{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,6]],"date-time":"2025-12-06T04:53:41Z","timestamp":1764996821751},"publisher-location":"Berlin, Heidelberg","reference-count":16,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540679073"},{"type":"electronic","value":"9783540445982"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2000]]},"DOI":"10.1007\/3-540-44598-6_18","type":"book-chapter","created":{"date-parts":[[2007,5,1]],"date-time":"2007-05-01T06:15:21Z","timestamp":1178000121000},"page":"287-299","source":"Crossref","is-referenced-by-count":12,"title":["Weaknesses in the SL2($$ \\mathbb{F}_{2^n } $$) Hashing Scheme"],"prefix":"10.1007","author":[{"given":"Rainer","family":"Steinwandt","sequence":"first","affiliation":[]},{"given":"Markus","family":"Grassl","sequence":"additional","affiliation":[]},{"given":"Willi","family":"Geiselmann","sequence":"additional","affiliation":[]},{"given":"Thomas","family":"Beth","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2000,8,11]]},"reference":[{"key":"18_CR1","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"93","DOI":"10.1007\/3-540-69710-1_7","volume-title":"Fast Software Encryption-FSE\u2019 98","author":"K. S. Abdukhalikov","year":"1998","unstructured":"K. S. Abdukhalikov and C. Kim, On the Security of the Hashing Scheme Based on SL2, in Fast Software Encryption-FSE\u2019 98, S. Vaudenay, ed., vol. 1372 of Lecture Notes in Computer Science, Springer, 1998, pp. 93\u2013102."},{"key":"18_CR2","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"163","DOI":"10.1007\/3-540-69053-0_13","volume-title":"Advances in Cryptology-EUROCRYPT\u2019 97","author":"M. Bellare","year":"1997","unstructured":"M. Bellare and D. Micciancio, A New Paradigm for Collision-Free Hashing: Incrementality at Reduced Cost, in Advances in Cryptology-EUROCRYPT\u2019 97, W. Fumy, ed., vol. 1233 of Lecture Notes in Computer Science, Springer, 1997, pp. 163\u2013192."},{"key":"18_CR3","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"322","DOI":"10.1007\/BFb0000444","volume-title":"Advances in Cryptology-ASIACRYPT\u2019 94","author":"C. Charnes","year":"1995","unstructured":"C. Charnes and J. Pieprzyk, Attacking the SL2 hashing scheme, in Advances in Cryptology-ASIACRYPT\u2019 94, J. Pieprzyk and R. Safavi-Naini, eds., vol. 917 of Lecture Notes in Computer Science, Springer, 1995, pp. 322\u2013330."},{"key":"18_CR4","series-title":"Lect Notes Comput Sci","first-page":"416","volume-title":"Advances in Cryptology-CRYPTO\u2019 89","author":"I. B. Damg\u00e5rd","year":"1989","unstructured":"I. B. Damg\u00e5rd, A Design Principle for Hash Functions, in Advances in Cryptology-CRYPTO\u2019 89, G. Brassard, ed., vol. 435 of Lecture Notes in Computer Science, Springer, 1989, pp. 416\u2013427."},{"key":"18_CR5","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"257","DOI":"10.1007\/3-540-60693-9_27","volume-title":"Cryptography and Coding","author":"W. Geiselmann","year":"1995","unstructured":"W. Geiselmann, A Note on the Hash Function of Tillich and Zemor, in Cryptography and Coding, C. Boyd, ed., vol. 1025 of Lecture Notes in Computer Science, Springer, 1995, pp. 257\u2013263."},{"key":"18_CR6","series-title":"Lect Notes Comput Sci","first-page":"471","volume-title":"Applied Algebra, Algebraic Algorithms and Error-Correcting Codes (AAECC-6)","author":"J. Guti\u00e9rrez","year":"1988","unstructured":"J. Guti\u00e9rrez, T. Recio, and C. Ruiz de Velasco, Polynomial decomposition algorithm of almost quadratic complexity, in Applied Algebra, Algebraic Algorithms and Error-Correcting Codes (AAECC-6), Rome, Italy, 1988, T. Mora, ed., vol. 357 of Lecture Notes in Computer Science, Springer, 1989, pp. 471\u2013475."},{"key":"18_CR7","doi-asserted-by":"crossref","unstructured":"B. Huppert, Endliche Gruppen I, vol. 134 of Grundlehren der mathematischen Wissenschaften, Springer, 1967. Zweiter Nachdruck der ersten Auflage.","DOI":"10.1007\/978-3-642-64981-3"},{"key":"18_CR8","doi-asserted-by":"publisher","first-page":"445","DOI":"10.1016\/S0747-7171(89)80027-6","volume":"7","author":"D. Kozen","year":"1989","unstructured":"D. Kozen and S. Landau, Polynomial Decomposition Algorithms, Journal of Symbolic Computation, 7 (1989), pp. 445\u2013456.","journal-title":"Journal of Symbolic Computation"},{"key":"18_CR9","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"71","DOI":"10.1007\/3-540-58108-1_10","volume-title":"Fast Software Encryption","author":"B. Preneel","year":"1994","unstructured":"B. Preneel, Design principles for dedicated hash functions, in Fast Software Encryption, R. Anderson, ed., vol. 809 of Lecture Notes in Computer Science, Springer, 1994, pp. 71\u201382."},{"key":"18_CR10","doi-asserted-by":"crossref","first-page":"213","DOI":"10.3233\/JCS-1997-5303","volume":"5","author":"J.-J. Quisquater","year":"1997","unstructured":"J.-J. Quisquater and M. Joye, Authentication of sequences with the SL2 hash function: Application to video sequences., Journal of Computer Security, 5 (1997), pp. 213\u2013223.","journal-title":"Journal of Computer Security"},{"key":"18_CR11","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"40","DOI":"10.1007\/3-540-48658-5_5","volume-title":"Advances in Cryptology-CRYPTO\u2019 94","author":"J.-P. Tillich","year":"1994","unstructured":"J.-P. Tillich and G. Z\u00e9mor, Hashing with SL2, in Advances in Cryptology-CRYPTO\u2019 94, Y. Desmedt, ed., vol. 839 of Lecture Notes in Computer Science, Springer, 1994, pp. 40\u201349."},{"key":"18_CR12","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"83","DOI":"10.1007\/3-540-68697-5_7","volume-title":"Advances in Cryptology-CRYPTO\u2019 96","author":"S. Vaudenay","year":"1996","unstructured":"S. Vaudenay, Hidden Collisions on DSS, in Advances in Cryptology-CRYPTO\u2019 96, N. Koblitz, ed., vol. 1109 of Lecture Notes in Computer Science, Springer, 1996, pp. 83\u201388."},{"key":"18_CR13","doi-asserted-by":"publisher","first-page":"281","DOI":"10.1016\/S0747-7171(08)80014-4","volume":"9","author":"J. Gathen Von zur","year":"1990","unstructured":"J. Von zur Gathen, Functional Decomposition of Polynomials: The Tame Case, Journal of Symbolic Computation, 9 (1990), pp. 281\u2013300.","journal-title":"Journal of Symbolic Computation"},{"key":"18_CR14","doi-asserted-by":"publisher","first-page":"437","DOI":"10.1016\/S0747-7171(08)80054-5","volume":"10","author":"J. Gathen Von zur","year":"1990","unstructured":"-, Functional Decomposition of Polynomials: The Wild Case, Journal of Symbolic Computation, 10 (1990), pp. 437\u2013452.","journal-title":"Journal of Symbolic Computation"},{"key":"18_CR15","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"508","DOI":"10.1007\/3-540-46416-6_44","volume-title":"Advances in Cryptology-EUROCRYPT\u2019 91","author":"G. Z\u00e9mor","year":"1991","unstructured":"G. Z\u00e9mor, Hash Functions and Graphs With Large Girths, in Advances in Cryptology-EUROCRYPT\u2019 91, D. W. Davies, ed., vol. 547 of Lecture Notes in Computer Science, Springer, 1991, pp. 508\u2013511."},{"key":"18_CR16","doi-asserted-by":"publisher","first-page":"381","DOI":"10.1007\/BF01388652","volume":"4","author":"G. Z\u00e9mor","year":"1994","unstructured":"-, Hash Functions and Cayley Graphs, Designs, Codes and Cryptography, 4 (1994), pp. 381\u2013394.","journal-title":"Designs, Codes and Cryptography"}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2014 CRYPTO 2000"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-44598-6_18","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,4,27]],"date-time":"2019-04-27T12:34:17Z","timestamp":1556368457000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-44598-6_18"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2000]]},"ISBN":["9783540679073","9783540445982"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/3-540-44598-6_18","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[2000]]}}}