{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T22:20:02Z","timestamp":1725488402726},"publisher-location":"Berlin, Heidelberg","reference-count":15,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540577669"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/3-540-48329-2_32","type":"book-chapter","created":{"date-parts":[[2007,8,5]],"date-time":"2007-08-05T21:25:55Z","timestamp":1186349155000},"page":"379-390","source":"Crossref","is-referenced-by-count":24,"title":["Security of Iterated Hash Functions Based on Block Ciphers"],"prefix":"10.1007","author":[{"given":"Walter","family":"Hohl","sequence":"first","affiliation":[]},{"given":"Xuejia","family":"Lai","sequence":"additional","affiliation":[]},{"given":"Thomas","family":"Meier","sequence":"additional","affiliation":[]},{"given":"Christian","family":"Waldvogel","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"32_CR1","doi-asserted-by":"crossref","unstructured":"L. Brown, J. Pieprzyk and J. Seberry, \u201cLOKI-A Cryptographic Primitive for Authentication and Secrecy Applications\u201d, Advances in Cryptology-AUSCRYPT\u201990 Proceedings, pp. 229\u2013236, Springer-Verlag, 1990.","DOI":"10.1007\/BFb0030364"},{"key":"32_CR2","doi-asserted-by":"crossref","unstructured":"I.B. Damgaard, \u201cA Design Principle for Hash Functions\u201d, Advances in Cryptology-CRYPT0\u201989 Proceedings, pp. 416\u2013427, Springer-Verlag, 1990.","DOI":"10.1007\/0-387-34805-0_39"},{"key":"32_CR3","first-page":"843","volume-title":"Proc. International Conference on Computer Communications","author":"R.W. Davies","year":"1984","unstructured":"R.W. Davies and W.L. Price, \u201cDigital Signature-an Update\u201d, Proc. International Conference on Computer Communications, Sydney, Oct. 1984, Elsevier, North Holland, pp. 843\u2013847, 1985."},{"key":"32_CR4","unstructured":"ISO\/IEC CD 10118, Information technology-Security techniques-Hash-functions, I.S.O., 1991."},{"key":"32_CR5","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"55","DOI":"10.1007\/3-540-47555-9_5","volume-title":"Advances in Cryptology-EUROCRYPT\u201992 Proceedings","author":"X. Lai","year":"1993","unstructured":"X. Lai and J.L. Massey, \u201cHash Functions Based on Block Ciphers\u201d, Advances in Cryptology-EUROCRYPT\u201992 Proceedings, pp. 55\u201370, LNCS 658, Springer-Verlag, 1993."},{"issue":"10A","key":"32_CR6","first-page":"5658","volume":"27","author":"S.M. Matyas","year":"1985","unstructured":"S.M. Matyas, C.H. Meyer and J. Oseas, \u201cGenerating Strong One-Way Functions with Cryptographic Algorithm\u201d, IBM Technical Disclosure Bulletin, Vol. 27, No. 10A, pp. 5658\u20135659, March 1985.","journal-title":"IBM Technical Disclosure Bulletin"},{"key":"32_CR7","doi-asserted-by":"publisher","first-page":"113","DOI":"10.1007\/BF00196792","volume":"3","author":"S.M. Matyas","year":"1991","unstructured":"S.M. Matyas, \u201cKey Processing with Control Vectors\u201d, Journal of Cryptology, Vol.3, No.2, pp. 113\u2013136, 1991.","journal-title":"Journal of Cryptology"},{"key":"32_CR8","doi-asserted-by":"crossref","unstructured":"R.C. Merkle, \u201cOne-Way Hash Functions and DES\u201d, Advances in Cryptology-CRYPTO\u201989 Proceedings, pp. 428\u2013446, Springer-Verlag, 1990.","DOI":"10.1007\/0-387-34805-0_40"},{"key":"32_CR9","unstructured":"C. H. Meyer and M. Schilling, \u201cSecure Program Code with Modification Detection Code\u201d, Proceedings of SECURICOM 88, pp. 111\u2013130, SEDEP.8, Rue de la Michodies, 75002, Paris, France."},{"key":"32_CR10","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"326","DOI":"10.1007\/3-540-46877-3_30","volume-title":"Advances in Cryptology-EUROCRYPT\u2019 90, Proceedings","author":"S. Miyaguchi","year":"1991","unstructured":"S. Miyaguchi, K. Ohta and M. Iwata, Confirmation that Some Hash Functions Are Not Collision Free, Advances in Cryptology-EUROCRYPT\u2019 90, Proceedings, LNCS 473, pp. 326\u2013343, Springer Verlag, Berlin, 1991."},{"key":"32_CR11","doi-asserted-by":"crossref","unstructured":"M. Naor and M. Yung, \u201cUniversal One-way Hash Functions and Their Cryptographic Applications\u201d, Proc. 21 Annual ACM Symposium on Theory of Computing, Seattle, Washington, May 15\u201317, 1989, pp. 33\u201343.","DOI":"10.1145\/73007.73011"},{"key":"32_CR12","doi-asserted-by":"crossref","unstructured":"B. Preneel, A. Bosselaers, R. Govaerts and J. Vandewalle, \u201cCollision-Free Hashfunctions Based on Blockcipher Algorithm\u201d, Proceedings of 1989 International Carnahan Conference on Security Technology, pp.203\u2013210, 1989.","DOI":"10.1109\/CCST.1989.751980"},{"key":"32_CR13","volume-title":"Analysis and Design of Cryptographic Hash Hashfunctions","author":"B. Preneel","year":"1993","unstructured":"B. Preneel, Analysis and Design of Cryptographic Hash Hashfunctions, Ph.D thesis, Katholieke Universiteit Leuven, Belgium, January 1993."},{"key":"32_CR14","doi-asserted-by":"crossref","unstructured":"J.J. Quisquater and M. Girault, \u201c2n-bit Hash Functions Using n-bit Symmetric Block Cipher Algorithms\u201d, Abstracts of EUROCRYPT\u201989.","DOI":"10.1007\/3-540-46885-4_13"},{"key":"32_CR15","doi-asserted-by":"crossref","first-page":"203","DOI":"10.1007\/978-1-4684-4730-9_17","volume-title":"Advances in Cryptology-CRYPTO\u201983 Proceedings","author":"R.S. Winternitz","year":"1984","unstructured":"R.S. Winternitz, \u201cProducing One-Way Hash Function from DES\u201d, Advances in Cryptology-CRYPTO\u201983 Proceedings, pp. 203\u2013207, Plenum Press, New York, 1984."}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2014 CRYPTO\u2019 93"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-48329-2_32.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,17]],"date-time":"2020-11-17T16:15:40Z","timestamp":1605629740000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-48329-2_32"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540577669"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/3-540-48329-2_32","relation":{},"subject":[]}}