured":"\u201cData Encryption Standard (DES)\u201d, National Bureau of Standards (U.S.), Federal Information Processing Standards Publication 46, National Technical Information Service, Springfield, VA, Apr. 1977","key":"34_CR19"},{"doi-asserted-by":"crossref","unstructured":"\u201cCryptography and Computer Privacy\u201d, by H. Feistel, Sci. Amer. Vol. 228, No. 5 pp 15\u201323, May 1973","key":"34_CR20","DOI":"10.1038\/scientificamerican0573-15"},{"unstructured":"\u201cMaximum Likelihood Estimation Applied to Cryptanalysis\u201d, by Dov Andelman, Stanford Ph.D. Thesis, 1979","key":"34_CR21"},{"unstructured":"IBM has recently proposed a specific one-way hash function which has so far resisted attack.","key":"34_CR22"},{"unstructured":"\u201cA Fast Software One-Way Hash Function,\u201d submitted to the Journal of Cryptology. The C source for this method is available by anonymous FTP from arisia.xerox.com (13.1.100.206) in directory \/pub\/hash.","key":"34_CR23"}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology-CRYPT0\u2019 90"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-38424-3_34.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,28]],"date-time":"2021-04-28T01:20:15Z","timestamp":1619572815000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-38424-3_34"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540545088"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/3-540-38424-3_34","relation":{},"subject":[]}}