{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T00:01:00Z","timestamp":1725494460940},"publisher-location":"Berlin, Heidelberg","reference-count":5,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540767879"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-76788-6_1","type":"book-chapter","created":{"date-parts":[[2007,11,12]],"date-time":"2007-11-12T14:24:16Z","timestamp":1194877456000},"page":"1-10","source":"Crossref","is-referenced-by-count":0,"title":["Cryptanalysis of a Hash Function Proposed at ICISC 2006"],"prefix":"10.1007","author":[{"given":"Willi","family":"Geiselmann","sequence":"first","affiliation":[]},{"given":"Rainer","family":"Steinwandt","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"1_CR1","doi-asserted-by":"publisher","first-page":"235","DOI":"10.1006\/jsco.1996.0125","volume":"24","author":"W. Bosma","year":"1997","unstructured":"Bosma, W., Cannon, J.J., Playoust, C.: The Magma Algebra System I: The User Language. Journal of Symbolic Computation\u00a024, 235\u2013265 (1997)","journal-title":"Journal of Symbolic Computation"},{"key":"1_CR2","unstructured":"Chang, D.: Preimage Attack on Hashing with Polynomials proposed at ICISC 2006. Cryptology ePrint Archive: Report 2006\/411(2006), available at \n                    \n                      http:\/\/eprint.iacr.org\/2006\/411"},{"key":"1_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"416","DOI":"10.1007\/0-387-34805-0_39","volume-title":"CRYPTO 1989","author":"I.B. Damg\u00e5rd","year":"1990","unstructured":"Damg\u00e5rd, I.B.: A Design Principle for Hash Functions. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol.\u00a0435, pp. 416\u2013427. Springer, Heidelberg (1990)"},{"key":"1_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"218","DOI":"10.1007\/0-387-34805-0_21","volume-title":"CRYPTO 1989","author":"R.C. Merkle","year":"1990","unstructured":"Merkle, R.C.: A Certified Digital Signature. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol.\u00a0435, pp. 218\u2013238. Springer, Heidelberg (1990)"},{"key":"1_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"22","DOI":"10.1007\/11927587_4","volume-title":"ICISC 2006","author":"V. Shpilrain","year":"2006","unstructured":"Shpilrain, V.: Hashing with Polynomials. In: Rhee, M.S., Lee, B. (eds.) ICISC 2006. LNCS, vol.\u00a04296, pp. 22\u201328. Springer, Heidelberg (2006)"}],"container-title":["Lecture Notes in Computer Science","Information Security and Cryptology - ICISC 2007"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-76788-6_1.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T10:38:22Z","timestamp":1619519902000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-76788-6_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540767879"],"references-count":5,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-76788-6_1","relation":{},"subject":[]}}