{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T15:18:48Z","timestamp":1725549528554},"publisher-location":"Berlin, Heidelberg","reference-count":20,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540239758"},{"type":"electronic","value":"9783540305392"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2004]]},"DOI":"10.1007\/978-3-540-30539-2_16","type":"book-chapter","created":{"date-parts":[[2010,3,12]],"date-time":"2010-03-12T08:41:57Z","timestamp":1268383317000},"page":"214-229","source":"Crossref","is-referenced-by-count":18,"title":["The MD2 Hash Function Is Not One-Way"],"prefix":"10.1007","author":[{"given":"Fr\u00e9d\u00e9ric","family":"Muller","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"16_CR1","doi-asserted-by":"crossref","unstructured":"Balenson, D.: RFC 1423 - Privacy Enhancement for Internet Electronic Mail: Part III: Algorithms, Modes, and Identifiers. RSA Laboratories (February 1993)","DOI":"10.17487\/rfc1423"},{"key":"16_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"56","DOI":"10.1007\/BFb0055720","volume-title":"Advances in Cryptology - CRYPTO \u201998","author":"F. Chabaud","year":"1998","unstructured":"Chabaud, F., Joux, A.: Differential Collisions in SHA-0. In: Krawczyk, H. (ed.) CRYPTO 1998. LNCS, vol.\u00a01462, pp. 56\u201371. Springer, Heidelberg (1998)"},{"key":"16_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"53","DOI":"10.1007\/3-540-60865-6_43","volume-title":"Fast Software Encryption \u2013 1996","author":"H. Dobbertin","year":"1996","unstructured":"Dobbertin, H.: Cryptanalysis of MD4. In: Gollmann, D. (ed.) FSE 1996. LNCS, vol.\u00a01039, pp. 53\u201369. Springer, Heidelberg (1996)"},{"issue":"2","key":"16_CR4","first-page":"1","volume":"2","author":"H. Dobbertin","year":"1996","unstructured":"Dobbertin, H.: The Status of MD5 after a Recent Attack. CryptoBytes\u00a02(2), 1\u20136 (1996)","journal-title":"CryptoBytes"},{"key":"16_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"284","DOI":"10.1007\/3-540-69710-1_19","volume-title":"Fast Software Encryption","author":"H. Dobbertin","year":"1998","unstructured":"Dobbertin, H.: The First Two Rounds of MD4 are Not One-Way. In: Vaudenay, S. (ed.) FSE 1998. LNCS, vol.\u00a01372, pp. 284\u2013292. Springer, Heidelberg (1998)"},{"key":"16_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"306","DOI":"10.1007\/978-3-540-28628-8_19","volume-title":"Advances in Cryptology \u2013 CRYPTO 2004","author":"A. Joux","year":"2004","unstructured":"Joux, A.: Multicollisions in iterated hash functions. Application to cascaded constructions. In: Franklin, M. (ed.) CRYPTO 2004. LNCS, vol.\u00a03152, pp. 306\u2013316. Springer, Heidelberg (2004) (to appear)"},{"key":"16_CR7","doi-asserted-by":"crossref","unstructured":"Kaliski, B.: RFC 1319 - The MD2 Message-Digest Algorithm. RSA Laboratories (April 1992)","DOI":"10.17487\/rfc1319"},{"key":"16_CR8","unstructured":"MD5CRK, a new distributed computing project, See http:\/\/www.md5crk.com\/"},{"key":"16_CR9","doi-asserted-by":"publisher","DOI":"10.1201\/9781439821916","volume-title":"Handbook of Applied Cryptography","author":"A. Menezes","year":"1996","unstructured":"Menezes, A., van Oorschot, P., Vanstone, S.: Handbook of Applied Cryptography. CRC Press, Boca Raton (1996)"},{"key":"16_CR10","unstructured":"Preneel, B.: Analysis and design of cryptographic hash functions. PhD thesis, Katholieke Universiteit Leuven (1993)"},{"key":"16_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"303","DOI":"10.1007\/3-540-38424-3_22","volume-title":"Advances in Cryptology - CRYPTO \u201990","author":"R. Rivest","year":"1991","unstructured":"Rivest, R.: The MD4 Message Digest Algorithm. In: Menezes, A., Vanstone, S.A. (eds.) CRYPTO 1990. LNCS, vol.\u00a0537, pp. 303\u2013311. Springer, Heidelberg (1991)"},{"key":"16_CR12","doi-asserted-by":"crossref","unstructured":"Rivest, R.: RFC 1321 - The MD5 Message-Digest Algorithm. RSA Laboratories (April 1992)","DOI":"10.17487\/rfc1321"},{"key":"16_CR13","series-title":"Lecture Notes in Computer Science","first-page":"349","volume-title":"Fast Software Encryption","author":"P. Rogaway","year":"2004","unstructured":"Rogaway, P., Shrimpton, T.: Cryptographic Hash Function Basics: Definitions, Implications, and Separations for Preimage Resistance, Second-Preimage Resistance, and Collision Resistance. In: Roy, B., Meier, W. (eds.) FSE 2004. LNCS, vol.\u00a03017, pp. 349\u2013366. Springer, Heidelberg (2004) (Pre-proceedings Version)"},{"issue":"3","key":"16_CR14","doi-asserted-by":"publisher","first-page":"245","DOI":"10.1023\/A:1008220711840","volume":"12","author":"N. Rogier","year":"1997","unstructured":"Rogier, N., Chauvaud, P.: MD2 Is not Secure without the Checksum Byte. Designs, Codes and Cryptography\u00a012(3), 245\u2013251 (1997); An early version of this paper was presented at the 2nd SAC Workshop in 1995","journal-title":"Designs, Codes and Cryptography"},{"key":"16_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"228","DOI":"10.1007\/978-3-540-40061-5_14","volume-title":"Advances in Cryptology - ASIACRYPT 2003","author":"B. Rompay Van","year":"2003","unstructured":"Van Rompay, B., Biryukov, A., Preneel, B.: Cryptanalysis of 3-Pass HAVAL. In: Laih, C.-S. (ed.) ASIACRYPT 2003. LNCS, vol.\u00a02894, pp. 228\u2013245. Springer, Heidelberg (2003)"},{"key":"16_CR16","unstructured":"RSA Laboratories. PKCS #1 v1.5: RSA Encryption Standard (1993), Available at http:\/\/www.rsalabs.com\/pkcs\/pkcs-1"},{"key":"16_CR17","unstructured":"RSA Laboratories. PKCS #1 v2.1: RSA Encryption Standard (2002), Available at http:\/\/www.rsalabs.com\/pkcs\/pkcs-1"},{"issue":"1","key":"16_CR18","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/PL00003816","volume":"12","author":"P. Oorschot van","year":"1999","unstructured":"van Oorschot, P., Wiener, M.: Parallel Collision Search with Cryptanalytic Applications. Journal of Cryptology\u00a012(1), 1\u201328 (1999)","journal-title":"Journal of Cryptology"},{"key":"16_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"288","DOI":"10.1007\/3-540-45708-9_19","volume-title":"Advances in Cryptology - CRYPTO 2002","author":"D. Wagner","year":"2002","unstructured":"Wagner, D.: A Generalized Birthday Problem. In: Yung, M. (ed.) CRYPTO 2002. LNCS, vol.\u00a02442, pp. 288\u2013303. Springer, Heidelberg (2002) (Extended Abstract)"},{"issue":"2","key":"16_CR20","doi-asserted-by":"publisher","first-page":"105","DOI":"10.1007\/s00145-003-0213-5","volume":"17","author":"A. Wiemers","year":"2004","unstructured":"Wiemers, A.: The Full Cost of Cryptanalytic Attacks. Journal of Cryptology\u00a017(2), 105\u2013124 (2004)","journal-title":"Journal of Cryptology"}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology - ASIACRYPT 2004"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-30539-2_16.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,18]],"date-time":"2020-11-18T23:59:04Z","timestamp":1605743944000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-30539-2_16"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004]]},"ISBN":["9783540239758","9783540305392"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-30539-2_16","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2004]]}}}