{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T22:17:58Z","timestamp":1725488278583},"publisher-location":"Berlin, Heidelberg","reference-count":6,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540576006"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/3-540-48285-7_27","type":"book-chapter","created":{"date-parts":[[2007,7,31]],"date-time":"2007-07-31T22:16:46Z","timestamp":1185920206000},"page":"305-317","source":"Crossref","is-referenced-by-count":3,"title":["How to Find and Avoid Collisions for the Knapsack Hash Function"],"prefix":"10.1007","author":[{"given":"Jacques","family":"Patarin","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"27_CR1","series-title":"Lect Notes Comput Sci","volume-title":"AAECC-2","author":"P. Camion","year":"1988","unstructured":"P. Camion, \u201cCan a Fast Signature Scheme Without Secret Key be Secure?\u201d, in AAECC-2, Lecture Notes in Computer Science no 228, Springer Verlag."},{"key":"27_CR2","series-title":"Lect Notes Comput Sci","volume-title":"Proceedings of Eurocrypt\u201988","author":"P. Camion","year":"1988","unstructured":"P. Camion and Ph. Godlewski, \u201cManipulation and Errors, Localization and Detection\u201d, Proceedings of Eurocrypt\u201988, Lecture Notes in Computer Science n0 330, Springer Verlag."},{"key":"27_CR3","doi-asserted-by":"crossref","unstructured":"P. Camion and J. Patarin, \u201cThe Knapsack Hash Function proposed at Crypto\u2019 89 can be broken\u201d, Proceedings of Eurocrypt\u201991, pp. 39\u201353, Springer Verlag.","DOI":"10.1007\/3-540-46416-6_3"},{"key":"27_CR4","unstructured":"I. Damg\u00e5rd, \u201cDesign Principles for Hash Functions\u201d, Proceedings of Crypto\u201989, Springer Verlag."},{"key":"27_CR5","doi-asserted-by":"crossref","unstructured":"R.L. Rivest, \u201cThe MD4 Message Digest Algorithm\u201d, Crypto\u201990, Springer Verlag, pp. 303\u2013311.","DOI":"10.1007\/3-540-38424-3_22"},{"key":"27_CR6","doi-asserted-by":"crossref","unstructured":"G. Z\u00e9mor, \u201cHash Functions and Graphs with Large Girths\u201d, Proceedings of EURO-CRYPT\u201991, pp 508\u2013511, Springer Verlag.","DOI":"10.1007\/3-540-46416-6_44"}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2014 EUROCRYPT \u201993"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-48285-7_27.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T20:50:28Z","timestamp":1619556628000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-48285-7_27"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540576006"],"references-count":6,"URL":"https:\/\/doi.org\/10.1007\/3-540-48285-7_27","relation":{},"subject":[]}}