{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,12]],"date-time":"2026-05-12T01:36:19Z","timestamp":1778549779122,"version":"3.51.4"},"publisher-location":"Berlin, Heidelberg","reference-count":4,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540642657","type":"print"},{"value":"9783540697107","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1998]]},"DOI":"10.1007\/3-540-69710-1_19","type":"book-chapter","created":{"date-parts":[[2007,8,9]],"date-time":"2007-08-09T20:50:55Z","timestamp":1186692655000},"page":"284-292","source":"Crossref","is-referenced-by-count":32,"title":["The First Two Rounds of MD4 are Not One-Way"],"prefix":"10.1007","author":[{"given":"Hans","family":"Dobbertin","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[1998,10,16]]},"reference":[{"key":"19_CR1","series-title":"Lect Notes Comput Sci","first-page":"55","volume-title":"Fast Software Encryption","author":"H. Dobbertin","year":"1996","unstructured":"H. Dobbertin, Cryptanalysis of MD4, Fast Software Encryption (Third Workshop on Cryptographic Algorithms, Cambridge 1996), Lecture Notes in Computer Science, Springer-Verlag 1996, pp. 55\u201372."},{"issue":"2","key":"19_CR2","first-page":"1","volume":"2\/","author":"H. Dobbertin","year":"1996","unstructured":"H. Dobbertin, The status of MD5 after a recent attack, CryptoBytes, The technical newsletter of RSA Laboratories, vol. 2\/2, Sommer 1996, pp. 1\u20136.","journal-title":"CryptoBytes"},{"key":"19_CR3","doi-asserted-by":"crossref","unstructured":"R. Rivest, The MD4 message-digest algorithm, Request for Comments (RFC) 1320, Internet Activities Board, Internet Privacy Task Force, April 1992.","DOI":"10.17487\/rfc1320"},{"key":"19_CR4","unstructured":"M.J.B. Robshaw, On recent results for MD2, MD4 and MD5, Bulletin 4, RSA Laboratories, November 1996 (see http:\/\/www.rsa.com\/PUBS\/ )."}],"container-title":["Lecture Notes in Computer Science","Fast Software Encryption"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-69710-1_19","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,1]],"date-time":"2019-05-01T21:59:01Z","timestamp":1556747941000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-69710-1_19"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1998]]},"ISBN":["9783540642657","9783540697107"],"references-count":4,"URL":"https:\/\/doi.org\/10.1007\/3-540-69710-1_19","relation":{},"ISSN":["0302-9743"],"issn-type":[{"value":"0302-9743","type":"print"}],"subject":[],"published":{"date-parts":[[1998]]}}}