{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,29]],"date-time":"2026-01-29T20:54:54Z","timestamp":1769720094699,"version":"3.49.0"},"publisher-location":"Berlin, Heidelberg","reference-count":33,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540577669","type":"print"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/3-540-48329-2_31","type":"book-chapter","created":{"date-parts":[[2007,8,6]],"date-time":"2007-08-06T01:25:55Z","timestamp":1186363555000},"page":"368-378","source":"Crossref","is-referenced-by-count":217,"title":["Hash functions based on block ciphers: a synthetic approach"],"prefix":"10.1007","author":[{"given":"Bart","family":"Preneel","sequence":"first","affiliation":[]},{"given":"Ren\u00e9","family":"Govaerts","sequence":"additional","affiliation":[]},{"given":"Joos","family":"Vandewalle","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"31_CR1","doi-asserted-by":"crossref","first-page":"209","DOI":"10.1007\/978-1-4684-4730-9_18","volume-title":"Advances in Cryptology, Proc. Crypto\u201983","author":"S.G. Akl","year":"1984","unstructured":"S.G. Akl, \u201cOn the security of compressed encodings,\u201d Advances in Cryptology, Proc. Crypto\u201983, D. Chaum, Ed., Plenum Press, New York, 1984, pp. 209\u2013230."},{"issue":"1","key":"31_CR2","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/BF00630563","volume":"4","author":"E. Biham","year":"1991","unstructured":"E. Biham and A. Shamir, \u201cDifferential cryptanalysis of DES-like cryptosystems,\u201d Journal of Cryptology, Vol. 4, No. 1, 1991, pp. 3\u201372.","journal-title":"Journal of Cryptology"},{"key":"31_CR3","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"229","DOI":"10.1007\/BFb0030364","volume-title":"Advances in Cryptology, Proc. Auscrypt\u201990","author":"L. Brown","year":"1990","unstructured":"L. Brown, J. Pieprzyk, and J. Seberry, \u201cLOKI \u2014 a cryptographic primitive for authentication and secrecy applications,\u201d Advances in Cryptology, Proc. Auscrypt\u201990, LNCS 453, J. Seberry and J. Pieprzyk, Eds., Springer-Verlag, 1990, pp. 229\u2013236."},{"key":"31_CR4","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"203","DOI":"10.1007\/3-540-39118-5_19","volume-title":"Advances in Cryptology, Proc. Eurocrypt\u201987","author":"I.B. Damg\u00e5rd","year":"1988","unstructured":"I.B. Damg\u00e5rd, \u201cCollision free hash functions and public key signature schemes,\u201d Advances in Cryptology, Proc. Eurocrypt\u201987, LNCS 304, D. Chaum and W.L. Price, Eds., Springer-Verlag, 1988, pp. 203\u2013216."},{"key":"31_CR5","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"416","DOI":"10.1007\/0-387-34805-0_39","volume-title":"Advances in Cryptology, Proc. Crypto\u201989","author":"I.B. Damg\u00e5rd","year":"1990","unstructured":"I.B. Damg\u00e5rd, \u201cA design principle for hash functions,\u201d Advances in Cryptology, Proc. Crypto\u201989, LNCS 435, G. Brassard, Ed., Springer-Verlag, 1990, pp. 416\u2013427."},{"key":"31_CR6","unstructured":"D. Davies and W. L. Price, \u201cThe application of digital signatures based on public key cryptosystems,\u201d NPL Report DNACS 39\/80, December 1980."},{"key":"31_CR7","doi-asserted-by":"crossref","first-page":"55","DOI":"10.1109\/MC.1983.1654301","volume":"16","author":"D. Davies","year":"1983","unstructured":"D. Davies, \u201cApplying the RSA digital signature to electronic mail,\u201d IEEE Computer, Vol. 16, February 1983, pp. 55\u201362.","journal-title":"IEEE Computer"},{"key":"31_CR8","unstructured":"D. Davies and W. L. Price, \u201cDigital signatures, an update,\u201d Proc. 5th International Conference on Computer Communication, October 1984, pp. 845\u2013849."},{"key":"31_CR9","doi-asserted-by":"publisher","first-page":"388","DOI":"10.1145\/358027.358052","volume":"27","author":"D. Denning","year":"1984","unstructured":"D. Denning, \u201cDigital signatures with RSA and other public-key cryptosystems,\u201d Communications ACM, Vol. 27, April 1984, pp. 388\u2013392.","journal-title":"Communications ACM"},{"key":"31_CR10","unstructured":"FIPS 46, \u201cData Encryption Standard,\u201d Federal Information Processing Standard, National Bureau of Standards, U.S. Department of Commerce, Washington D.C., January 1977."},{"key":"31_CR11","volume-title":"DES Modes of operation","author":"FIPS 81","year":"1980","unstructured":"FIPS 81, \u201cDES Modes of operation,\u201d Federal Information Processing Standard, National Bureau of Standards, US Department of Commerce, Washington D.C., December 1980."},{"key":"31_CR12","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"217","DOI":"10.1007\/3-540-39118-5_20","volume-title":"Advances in Cryptology, Proc. Eurocrypt\u201987","author":"M. Girault","year":"1988","unstructured":"M. Girault, \u201cHash-functions using modulo-n operations,\u201d Advances in Cryptology, Proc. Eurocrypt\u201987, LNCS 304, D. Chaum and W.L. Price, Eds., Springer-Verlag, 1988, pp. 217\u2013226."},{"key":"31_CR13","unstructured":"ISO\/IEC 9797, \u201cInformation technology-Data cryptographic techniques-Data integrity mechanisms using a cryptographic check function employing a block cipher algorithm,\u201d 1993."},{"key":"31_CR14","unstructured":"ISO\/IEC 10116, \u201cInformation technology-Security techniques-Modes of operation of an n-bit block cipher algorithm,\u201d 1991."},{"key":"31_CR15","unstructured":"\u201cHash functions using a pseudo random algorithm,\u201d ISO-IEC\/JTC1\/SC27\/WG2 N98, Japanese contribution, 1991."},{"key":"31_CR16","unstructured":"ISO\/IEC 10118, \u201cInformation technology-Security techniques-Hash-functions-Part 1: General and Part 2: Hash-functions using an n-bit block cipher algorithm,\u201d 1993."},{"key":"31_CR17","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"55","DOI":"10.1007\/3-540-47555-9_5","volume-title":"Advances in Cryptology, Proc. Eurocrypt\u201992","author":"X. Lai","year":"1993","unstructured":"X. Lai and J.L. Massey \u201cHash functions based on block ciphers,\u201d Advances in Cryptology, Proc. Eurocrypt\u201992, LNCS 658, R.A. Rueppel, Ed., Springer-Verlag, 1993, pp. 55\u201370."},{"issue":"10A","key":"31_CR18","first-page":"5658","volume":"27","author":"S.M. Matyas","year":"1985","unstructured":"S.M. Matyas, C.H. Meyer, and J. Oseas, \u201cGenerating strong one-way functions with cryptographic algorithm,\u201d IBM Techn. Disclosure Bull., Vol. 27, No. 10A, 1985, pp. 5658\u20135659.","journal-title":"IBM Techn. Disclosure Bull."},{"key":"31_CR19","unstructured":"R. Merkle, \u201cSecrecy, Authentication, and Public Key Systems,\u201d UMI Research Press, 1979."},{"key":"31_CR20","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"428","DOI":"10.1007\/0-387-34805-0_40","volume-title":"Advances in Cryptology, Proc. Crypto\u201989","author":"R. Merkle","year":"1990","unstructured":"R. Merkle, \u201cOne way hash functions and DES,\u201d Advances in Cryptology, Proc. Crypto\u201989, LNCS 435, G. Brassard, Ed., Springer-Verlag, 1990, pp. 428\u2013446."},{"issue":"1","key":"31_CR21","doi-asserted-by":"publisher","first-page":"43","DOI":"10.1007\/BF00203968","volume":"3","author":"R. Merkle","year":"1990","unstructured":"R. Merkle, \u201cA fast software one-way hash function,\u201d Journal of Cryptology, Vol. 3, No. 1, 1990, pp. 43\u201358.","journal-title":"Journal of Cryptology"},{"key":"31_CR22","unstructured":"C.H. Meyer and M. Schilling, \u201cSecure program load with Manipulation Detection Code,\u201d Proc. Securicom 1988, pp. 111\u2013130."},{"key":"31_CR23","unstructured":"C. Mitchell, F. Piper, and P. Wild, \u201cDigital signatures,\u201d in \u201cContemporary Cryptology: The Science of Information Integrity,\u201d G.J. Simmons, Ed., IEEE Press, 1991, pp. 325\u2013378."},{"key":"31_CR24","unstructured":"S. Miyaguchi, M. Iwata, and K. Ohta, \u201cNew 128-bit hash function,\u201d Proc. 4th International Joint Workshop on Computer Communications, Tokyo, Japan, July 13\u201315, 1989, pp. 279\u2013288."},{"key":"31_CR25","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"326","DOI":"10.1007\/3-540-46877-3_30","volume-title":"Advances in Cryptology, Proc. Eurocrypt\u201990","author":"S. Miyaguchi","year":"1991","unstructured":"S. Miyaguchi, K. Ohta, and M. Iwata, \u201cConfirmation that some hash functions are not collision free,\u201d Advances in Cryptology, Proc. Eurocrypt\u201990, LNCS 473, I.B. Damg\u00e5rd, Ed., Springer-Verlag, 1991, pp. 326\u2013343."},{"key":"31_CR26","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"105","DOI":"10.1007\/3-540-57220-1_55","volume-title":"Advances in Cryptology, Proc. Auscrypt\u201992","author":"B. Preneel","year":"1993","unstructured":"B. Preneel, R. Govaerts, and J. Vandewalle, \u201cOn the power of memory in the design of collision resistant hash functions,\u201d Advances in Cryptology, Proc. Auscrypt\u201992, LNCS 718, J. Seberry and Y. Zheng, Eds., Springer-Verlag, 1993, pp. 105\u2013121"},{"key":"31_CR27","doi-asserted-by":"crossref","unstructured":"B. Preneel, \u201cCryptographic hash functions,\u201d Kluwer Academic Publishers, 1994.","DOI":"10.1002\/ett.4460050406"},{"key":"31_CR28","first-page":"155","volume-title":"Foundations of Secure Computation","author":"M.O. Rabin","year":"1978","unstructured":"M.O. Rabin, \u201cDigitalized signatures,\u201d in \u201cFoundations of Secure Computation,\u201d R. Lipton and R. DeMillo, Eds., Academic Press, New York, 1978, pp. 155\u2013166."},{"key":"31_CR29","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"303","DOI":"10.1007\/3-540-38424-3_22","volume-title":"Advances in Cryptology, Proc. Crypto\u201990","author":"R.L. Rivest","year":"1991","unstructured":"R.L. Rivest, \u201cThe MD4 message digest algorithm,\u201d Advances in Cryptology, Proc. Crypto\u201990, LNCS 537, S. Vanstone, Ed., Springer-Verlag, 1991, pp. 303\u2013311."},{"key":"31_CR30","unstructured":"K. Van Espen and J. Van Mieghem, \u201cEvaluatie en Implementatie van Authentiseringsalgoritmen (Evaluation and Implementation of Authentication Algorithms \u2014 in Dutch),\u201d ESAT Laboratorium, Katholieke Universiteit Leuven, Thesis grad. eng., 1989."},{"key":"31_CR31","doi-asserted-by":"crossref","first-page":"203","DOI":"10.1007\/978-1-4684-4730-9_17","volume-title":"Advances in Cryptology, Proc. Crypto\u201983","author":"R.S. Winternitz","year":"1984","unstructured":"R.S. Winternitz, \u201cProducing a one-way hash function from DES,\u201d Advances in Cryptology, Proc. Crypto\u201983, D. Chaum, Ed., Plenum Press, New York, 1984, pp. 203\u2013207."},{"key":"31_CR32","doi-asserted-by":"crossref","unstructured":"R.S. Winternitz, \u201cA secure one-way hash function built from DES,\u201d Proc. IEEE Symposium on Information Security and Privacy 1984, 1984, pp. 88\u201390.","DOI":"10.1109\/SP.1984.10027"},{"key":"31_CR33","doi-asserted-by":"publisher","first-page":"187","DOI":"10.1080\/0161-117991854025","volume":"3","author":"G. Yuval","year":"1979","unstructured":"G. Yuval, \u201cHow to swindle Rabin,\u201d Cryptologia, Vol. 3, 1979, pp. 187\u2013189.","journal-title":"Cryptologia"}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2014 CRYPTO\u2019 93"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-48329-2_31.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,2,17]],"date-time":"2024-02-17T08:01:47Z","timestamp":1708156907000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-48329-2_31"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540577669"],"references-count":33,"URL":"https:\/\/doi.org\/10.1007\/3-540-48329-2_31","relation":{},"subject":[]}}