{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T21:08:34Z","timestamp":1725484114769},"publisher-location":"Berlin, Heidelberg","reference-count":10,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540440093"},{"type":"electronic","value":"9783540456612"}],"license":[{"start":{"date-parts":[[2002,1,1]],"date-time":"2002-01-01T00:00:00Z","timestamp":1009843200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2002]]},"DOI":"10.1007\/3-540-45661-9_20","type":"book-chapter","created":{"date-parts":[[2007,5,21]],"date-time":"2007-05-21T11:02:03Z","timestamp":1179745323000},"page":"252-262","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Cryptanalysis of the Modified Version of the Hash Function Proposed at PKC\u201998"],"prefix":"10.1007","author":[{"given":"Daewan","family":"Han","sequence":"first","affiliation":[]},{"given":"Sangwoo","family":"Park","sequence":"additional","affiliation":[]},{"given":"Seongtaek","family":"Chee","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2002,7,12]]},"reference":[{"key":"20_CR1","doi-asserted-by":"crossref","unstructured":"Donghoon Chang, Jaechul Sung, Soo Hak Sung, Sangjin Lee, and Jongin Lim. Full-Round Differential Attack on the Hash Function Proposed at PKC\u201998. Proceedings of Koreacrypt\u201901, pages 24\u201335, 2002.","DOI":"10.1007\/3-540-36492-7_12"},{"key":"20_CR2","doi-asserted-by":"crossref","unstructured":"Hans Dobbertin, Antoon Bosselaers, and Bart Preneel. RIPEMD-160: A strengthened version of RIPEMD. ftp.esat.kuleuven.ac.be\/pub\/COSIC\/bossselae\/ripemd, April 1996.","DOI":"10.1007\/3-540-60865-6_44"},{"key":"20_CR3","unstructured":"Alfred J. Menezes, Paul C. van Oorschot, and Scott A. Vanstone. Handbook of Applied Cryptography. CRC Press, 1996."},{"key":"20_CR4","unstructured":"National Institute of Standards and Technology. FIPS PUB 180-1: Secure Hash Standard, April 1995."},{"key":"20_CR5","unstructured":"Research and Development in Advanced Communications Technologies in Europe. RIPE: Integrity primitives for secure information systems. Final Report of RACE Integrity Primitives Evaluation(R1040),RACE, 1995."},{"key":"20_CR6","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"303","DOI":"10.1007\/3-540-38424-3_22","volume-title":"Advances in Cryptology-Crypto\u201990","author":"R. L. Rivest","year":"1991","unstructured":"Ronald L. Rivest. The MD4 message digest algorithm. In Alfred J. Menezes and Scott A. Vanstone, editors, Advances in Cryptology-Crypto\u201990, volume 537 of Lecture Notes in Computer Science, pages 303\u2013311. Springer-Verlag, 1991."},{"key":"20_CR7","doi-asserted-by":"crossref","unstructured":"Ronald L. Rivest. The MD5 message digest algorithm. In Request for Comments (RFC) 1321, April. Internet Activities Board, Internet Privacy Task Force, 1992.","DOI":"10.17487\/rfc1321"},{"key":"20_CR8","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"234","DOI":"10.1007\/BFb0054028","volume-title":"Public Key Cryptography-PKC\u201998","author":"S. U. Shin","year":"1998","unstructured":"Sang Uk Shin, Kyung Hyune Rhee, Dae Hyun Ryu, and Sang Jin Lee. A new hash function based on MDx-family and its application to MAC. In Hideki Imai and Yuliang Zheng, editors, Public Key Cryptography-PKC\u201998, volume 1431 of Lecture Notes in Computer Science, pages 234\u2013246. Springer, 1998."},{"key":"20_CR9","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"523","DOI":"10.1007\/3-540-39799-X_41","volume-title":"Advances in Cryptology-Crypto\u201985","author":"A. F. Webster","year":"1986","unstructured":"A. F. Webster and Stafford E. Tavares. On the design of S-boxes. In Hugh C. Williams, editor, Advances in Cryptology-Crypto\u201985, volume 218 of Lecture Notes in Computer Science, pages 523\u2013534. Springer-Verlag, New York, 1986."},{"key":"20_CR10","series-title":"Lect Notes Comput Sci","first-page":"83","volume-title":"Advances in Cryptology-Auscrypt\u201992","author":"Y. Zheng","year":"1992","unstructured":"Yuliang Zheng, Josef Pieprzyk, and Jennifer Seberry. HAVAL-A One-Way Hashing Algorithm with Variable Length of Output. In Jennifer Seberry and Yuliang Zheng, editors, Advances in Cryptology-Auscrypt\u201992, volume 718 of Lecture Notes in Computer Science, pages 83\u2013104. Springer, 1992."}],"container-title":["Lecture Notes in Computer Science","Fast Software Encryption"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-45661-9_20","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,19]],"date-time":"2019-05-19T13:31:13Z","timestamp":1558272673000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-45661-9_20"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2002]]},"ISBN":["9783540440093","9783540456612"],"references-count":10,"URL":"https:\/\/doi.org\/10.1007\/3-540-45661-9_20","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[2002]]},"assertion":[{"value":"12 July 2002","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}