{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T18:18:34Z","timestamp":1761675514834},"publisher-location":"Berlin, Heidelberg","reference-count":12,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540642657"},{"type":"electronic","value":"9783540697107"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1998]]},"DOI":"10.1007\/3-540-69710-1_5","type":"book-chapter","created":{"date-parts":[[2007,8,9]],"date-time":"2007-08-09T20:50:55Z","timestamp":1186692655000},"page":"60-74","source":"Crossref","is-referenced-by-count":47,"title":["Fast Hashing and Stream Encryption with Panama"],"prefix":"10.1007","author":[{"given":"Joan","family":"Daemen","sequence":"first","affiliation":[]},{"given":"Craig","family":"Clapp","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[1998,10,16]]},"reference":[{"issue":"1","key":"5_CR1","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/BF00630563","volume":"4","author":"E. Biham","year":"1991","unstructured":"E. Biham and A. Shamir, \u201cDifferential cryptanalysis of DES-like cryptosystems,\u201d Journal of Cryptology, Vol. 4, No. 1, 1991, pp. 3\u201372.","journal-title":"Journal of Cryptology"},{"key":"5_CR2","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"298","DOI":"10.1007\/3-540-68697-5_23","volume-title":"Advances in Cryptology \u2014 Proceedings Crypto\u201996","author":"A. Bosselaers","year":"1996","unstructured":"A. Bosselaers, R. Govaerts, J. Vandewalle, \u201cFast Hashing on the Pentium\u201d, Advances in Cryptology \u2014 Proceedings Crypto\u201996 LNCS 1109, N. Koblitz, Ed., Springer-Verlag, 1996, pp. 298\u2013312."},{"key":"5_CR3","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"273","DOI":"10.1007\/BFb0052353","volume-title":"Fast Software Encryption","author":"C.S.K. Clapp","year":"1997","unstructured":"C.S.K. Clapp, \u201cOptimizing a fast stream cipher for VLIW, SIMD, and superscalar processors,\u201d Fast Software Encryption, LNCS 1267, E. Biham, Ed., Springer-Verlag, 1997, pp. 273\u2013287."},{"key":"5_CR4","unstructured":"J. Daemen, \u201cCipher and hash function design strategies based on linear and differential cryptanalysis,\u201d Doctoral Dissertation, March 1995, K.U.Leuven."},{"key":"5_CR5","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"71","DOI":"10.1007\/3-540-60865-6_44","volume-title":"Fast Software Encryption","author":"H. Dobbertin","year":"1996","unstructured":"H. Dobbertin, A. Bosselaers, B. Preneel, \u201cRIPEMD-160: A Strengthened version of RIPEMD,\u201d Fast Software Encryption, LNCS 1039, D. Gollmann, Ed., Springer-Verlag, 1996, pp. 71\u201382."},{"key":"5_CR6","unstructured":"FIPS 180, Secure Hash Standard, Federal Information Processing Standard (FIPS), Publication 180, National Institute of Standards and Technology, US Department of Commerce, Washington D.C., May 1993."},{"key":"5_CR7","unstructured":"FIPS 180-1, Secure Hash Standard, Federal Information Processing Standard (FIPS), Publication 180-1, National Institute of Standards and Technology, US Department of Commerce, Washington D.C., April 1995."},{"key":"5_CR8","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"19","DOI":"10.1007\/3-540-68339-9_3","volume-title":"Advances in Cryptology \u2014 Proceedings Eurocrypt\u201996","author":"B. Preneel","year":"1996","unstructured":"B. Preneel and P.C. van Oorschot, \u201cOn the Security of Two MAC Algorithms\u201d, Advances in Cryptology \u2014 Proceedings Eurocrypt\u201996 LNCS 1070, U.M. Maurer, Ed., Springer-Verlag, 1996, pp. 19\u201332."},{"key":"5_CR9","doi-asserted-by":"crossref","unstructured":"R.L. Rivest, The MD4 message-digest algorithm, Request for comments (RFC) 1320, Internet Activities Board, Internet Privacy Task Force, April 1992.","DOI":"10.17487\/rfc1320"},{"key":"5_CR10","doi-asserted-by":"crossref","unstructured":"R.L. Rivest, The MD5 message-digest algorithm, Request for comments (RFC) 1321, Internet Activities Board, Internet Privacy Task Force, April 1992.","DOI":"10.17487\/rfc1321"},{"key":"5_CR11","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"56","DOI":"10.1007\/3-540-58108-1_8","volume-title":"Fast Software Encryption","author":"P. Rogaway","year":"1994","unstructured":"P. Rogaway and D. Coppersmith, \u201cA Software-Optimized Encryption Algorithm,\u201d Fast Software Encryption, LNCS 809, R. Anderson, Ed., Springer-Verlag, 1994, pp. 56\u201363."},{"key":"5_CR12","unstructured":"B. Schneier, Applied Cryptography, Second Edition, John Wiley & Sons, 1996, pp. 397\u2013398."}],"container-title":["Lecture Notes in Computer Science","Fast Software Encryption"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-69710-1_5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,1]],"date-time":"2019-05-01T21:59:00Z","timestamp":1556747940000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-69710-1_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1998]]},"ISBN":["9783540642657","9783540697107"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/3-540-69710-1_5","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[1998]]}}}