{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,17]],"date-time":"2025-12-17T08:35:52Z","timestamp":1765960552311},"publisher-location":"Berlin, Heidelberg","reference-count":23,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540564133"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/3-540-47555-9_5","type":"book-chapter","created":{"date-parts":[[2007,8,8]],"date-time":"2007-08-08T23:23:49Z","timestamp":1186615429000},"page":"55-70","source":"Crossref","is-referenced-by-count":136,"title":["Hash Functions Based on Block Ciphers"],"prefix":"10.1007","author":[{"given":"Xucjia","family":"Lai","sequence":"first","affiliation":[]},{"given":"James L.","family":"Massey","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"5_CR1","doi-asserted-by":"crossref","first-page":"209","DOI":"10.1007\/978-1-4684-4730-9_18","volume-title":"Advances in Cryptology-CRYPTO\u201983, Proceedings","author":"S. G. Akl","year":"1984","unstructured":"S. G. Akl, \u201cOn the Security of Compressed Encodings\u201d, Advances in Cryptology-CRYPTO\u201983, Proceedings, pp. 209\u2013230, Plenum Press, New York, 1984."},{"key":"5_CR2","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"229","DOI":"10.1007\/BFb0030364","volume-title":"Advances in Cryptology \u2014 AUSCRYPT\u201990, Proceedings","author":"L. Brown","year":"1990","unstructured":"L. Brown, J. Pieprzyk and J. Seberry, \u201cLOKI \u2014 A Cryptographic Primitive for Authentication and Secrecy Applications\u201d, Advances in Cryptology \u2014 AUSCRYPT\u201990, Proceedings, LNCS 453, pp. 229\u2013236, Springer-Verlag, 1990."},{"key":"5_CR3","unstructured":"Data Encryption Standard, FIPS PUB 46, National Tech. Info. Service, Springfield, VA, 1977."},{"key":"5_CR4","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"416","DOI":"10.1007\/0-387-34805-0_39","volume-title":"Advances in Cryptology-CRYPTO\u201989","author":"I. B. Damgaard","year":"1990","unstructured":"I. B. Damgaard, \u201cA Design Principle for Hash Functions\u201d, Advances in Cryptology-CRYPTO\u201989, LNCS 435, pp. 416\u2013427, Springer-Verlag, 1990."},{"key":"5_CR5","first-page":"843","volume-title":"Proc. International Conference on Computer Communications","author":"R. W. Davies","year":"1985","unstructured":"R. W. Davies and W. L. Price, \u201cDigital Signature \u2014 an Update\u201d, Proc. International Conference on Computer Communications, Sydney, Oct 1984, Elsevier, North-Holland, pp. 843\u2013847, 1985."},{"key":"5_CR6","unstructured":"I.S.O. DP 10118, Hash-functions for Digital Signatures, I.S.O., April 1989."},{"key":"5_CR7","unstructured":"ISO\/IEC CD 10118, Information technology \u2014 Security techniques \u2014 Hash-functions, I.S.O., 1991."},{"key":"5_CR8","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"389","DOI":"10.1007\/3-540-46877-3_35","volume-title":"Advances in Cryptology-EUROCRYPT\u201990, Proceedings","author":"X. Lai","year":"1991","unstructured":"X. Lai and J. L. Massey, \u201cA Proposal for a New Block Encryption Standard\u201d, Advances in Cryptology-EUROCRYPT\u201990, Proceedings, LNCS 473, pp. 389\u2013404, Springer-Verlag, Berlin, 1991."},{"key":"5_CR9","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"17","DOI":"10.1007\/3-540-46416-6_2","volume-title":"Advances in Cryptology-EUROCRYPT\u201991, Proceedings","author":"X. Lai","year":"1991","unstructured":"X. Lai, J. L. Massey and S. Murphy, \u201cMarkov Ciphers and Differential Cryptanalysis\u201d, Advances in Cryptology-EUROCRYPT\u201991, Proceedings, LNCS 547, pp. 17\u201338, Springer-Verlag, Berlin, 1991."},{"key":"5_CR10","doi-asserted-by":"publisher","first-page":"113","DOI":"10.1007\/BF00196792","volume":"3","author":"S. M. Matyas","year":"1991","unstructured":"S. M. Matyas, \u201cKey Processing with Control Vectors\u201d, Journal of Cryptology, Vol. 3, No. 2, pp. 113\u2013136, 1991.","journal-title":"Journal of Cryptology"},{"issue":"10A","key":"5_CR11","first-page":"5658","volume":"27","author":"S. M. Matyas","year":"1985","unstructured":"S. M. Matyas, C. H. Meyer and J. Oseas, \u201cGenerating Strong One-way Functions with Cryptographic Algorithm\u201d, IBM Technical Disclosure Bulletin, Vol. 27, No. 10A, pp. 5658\u20135659, March 1985.","journal-title":"IBM Technical Disclosure Bulletin"},{"key":"5_CR12","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"549","DOI":"10.1007\/3-540-46885-4_53","volume-title":"Advances in Cryptology \u2014 EUROCRYPT\u201989, Proceedings","author":"W. Meier","year":"1990","unstructured":"W. Meier, O. Staffelbach, \u201cNonlinearity Criteria for Cryptographic Functions\u201d, Advances in Cryptology \u2014 EUROCRYPT\u201989, Proceedings, LNCS 434, pp. 549\u2013562, Springer-Verlag, 1990."},{"key":"5_CR13","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"428","DOI":"10.1007\/0-387-34805-0_40","volume-title":"Advances in Cryptology-CRYPTO\u201989, Proceedings","author":"R. C. Merkle","year":"1990","unstructured":"R. C. Merkle, \u201cOne Way Hash Functions and DES\u201d, Advances in Cryptology-CRYPTO\u201989, Proceedings, LNCS 435, pp. 428\u2013446, Springer-Verlag, 1990."},{"key":"5_CR14","unstructured":"C. H. Meyer and M. Schilling, \u201cSecure Program Code with Modification Detection Code\u201d, Proceedings of SECURICOM 88, pp. 111\u2013130, SEDEP.8, Rue de la Michodies, 75002, Paris, France."},{"key":"5_CR15","unstructured":"C. J. Mitchell, F. Piper and P. Wild, \u201cDigital Signatures\u201d, Contemporary Cryptology (Ed. G. Simmons), pp. 325\u2013378, IEEE Press, 1991."},{"key":"5_CR16","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"326","DOI":"10.1007\/3-540-46877-3_30","volume-title":"Advances in Cryptology-EUROCRYPT\u201990, Proceedings","author":"S. Miyaguchi","year":"1991","unstructured":"S Miyaguchi, K. Ohta and M. Iwata, \u201cConfirmation that Some Hash Functions Are Not Collision Free\u201d, Advances in Cryptology-EUROCRYPT\u201990, Proceedings, LNCS 473, pp. 326\u2013343, Springer-Verlag, Berlin, 1991."},{"key":"5_CR17","doi-asserted-by":"crossref","unstructured":"M. Naor and M. Yung, \u201cUniversal One-way Hash Functions and Their Cryptographic Applications\u201d, Proc. 21 Annual ACM Symposium on Theory of Computing, Seattle, Washington, May 15\u201317, 1989, pp. 33\u201343.","DOI":"10.1145\/73007.73011"},{"key":"5_CR18","doi-asserted-by":"crossref","unstructured":"B. Preneel, A. Bosselaers, R. Govaerts and J. Vandewalle, \u201cCollision-free Hashfunctions Based on Blockcipher Algorithms.\u201d Proceedings of 1989 International Carnahan Conference on Security Technology, pp. 203\u2013210.","DOI":"10.1109\/CCST.1989.751980"},{"key":"5_CR19","unstructured":"Private communication, B. Preneel to X. Lai, June 1992."},{"key":"5_CR20","doi-asserted-by":"crossref","unstructured":"J. J. Quisquater and M. Girault, \u201c2n-bit Hash Functions Using n-bit Symmetric Block Cipher Algorithms\u201d, Abstracts of EUROCRYPT\u201989.","DOI":"10.1007\/3-540-46885-4_13"},{"key":"5_CR21","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"102","DOI":"10.1007\/3-540-46885-4_13","volume-title":"Advances in Cryptology-EUROCRYPT\u201989, Proceedings","author":"J. J. Quisquater","year":"1990","unstructured":"J. J. Quisquater and M. Girault, \u201c2n-bit Hash Functions Using n-bit Symmetric Block Cipher Algorithms\u201d, Advances in Cryptology-EUROCRYPT\u201989, Proceedings, LNCS 434, pp. 102\u2013109, Springer-Verlag, Berlin, 1990."},{"key":"5_CR22","doi-asserted-by":"crossref","first-page":"203","DOI":"10.1007\/978-1-4684-4730-9_17","volume-title":"Cryptology-CRYPTO\u201983, Proceedings","author":"R. S. Winternitz","year":"1984","unstructured":"R. S. Winternitz, \u201cProducing One-Way Hash Function from DES\u201d, Advances in Cryptology-CRYPTO\u201983, Proceedings, pp. 203\u2013207, Plenum Press, New York, 1984."},{"key":"5_CR23","doi-asserted-by":"crossref","unstructured":"R. S. Winternitz, \u201cA Secure One-way Hash Function Built from DES\u201d, Proc. 1984 IEEE Symposium on Security and Privacy, Oakland, 1984, pp. 88\u201390.","DOI":"10.1109\/SP.1984.10027"}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2014 EUROCRYPT\u2019 92"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-47555-9_5.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,17]],"date-time":"2020-11-17T21:14:06Z","timestamp":1605647646000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-47555-9_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540564133"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/3-540-47555-9_5","relation":{},"subject":[]}}