{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,5]],"date-time":"2026-03-05T17:15:43Z","timestamp":1772730943147,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":10,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540219354","type":"print"},{"value":"9783540246763","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2004]]},"DOI":"10.1007\/978-3-540-24676-3_24","type":"book-chapter","created":{"date-parts":[[2010,8,4]],"date-time":"2010-08-04T04:33:13Z","timestamp":1280896393000},"page":"401-418","source":"Crossref","is-referenced-by-count":70,"title":["Hash Function Balance and Its Impact on Birthday Attacks"],"prefix":"10.1007","author":[{"given":"Mihir","family":"Bellare","sequence":"first","affiliation":[]},{"given":"Tadayoshi","family":"Kohno","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"24_CR1","doi-asserted-by":"crossref","unstructured":"Bellare, M., Kohno, T.: Hash function balance and its impact on birthday attacks. IACR ePrint archive, http:\/\/eprint.iacr.org\/2003\/065\/ Full version of this paper","DOI":"10.1007\/978-3-540-24676-3_24"},{"key":"24_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"416","DOI":"10.1007\/0-387-34805-0_39","volume-title":"Advances in Cryptology - CRYPTO \u201989","author":"I. Damg\u00e5rd","year":"1990","unstructured":"Damg\u00e5rd, I.: A design principle for hash functions. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol.\u00a0435, pp. 416\u2013427. Springer, Heidelberg (1990)"},{"key":"24_CR3","series-title":"Lecture Notes in Computer Science","volume-title":"Fast Software Encryption","author":"H. Dobbertin","year":"1996","unstructured":"Dobbertin, H., Bosselaers, A., Preneel, B.: RIPEMD-160, a strengthened version of RIPEMD. In: Gollmann, D. (ed.) FSE 1996. LNCS, vol.\u00a01039, Springer, Heidelberg (1996)"},{"key":"24_CR4","volume-title":"Handbook of applied cryptography","author":"A. Menezes","year":"1997","unstructured":"Menezes, A., van Oorschot, P., Vanstone, S.: Handbook of applied cryptography. CRC Press, Boca Raton (1997)"},{"key":"24_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"428","DOI":"10.1007\/0-387-34805-0_40","volume-title":"Advances in Cryptology - CRYPTO \u201989","author":"R. Merkle","year":"1990","unstructured":"Merkle, R.: One way hash functions and DES. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol.\u00a0435, pp. 428\u2013446. Springer, Heidelberg (1990)"},{"key":"24_CR6","unstructured":"National Institute of Standards. FIPS 180-2, Secure hash standard. August 1 (2000)"},{"key":"24_CR7","doi-asserted-by":"crossref","unstructured":"Rivest, R.: The MD5 message-digest algorithm. IETF RFC 1321 (April 1992)","DOI":"10.17487\/rfc1321"},{"key":"24_CR8","volume-title":"Cryptography theory and practice","author":"D. Stinson","year":"1995","unstructured":"Stinson, D.: Cryptography theory and practice, 1st edn. CRC Press, Boca Raton (1995)","edition":"1"},{"issue":"1","key":"24_CR9","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/PL00003816","volume":"12","author":"P. Oorschot van","year":"1999","unstructured":"van Oorschot, P., Wiener, M.: Parallel collision search with cryptanalytic applications. Journal of Cryptology\u00a012(1), 1\u201328 (1999)","journal-title":"Journal of Cryptology"},{"key":"24_CR10","doi-asserted-by":"crossref","unstructured":"Yuval, G.: How to swindle Rabin. Cryptologia\u00a0(3), 187\u2013190 (1979)","DOI":"10.1080\/0161-117991854025"}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology - EUROCRYPT 2004"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-24676-3_24.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,23]],"date-time":"2025-02-23T19:42:58Z","timestamp":1740339778000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-24676-3_24"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004]]},"ISBN":["9783540219354","9783540246763"],"references-count":10,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-24676-3_24","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2004]]}}}