{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T22:26:49Z","timestamp":1725488809784},"publisher-location":"Berlin, Heidelberg","reference-count":37,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540642657"},{"type":"electronic","value":"9783540697107"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1998]]},"DOI":"10.1007\/3-540-69710-1_11","type":"book-chapter","created":{"date-parts":[[2007,8,9]],"date-time":"2007-08-09T16:50:55Z","timestamp":1186678255000},"page":"150-167","source":"Crossref","is-referenced-by-count":8,"title":["New Constructions for Secure Hash Functions"],"prefix":"10.1007","author":[{"given":"William","family":"Aiello","sequence":"first","affiliation":[]},{"given":"Stuart","family":"Haber","sequence":"additional","affiliation":[]},{"given":"Ramarathnam","family":"Venkatesan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[1998,10,16]]},"reference":[{"key":"11_CR1","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"307","DOI":"10.1007\/3-540-68339-9_27","volume-title":"Advances in Cryptology\u2014Eurocrypt\u2019 96","author":"W. Aiello","year":"1996","unstructured":"W. Aiello and R. Venkatesan. Foiling birthday attacks in length-doubling transformations. In Advances in Cryptology\u2014Eurocrypt\u2019 96, Lecture Notes in Computer Science, Vol. 1070, ed. U.M. Maurer, pp. 307\u2013320 (Springer-Verlag, 1996)."},{"key":"11_CR2","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","DOI":"10.1007\/3-540-61996-8","volume-title":"Fast Software Encryption 3","author":"R. Anderson","year":"1996","unstructured":"R. Anderson and E. Biham. Tiger: A Fast New Hash Function, In Fast Software Encryption 3, Lecture Notes in Computer Science, Vol. 1039 (Springer-Verlag, 1996)."},{"key":"11_CR3","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"298","DOI":"10.1007\/3-540-68697-5_23","volume-title":"Advances in Cryptology\u2014Crypto\u2019 96","author":"A. Bosselaers","year":"1996","unstructured":"A. Bosselaers, R. Govaerts, J. Vandewalle. Fast hashing on the Pentium. In Advances in Cryptology\u2014Crypto\u2019 96, ed. N. Koblitz, Lecture Notes in Computer Science, Vol. 1109, pp. 298\u2013312 (Springer-Verlag, 1996)."},{"key":"11_CR4","series-title":"Lect Notes Comput Sci","volume-title":"Integrity Primitives for secure information systems: Final report of RACE Integrity Primitives Evaluation (RIPE-RACE 1040)","year":"1995","unstructured":"A. Bosselaers and B. Preneel (eds.). Integrity Primitives for secure information systems: Final report of RACE Integrity Primitives Evaluation (RIPE-RACE 1040), Chapter 3: RIPEMD. Lecture Notes in Computer Science, Vol. 1007 (Springer-Verlag, 1995)."},{"key":"11_CR5","unstructured":"B. O. Brachtl, D. Coppersmith, M. M. Hyden, S. M. Matyas, Jr., C. H. W. Meyer, J. Oseas, Sh. Pilpel, and M. Shilling. Data authentication using modification detection codes based on a public one way encryption function. U.S. Patent No. 4,908,861, issued March 13, 1990. (Described in: C. H. Meyer and M. Shilling, Secure program load with modification detection code, In Securicom 88: 6\u00e8me Congr\u00e8s mondial de la protection et de la s\u00e9curit\u00e9 informatique et des communications, pp. 111\u2013130 (Paris, 1988).)"},{"key":"11_CR6","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"94","DOI":"10.1007\/3-540-38424-3_7","volume-title":"Advances in Cryptology\u2014Crypto\u2019 90","author":"G. Brassard","year":"1991","unstructured":"G. Brassard and M. Yung. One-way group actions. In Advances in Cryptology\u2014Crypto\u2019 90, Lecture Notes in Computer Science, Vol. 537, pp. 94\u2013107, (Springer-Verlag, 1991)."},{"key":"11_CR7","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"14","DOI":"10.1007\/3-540-39799-X_2","volume-title":"Advances in Cryptology\u2014Crypto\u2019 85","author":"D. Coppersmith","year":"1986","unstructured":"D. Coppersmith. Another birthday attack. In Advances in Cryptology\u2014Crypto\u2019 85, Lecture Notes in Computer Science, Vol. 218, pp. 14\u201317, (Springer-Verlag, 1986)."},{"key":"11_CR8","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"203","DOI":"10.1007\/3-540-39118-5_19","volume-title":"Advances in Cryptology\u2014Eurocrypt\u2019 87","author":"I. Damgard","year":"1988","unstructured":"I. Damgard. Collision-free hash functions and public-key signature schemes. In Advances in Cryptology\u2014Eurocrypt\u2019 87, Lecture Notes in Computer Science, Vol. 304, pp. 203\u2013217, Springer-Verlag (1988)."},{"key":"11_CR9","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"416","DOI":"10.1007\/0-387-34805-0_39","volume-title":"Advances in Cryptology\u2014Crypto\u2019 89","author":"I. Damgard","year":"1988","unstructured":"I. Damgard. A design principle for hash functions. In Advances in Cryptology\u2014Crypto\u2019 89, Lecture Notes in Computer Science, Vol. 435, pp. 416\u2013427, Springer-Verlag (1988)."},{"key":"11_CR10","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"53","DOI":"10.1007\/3-540-60865-6_43","volume-title":"Fast Software Encryption","author":"H. Dobbertin","year":"1996","unstructured":"H. Dobbertin. Cryptanalysis of MD4. In Fast Software Encryption, Lecture Notes in Computer Science, Vol. 1039, ed. D. Gollman, pp. 53\u201369, Springer-Verlag (1996)."},{"key":"11_CR11","unstructured":"H. Dobbertin. Cryptanalysis of MD5 compress. Rump Session of Eurocrypt\u2019 96, presented by B. Preneel (May 1996). (Available at http:\/\/www.iacr.org\/conferences\/ec96\/rump\/ .)"},{"key":"11_CR12","unstructured":"H. Dobbertin. The status of MD5 after a recent attack. CrytoBytes, Vol. 2, No. 2 (Summer 1996). (Available at http:\/\/www.rsa.com\/rsalabs\/-pubs\/cryptobytes\/ .)"},{"issue":"1","key":"11_CR13","doi-asserted-by":"publisher","first-page":"51","DOI":"10.1007\/s001459900019","volume":"10","author":"H. Dobbertin","year":"1997","unstructured":"H. Dobbertin. RIPEMD with two-round compress function is not collision-free. Journal of Cryptology, Vol. 10, No. 1, pp. 51\u201369 (1997).","journal-title":"Journal of Cryptology"},{"key":"11_CR14","series-title":"Lect Notes Comput Sci","volume-title":"Fast Software Encryption","author":"H. Dobbertin","year":"2006","unstructured":"H. Dobbertin. The first two rounds of MD4 are not one-way. In Fast Software Encryption, Lecture Notes in Computer Science, Springer-Verlag (to appear)."},{"key":"11_CR15","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"71","DOI":"10.1007\/3-540-60865-6_44","volume-title":"Fast Software Encryption","author":"H. Dobbertin","year":"1996","unstructured":"H. Dobbertin, A. Bosselaers, and B. Preneel. RIPEMD-160: A strengthened version of RIPEMD. In Fast Software Encryption, Lecture Notes in Computer Science, Vol. 1039, pp. 71\u201382, Springer-Verlag (1996)."},{"key":"11_CR16","unstructured":"O. Goldreich, S. Goldwasser, and S. Halevi. Collision-free hashing from lattice problems. Theory of Cryptography Library, Record 96-09. (Available at http:\/\/theory.lcs.mit.edu\/~tcryptol\/ .)"},{"key":"11_CR17","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"485","DOI":"10.1007\/BFb0052257","volume-title":"Advances in Cryptology\u2014Crypto\u2019 97","author":"L. Knudsen","year":"1997","unstructured":"L. Knudsen, B. Preneel. Fast and secure hashing based on codes. In Advances in Cryptology\u2014Crypto\u2019 97, Lecture Notes in Computer Science, Vol. 1294, pp. 485\u2013498, Springer-Verlag (1997)."},{"key":"11_CR18","first-page":"5658","volume":"27","author":"S.M. Matyas","year":"1985","unstructured":"S.M. Matyas, C.H. Meyer, and J. Oseas. Generating strong one-way functions with cryptographic algorithm. IBM Technical Disclosure Bulletin, vol. 27, pp. 5658\u20135659 (1985).","journal-title":"IBM Technical Disclosure Bulletin"},{"key":"11_CR19","unstructured":"A. Menezes, P. van Oorschot, S. Vanstone. Handbook of Applied Cryptography (CRC Press, 1997)."},{"key":"11_CR20","doi-asserted-by":"crossref","unstructured":"R.C. Merkle. Protocols for public key cryptosystems. In Proc. 1980 Symposium on Security and Privacy, IEEE Computer Society, pp. 122\u2013133 (April 1980).","DOI":"10.1109\/SP.1980.10006"},{"key":"11_CR21","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"428","DOI":"10.1007\/0-387-34805-0_40","volume-title":"Advances in Cryptology\u2014Crypto\u2019 89","author":"R.C. Merkle","year":"1990","unstructured":"R.C. Merkle. One-way hash functions and DES. In Advances in Cryptology\u2014Crypto\u2019 89, Lecture Notes in Computer Science, Vol. 435, pp. 428\u2013446 (Springer-Verlag, 1990)."},{"key":"11_CR22","doi-asserted-by":"publisher","first-page":"43","DOI":"10.1007\/BF00203968","volume":"3","author":"R.C. Merkle","year":"1990","unstructured":"R.C. Merkle. A fast software one-way hash function. Journal of Cryptology, Vol. 3, pp. 43\u201358 (1990).","journal-title":"Journal of Cryptology"},{"issue":"7","key":"11_CR23","doi-asserted-by":"publisher","first-page":"465","DOI":"10.1145\/358699.358718","volume":"24","author":"R.C. Merkle","year":"1981","unstructured":"R.C. Merkle and M. Hellman. On the security of multiple encryption. Communications of the ACM, Vol. 24, No. 7, pp. 465\u2013467 (July 1981).","journal-title":"Communications of the ACM"},{"key":"11_CR24","first-page":"128","volume":"2","author":"S. Miyaguchi","year":"1990","unstructured":"S. Miyaguchi, K. Ohta, and M. Iwata. 128-bit hash function (N-hash). NTT Review, vol. 2, pp. 128\u2013132 (1990).","journal-title":"NTT Review"},{"key":"11_CR25","doi-asserted-by":"crossref","unstructured":"M. Naor and M. Yung. Universal one-way hash functions and their cryptographic applications. In Proceedings of the 21st Symposium on Theory of Computing, pp. 33\u201343 (ACM, 1989).","DOI":"10.1145\/73007.73011"},{"key":"11_CR26","unstructured":"National Institute of Standards and Technology. Secure Hash Standard. NIST Federal Information Processing Standard Publication 180-1 (May 1994)."},{"key":"11_CR27","series-title":"Lect Notes Comput Sci","volume-title":"Recent Advances in Parallel Virtual Machine and Message Passing Interface (EuroPVM-MPI\u201997)","author":"M. Peinado","year":"1997","unstructured":"M. Peinado, R. Venkatesan. Highly parallel cryptographic attacks. In Recent Advances in Parallel Virtual Machine and Message Passing Interface (EuroPVM-MPI\u201997), Lecture Notes in Computer Science (Springer-Verlag, 1997)."},{"key":"11_CR28","unstructured":"B. Preneel. Analysis and Design of Cryptographic Hash Functions. Ph.D. dissertation, Katholieke Universiteit Leuven (January 1993)."},{"key":"11_CR29","unstructured":"B. Preneel, private communication (1997)."},{"key":"11_CR30","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"368","DOI":"10.1007\/3-540-48329-2_31","volume-title":"Advances in Cryptology\u2014Crypto\u2019 93","author":"B. Preneel","year":"1991","unstructured":"B. Preneel, R. Govaerts, J. Vandewalle. Hash functions based on block ciphers: A synthetic approach. In Advances in Cryptology\u2014Crypto\u2019 93, Lecture Notes in Computer Science, Vol. 773, pp. 368\u2013378 (Springer-Verlag, 1991)."},{"key":"11_CR31","doi-asserted-by":"crossref","unstructured":"B. Preneel, R. Govaerts, J. Vandewalle. Differential cryptanalysis of hash functions based on block ciphers. In Proceedings of the 1st ACM Conference on Computer and Communications Security, pp. 183\u2013188 (ACM, 1993).","DOI":"10.1145\/168588.168611"},{"key":"11_CR32","unstructured":"M.O. Rabin. Digitalized signatures. In Foundations of Secure Computation, eds. R. Lipton, R. DeMillo, pp. 155\u2013166 (Academic Press, 1978)."},{"key":"11_CR33","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"242","DOI":"10.1007\/3-540-60590-8_18","volume-title":"Fast Software Encryption","author":"V. Rijmen","year":"1995","unstructured":"V. Rijmen, B. Preneel. Improved characteristics for differential cryptanalysis of hash functions based on block ciphers. In Fast Software Encryption, Lecture Notes in Computer Science, Vol. 1008, pp. 242\u2013248 (Springer-Verlag, 1995)."},{"key":"11_CR34","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"303","DOI":"10.1007\/3-540-38424-3_22","volume-title":"Advances in Cryptology\u2014Crypto\u2019 90","author":"R. Rivest","year":"1991","unstructured":"R. Rivest. The MD4 message digest algorithm. In Advances in Cryptology\u2014Crypto\u2019 90, Lecture Notes in Computer Science, Vol. 537, pp. 303\u2013311, (Springer-Verlag, 1991)."},{"key":"11_CR35","doi-asserted-by":"crossref","unstructured":"R. Rivest. The MD5 Message-Digest Algorithm. Internet Network Working Group Request for Comments 1321 (April 1992).","DOI":"10.17487\/rfc1321"},{"key":"11_CR36","unstructured":"Surety Technologies, Inc. Answers to Frequently Asked Questions about the Digital Notary\u2122 System. http:\/\/www.surety.com (since January 1995)."},{"key":"11_CR37","doi-asserted-by":"crossref","unstructured":"P. van Oorschot and M. Wiener. Parallel collision search with applications to hash functions and discrete logarithms. In Proceedings of the 2nd ACM Conference on Computer and Communication Security, pp. 210\u2013218 (ACM Press, 1994).","DOI":"10.1145\/191177.191231"}],"container-title":["Lecture Notes in Computer Science","Fast Software Encryption"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-69710-1_11","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,1]],"date-time":"2019-05-01T17:59:14Z","timestamp":1556733554000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-69710-1_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1998]]},"ISBN":["9783540642657","9783540697107"],"references-count":37,"URL":"https:\/\/doi.org\/10.1007\/3-540-69710-1_11","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[1998]]}}}