{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T00:18:01Z","timestamp":1725495481179},"publisher-location":"Berlin, Heidelberg","reference-count":10,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540430100"},{"type":"electronic","value":"9783540453116"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2001]]},"DOI":"10.1007\/3-540-45311-3_4","type":"book-chapter","created":{"date-parts":[[2007,11,14]],"date-time":"2007-11-14T19:01:41Z","timestamp":1195066901000},"page":"40-49","source":"Crossref","is-referenced-by-count":4,"title":["A Parallel Algorithm for Extending Cryptographic Hash Functions"],"prefix":"10.1007","author":[{"given":"Palash","family":"Sarkar","sequence":"first","affiliation":[]},{"given":"Paul J.","family":"Schellenberg","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2001,11,26]]},"reference":[{"key":"4_CR1","doi-asserted-by":"crossref","unstructured":"M. Bellare and P. Rogaway. Collision-resistant hashing: towards making UOWHFs practical. Proceedings of CRYPTO 1997, pp 470\u2013484.","DOI":"10.1007\/BFb0052256"},{"key":"4_CR2","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"416","DOI":"10.1007\/0-387-34805-0_39","volume-title":"Advances in Cryptology-CRYPTO\u201989","author":"I. B. Damgard","year":"1990","unstructured":"I. B. Damgard. A design principle for hash functions. Lecture Notes in Computer Science, 435 (1990), 416\u2013427 (Advances in Cryptology-CRYPTO\u201989)."},{"key":"4_CR3","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"428","DOI":"10.1007\/0-387-34805-0_40","volume-title":"Advances in Cryptology-CRYPTO\u201989","author":"R. C. Merkle","year":"1990","unstructured":"R. C. Merkle. One way hash functions and DES. Lecture Notes in Computer Science, 435 (1990), 428\u2013226 (Advances in Cryptology-CRYPTO\u201989)."},{"key":"4_CR4","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"166","DOI":"10.1007\/3-540-44987-6_11","volume-title":"Advances in Cryptology-EUROCRYPT\u201901","author":"I. Mironov","year":"2001","unstructured":"I. Mironov. Hash functions: from Merkle-Damgard to Shoup. Lecture Notes in Computer Science, 2045 (2001), 166\u2013181 (Advances in Cryptology-EUROCRYPT\u201901)."},{"key":"4_CR5","doi-asserted-by":"crossref","unstructured":"M. Naor and M. Yung. Universal one-way hash functions and their cryptographic aplications. Proceedings of the 21st Annual Symposium on Theory of Computing, ACM, 1989, pp. 33\u201343.","DOI":"10.1145\/73007.73011"},{"key":"4_CR6","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"158","DOI":"10.1007\/3-540-48969-X_8","volume-title":"Lectures on Data Security: Modern Cryptology in Theory and Practice","author":"B. Preneel","year":"1999","unstructured":"B. Preneel. The state of cryptographic hash functions. Lecture Notes in Computer Science, 1561 (1999), 158\u2013182 (Lectures on Data Security: Modern Cryptology in Theory and Practice)."},{"key":"4_CR7","unstructured":"P. Sarkar and P. J. Schellenberg. A parallel algorithm for extending cryptographic hash functions. CACR Technical Report, University of Waterloo, http:\/\/www.cacr.math.uwaterloo.ca"},{"key":"4_CR8","unstructured":"D. R. Stinson. Some observations on the theory of cryptographic hash functions. IACR preprint server, http:\/\/eprint.iacr.org\/2001\/020\/ ."},{"key":"4_CR9","unstructured":"D. R. Stinson. Cryptography: Theory and Practice, CRC Press, 1995."},{"issue":"3","key":"4_CR10","doi-asserted-by":"publisher","first-page":"265","DOI":"10.1016\/0022-0000(81)90033-7","volume":"22","author":"M. N. Wegman","year":"1981","unstructured":"M. N. Wegman and J. L. Carter. New Hash Functions and Their Use in Authentication and Set Equality. Journal of Computer and System Sciences, 22(3): 265\u2013279 (1981)","journal-title":"Journal of Computer and System Sciences"}],"container-title":["Lecture Notes in Computer Science","Progress in Cryptology \u2014 INDOCRYPT 2001"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-45311-3_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,4]],"date-time":"2019-05-04T12:18:19Z","timestamp":1556972299000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-45311-3_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2001]]},"ISBN":["9783540430100","9783540453116"],"references-count":10,"URL":"https:\/\/doi.org\/10.1007\/3-540-45311-3_4","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[2001]]}}}