{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T23:12:04Z","timestamp":1725664324069},"publisher-location":"Berlin, Heidelberg","reference-count":16,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540581086"},{"type":"electronic","value":"9783540484561"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1994]]},"DOI":"10.1007\/3-540-58108-1_19","type":"book-chapter","created":{"date-parts":[[2012,2,26]],"date-time":"2012-02-26T15:15:02Z","timestamp":1330269302000},"page":"157-165","source":"Crossref","is-referenced-by-count":2,"title":["Attacks on double block length hash functions"],"prefix":"10.1007","author":[{"given":"Xuejia","family":"Lai","sequence":"first","affiliation":[]},{"given":"Lars R.","family":"Knudsen","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2005,6,8]]},"reference":[{"key":"19_CR1","doi-asserted-by":"crossref","unstructured":"E. Biham and A. Shamir, Differential Cryptanalysis of the Data Encryption Standard, Springer-Verlag, 1993.","DOI":"10.1007\/978-1-4613-9314-6"},{"key":"19_CR2","doi-asserted-by":"crossref","unstructured":"L. Brown, J. Pieprzyk and J. Seberry, \u201cLOKI \u2014 A Cryptographic Primitive for Authentication and Secrecy Applications\u201d, Advances in Cryptology \u2014 AUSCRYPT'90, Proceedings, LNCS 453, pp. 229\u2013236, Springer-Verlag, 1990.","DOI":"10.1007\/BFb0030364"},{"key":"19_CR3","doi-asserted-by":"crossref","unstructured":"I. B. Damgaard, \u201cA Design Principle for Hash Functions\u201d, Advances in Cryptology-CRYPTO'89, LNCS 435, pp. 416\u2013427, Springer-Verlag, 1990.","DOI":"10.1007\/0-387-34805-0_39"},{"key":"19_CR4","unstructured":"W. Hohl, X. Lai, T. Meier and C. Waldvogel, \u201cSecurity of Iterated Hash Function Based on Block Ciphers\u201d, Preproceedings of Crypto'93, 1993."},{"key":"19_CR5","unstructured":"ISO\/IEC DIS 10118, Information technology \u2014 Security techniques \u2014 Hashfunctions, Part 2: Hash-functions using an n-bit block cipher, I.S.O., 1993."},{"key":"19_CR6","series-title":"ETH Series in Information Processing","volume-title":"On the Design and Security of Block Ciphers","author":"X. Lai","year":"1992","unstructured":"X. Lai, On the Design and Security of Block Ciphers, ETH Series in Information Processing (Edt: J. L. Massey), Vol. 1, Hartung-Gorre Verlag, Konstanz, 1992."},{"key":"19_CR7","unstructured":"L. Knudsen and X. Lai, \u201cNew attacks on a class of hash functions including the Parallel DM\u201d, submitted to EUROCRYPT'94."},{"key":"19_CR8","doi-asserted-by":"crossref","unstructured":"X. Lai and J.L. Massey, \u201cHash Functions Based on Block Ciphers\u201d, Advances in Cryptology \u2014 EUROCRYPT'92 Proceedings, pp. 55\u201370, LNCS 658, Springer-Verlag, 1993.","DOI":"10.1007\/3-540-47555-9_5"},{"issue":"No.2","key":"19_CR9","doi-asserted-by":"crossref","first-page":"113","DOI":"10.1007\/BF00196792","volume":"3","author":"S. M. Matyas","year":"1991","unstructured":"S. M. Matyas, \u201cKey Processing with Control Vectors\u201d, Journal of Cryptology, Vol. 3, No. 2, pp. 113\u2013136, 1991.","journal-title":"Journal of Cryptology"},{"key":"19_CR10","doi-asserted-by":"crossref","unstructured":"R. C. Merkle, \u201cOne Way Hash Functions and DES\u201d, Advances in Cryptology \u2014CRYPTO'89, Proceedings, LNCS 435, pp. 428\u2013446, Springer-Verlag, 1990.","DOI":"10.1007\/0-387-34805-0_40"},{"key":"19_CR11","unstructured":"C. H. Meyer and M. Schilling, \u201cSecure Program Code with Modification Detection Code\u201d, Proceedings of SECURICOM 88, pp. 111\u2013130, SEDEP.8, Rue de la Michodies, 75002, Paris, France."},{"key":"19_CR12","series-title":"LNCS 473","doi-asserted-by":"crossref","first-page":"326","DOI":"10.1007\/3-540-46877-3_30","volume-title":"Advances in Cryptology-EUROCRYPT'90, Proceedings","author":"S Miyaguchi","year":"1991","unstructured":"S Miyaguchi, K. Ohta and M. Iwata, \u201cConfirmation that Some Hash Functions Are Not Collision Free\u201d, Advances in Cryptology-EUROCRYPT'90, Proceedings, LNCS 473, pp. 326\u2013343, Springer-Verlag, Berlin, 1991."},{"key":"19_CR13","doi-asserted-by":"crossref","unstructured":"M. Naor and M. Yung, \u201cUniversal One-way Hash Functions and Their Cryptographic Applications\u201d, Proc. 21 Annual ACM Symposium on Theory of Computing, Seattle, Washington, May 15\u201317, 1989, pp. 33\u201343.","DOI":"10.1145\/73007.73011"},{"key":"19_CR14","volume-title":"Ph.D thesis","author":"B. Preneel","year":"1993","unstructured":"B. Preneel, Analysis and Design of Cryptographic Hashfunctions, Ph.D thesis, Katholieke Universiteit Leuven, Belgium, January 1993."},{"key":"19_CR15","doi-asserted-by":"crossref","unstructured":"B. Preneel, A. Bosselaers, R. Govaerts and J. Vandewalle, \u201cCollision-free Hashfunctions Based on Blockcipher Algorithms.\u201d Proceedings of 1989 International Carnahan Conference on Security Technology, pp. 203\u2013210.","DOI":"10.1109\/CCST.1989.751980"},{"key":"19_CR16","doi-asserted-by":"crossref","unstructured":"J. J. Quisquater and M. Girault, \u201c2n-bit Hash Functions Using n-bit Symmetric Block Cipher Algorithms\u201d, Abstracts of EUROCRYPT'89.","DOI":"10.1007\/3-540-46885-4_13"}],"container-title":["Lecture Notes in Computer Science","Fast Software Encryption"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-58108-1_19.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,17]],"date-time":"2020-11-17T21:17:06Z","timestamp":1605647826000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-58108-1_19"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1994]]},"ISBN":["9783540581086","9783540484561"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/3-540-58108-1_19","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[1994]]}}}