{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T22:25:04Z","timestamp":1725488704094},"publisher-location":"Berlin, Heidelberg","reference-count":10,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540546207"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/3-540-46416-6_52","type":"book-chapter","created":{"date-parts":[[2007,8,6]],"date-time":"2007-08-06T18:02:07Z","timestamp":1186423327000},"page":"547-551","source":"Crossref","is-referenced-by-count":4,"title":["Race Integrity Primitives Evaluation (RIPE): A status report"],"prefix":"10.1007","author":[{"given":"B.","family":"Preneel","sequence":"first","affiliation":[]},{"given":"D.","family":"Chaum","sequence":"additional","affiliation":[]},{"given":"W.","family":"Fumy","sequence":"additional","affiliation":[]},{"given":"C. J. A.","family":"Jansen","sequence":"additional","affiliation":[]},{"given":"P.","family":"Landrock","sequence":"additional","affiliation":[]},{"given":"G.","family":"Roelofsen","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"52_CR1","unstructured":"\u201cInformation Processing-OSI Reference Model-Part 2: Security architecture, International Standard ISO 7498\/2, International Organisation for Standardisation, 1988."},{"key":"52_CR2","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"267","DOI":"10.1007\/3-540-46885-4_28","volume-title":"Proceedings Eurocrypt\u201989","author":"J. Vandewalle","year":"1990","unstructured":"J. Vandewalle, D. Chaum, W. Fumy, C.J.A. Jansen, P. Landrock and G. Roelofsen, \u201cA European call for cryptographic algorithms: RIPE; Race Integrity Primitives Evaluation\u201d, Proceedings Eurocrypt\u201989, Lecture Notes in Computer Science 434, Springer Verlag, 1990, p. 267\u2013271."},{"key":"52_CR3","unstructured":"\u201cRACE Workplan\u201d, Commission of the European Communities, 1988, Rue de la Loi 200, B-1049, Brussels, Belgium."},{"key":"52_CR4","unstructured":"\u201cEvaluation of N-HASH\u201d, RIPE Internal Report 1991-1, 1991."},{"key":"52_CR5","unstructured":"\u201cEvaluation of a hash function based on modular squaring\u201d, RIPE Internal Report 1991-2, 1991."},{"key":"52_CR6","unstructured":"\u201cEvaluation of a hash function based on 32-bit arithmetic\u201d, RIPE Internal Report 1991-3, 1991 (can not be published before March 1992)."},{"key":"52_CR7","unstructured":"\u201cEvaluation of LOKI\u201d, RIPE Internal Report 1991-4, 1991."},{"key":"52_CR8","unstructured":"\u201cEvaluation of MD4 (as submitted to RIPE)\u201d, RIPE Internal Report 1991-5, 1991."},{"key":"52_CR9","unstructured":"Peter J.N. de Rooij, \u201cOn the Security of the Schnorr scheme using preprocessing\u201d, these proceedings."},{"key":"52_CR10","unstructured":"R.L. Rivest, \u201cThe MD4 Message Digest Algorithm\u201d, Abstracts Crypto\u201990, pp. 281\u2013291."}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2014 EUROCRYPT \u201991"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-46416-6_52.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,17]],"date-time":"2020-11-17T21:11:38Z","timestamp":1605647498000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-46416-6_52"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540546207"],"references-count":10,"URL":"https:\/\/doi.org\/10.1007\/3-540-46416-6_52","relation":{},"subject":[]}}