{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T22:13:22Z","timestamp":1725488002482},"publisher-location":"Berlin, Heidelberg","reference-count":14,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540656449"},{"type":"electronic","value":"9783540491620"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1999]]},"DOI":"10.1007\/3-540-49162-7_21","type":"book-chapter","created":{"date-parts":[[2007,7,31]],"date-time":"2007-07-31T19:51:55Z","timestamp":1185911515000},"page":"263-275","source":"Crossref","is-referenced-by-count":4,"title":["Hash Functions and the MAC Using All-or-Nothing Property"],"prefix":"10.1007","author":[{"given":"Sang Uk","family":"Shin","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Kyung Hyune","family":"Rhee","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Jae Woo","family":"Yoon","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[1999,10,29]]},"reference":[{"key":"21_CR1","series-title":"Lect Notes Comput Sci","first-page":"1","volume-title":"Advances in Cryptology-Crypto\u201996","author":"M. Bellare","year":"1996","unstructured":"M. Bellare, R. Canetti, H. Krawczyk,: Keying Hash Functions for Message Authentication, Advances in Cryptology-Crypto\u201996, LNCS, vol. 1109. Springer-Verlag (1996) 1\u201315"},{"key":"21_CR2","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"416","DOI":"10.1007\/0-387-34805-0_39","volume-title":"Advances in Cryptology-CRYPTO 89","author":"I.B. Damg\u00e5rd","year":"1990","unstructured":"I.B. Damg\u00e5rd,: A design principle for hash functions, Advances in Cryptology-CRYPTO 89, LNCS, vol. 435. Springer-Verlag (1990) 416\u2013427"},{"key":"21_CR3","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"71","DOI":"10.1007\/3-540-60865-6_44","volume-title":"Fast Software Encryption-Cambridge Workshop","author":"H. Dobbertin","year":"1996","unstructured":"H. Dobbertin, A. Bosselaers, B. Preneel,: RIPEMD-160: A strengthened version of RIPEMD, Fast Software Encryption-Cambridge Workshop, LNCS, vol. 1039. Springer-Verlag (1996) 71\u201382"},{"key":"21_CR4","unstructured":"FIPS 180-1,: Secure hash standard, Federal Information Processing Standards Publication 180-1, U.S. Department of Commerce \/ Nist (1995)"},{"key":"21_CR5","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"485","DOI":"10.1007\/BFb0052257","volume-title":"Advances in Cryptology-CRYPTO 97","author":"L. Knudsen","year":"1997","unstructured":"L. Knudsen, B. Preneel,: Fast and secure hashing based on codes, Advances in Cryptology-CRYPTO 97, LNCS, vol. 1294. (1997) 485\u2013498"},{"key":"21_CR6","unstructured":"A.J. Menezes, P.C. van Oorschot, S.A. Vanstone,: Handbook of Applied Cryptography, CRC Press (1997)"},{"key":"21_CR7","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"428","DOI":"10.1007\/0-387-34805-0_40","volume-title":"Advances in Cryptology-CRYPTO 89","author":"R. Merkle","year":"1990","unstructured":"R. Merkle,: One way hash functions and DES, Advances in Cryptology-CRYPTO 89, LNCS, vol. 435. (1990) 428\u2013446"},{"key":"21_CR8","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/3-540-60590-8","volume-title":"Advances in Cryptology-Crypto\u201995","author":"B. Preneel","year":"1995","unstructured":"B. Preneel, P. van Oorschot,: MDx-MAC and Building Fast MACs from Hash Functions, Advances in Cryptology-Crypto\u201995, LNCS, vol. 963. Springer-Verlag (1995) 1\u201314"},{"key":"21_CR9","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"303","DOI":"10.1007\/3-540-38424-3_22","volume-title":"Advances in Cryptology-CRYPTO 90","author":"R.L. Rivest","year":"1991","unstructured":"R.L. Rivest,: The MD4 message-digest algorithm, Advances in Cryptology-CRYPTO 90, LNCS, vol. 37. Springer-Verlag (1991) 303\u2013311"},{"key":"21_CR10","unstructured":"RFC 1321,:The MD5 message-digest algorithm, Internet request for comments 321, R.L Rivest, (1992)"},{"key":"21_CR11","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"210","DOI":"10.1007\/BFb0052348","volume-title":"The Proceedings of the 1997 Fast Software Encryption Conference","author":"R. L. Rivest","year":"1997","unstructured":"R. L. Rivest,: All-Or-Nothing Encryption and The Package Transform, The Proceedings of the 1997 Fast Software Encryption Conference, LNCS, vol. 1267. Springer-Verlag (1997) 210\u2013218"},{"key":"21_CR12","unstructured":"Ronald L. Rivest, M.J.B. Robshaw, R. Sidney, and Y.L. Yin,: The RC6 Block Cipher, a block cipher submitted for consideration as the new AES"},{"key":"21_CR13","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"234","DOI":"10.1007\/BFb0054028","volume-title":"PKC\u201998(International Workshop on Practice and Theory in Public Key Cryptography)","author":"S. Uk. Shin","year":"1998","unstructured":"Sang Uk. Shin, Kyung Hyune Rhee, Dae Hyun Ryu, Sang Jin Lee,: A new hash function based on MDx-family and its application to MAC, PKC\u201998(International Workshop on Practice and Theory in Public Key Cryptography), LNCS, vol. 1431. Springer-Verlag (1998) 234\u2013246"},{"key":"21_CR14","series-title":"Lect Notes Comput Sci","first-page":"83","volume-title":"Advances in Cryptology-AUSCRYPT 92","author":"Y. Zheng","year":"1993","unstructured":"Y. Zheng, J. Pieprzyk, J. Sebery,: HAVAL-a one-way hashing algorithm with variable length of output, Advances in Cryptology-AUSCRYPT 92, LNCS, vol. 718. Springer-Verlag (1993) 83\u2013104"}],"container-title":["Lecture Notes in Computer Science","Public Key Cryptography"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-49162-7_21","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,1,24]],"date-time":"2019-01-24T13:06:28Z","timestamp":1548335188000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-49162-7_21"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1999]]},"ISBN":["9783540656449","9783540491620"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/3-540-49162-7_21","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[1999]]}}}