{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T21:05:57Z","timestamp":1725570357956},"publisher-location":"Berlin, Heidelberg","reference-count":19,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642148828"},{"type":"electronic","value":"9783642148835"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-14883-5_29","type":"book-chapter","created":{"date-parts":[[2010,11,17]],"date-time":"2010-11-17T05:36:16Z","timestamp":1289972176000},"page":"221-228","source":"Crossref","is-referenced-by-count":1,"title":["Cryptanalysis of Hash Functions Using Advanced Multiprocessing"],"prefix":"10.1007","author":[{"given":"J.","family":"G\u00f3mez","sequence":"first","affiliation":[]},{"given":"F. G.","family":"Montoya","sequence":"additional","affiliation":[]},{"given":"R.","family":"Benedicto","sequence":"additional","affiliation":[]},{"given":"A.","family":"Jimenez","sequence":"additional","affiliation":[]},{"given":"C.","family":"Gil","sequence":"additional","affiliation":[]},{"given":"A.","family":"Alcayde","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"29_CR1","unstructured":"L\u00f3pez, J.G., Navarro, R.B.: Seguridad en Sistemas Operativos Windows y Linux. Ra-Ma (2006)"},{"key":"29_CR2","unstructured":"Ley org\u00e1nica 15\/1999, de 13 de diciembre, de Protecci\u00f3n de datos de Car\u00e1cter Personal (1999)"},{"key":"29_CR3","doi-asserted-by":"crossref","unstructured":"Kenning, M.: Security Management Standard \u2014 ISO 17799\/BS 7799. Springer Netherlands (2001)","DOI":"10.1049\/PBBT004E_ch16"},{"key":"29_CR4","unstructured":"Est\u00e1ndar Internacional ISO\/IEC 27001 (2005)"},{"key":"29_CR5","unstructured":"Mookhey, K.K., Burghate, N.: Linux - Security, Audit and Control Features. In: ISACA (2005)"},{"key":"29_CR6","doi-asserted-by":"crossref","unstructured":"Rivest, R.: The MD5 Message-Digest Algorithm. Network Working Group (April 1992), http:\/\/www.ietf.org\/rfc\/rfc1321.txt","DOI":"10.17487\/rfc1321"},{"key":"29_CR7","doi-asserted-by":"crossref","unstructured":"Eastlake, D., Jone, P.: US Secure Hash Algorithm 1 (SHA1). Network Working Group (September 2001), http:\/\/www.ietf.org\/rfc\/rfc3174.txt","DOI":"10.17487\/rfc3174"},{"key":"29_CR8","doi-asserted-by":"crossref","unstructured":"Rivest, R.: The MD4 Message-Digest Algorithm. Network Working Group (April 1992) http:\/\/tools.ietf.org\/html\/rfc1320","DOI":"10.17487\/rfc1320"},{"key":"29_CR9","doi-asserted-by":"crossref","unstructured":"Wang, X., Yu, H.: How to Break MD5 and Other Hash Functions. Shandong University, Jinan 250100, China (2004)","DOI":"10.1007\/11426639_2"},{"key":"29_CR10","unstructured":"Joux, A., Chaveaud, F.: Differential Collisions in SHA-0. Centre d\u2019\u00c9lectronique de l\u2019Armament. France (2004)"},{"key":"29_CR11","doi-asserted-by":"crossref","unstructured":"Halevi, S., Krawczyk, H.: Strengthening Digital Signatures via Randomized Hashing. In: CFRG 2005 (May 2005)","DOI":"10.1007\/11818175_3"},{"key":"29_CR12","doi-asserted-by":"crossref","unstructured":"Oechslin, P.: Making a Faster Cryptanalytic Time-Memory Trade-Off. LASEC (2003)","DOI":"10.1007\/978-3-540-45146-4_36"},{"key":"29_CR13","doi-asserted-by":"crossref","unstructured":"Hellman, M.E.: A Cryptanalytic Time-Memory Trade-Off. IEEE Tansactions on Information Theory (1980)","DOI":"10.1109\/TIT.1980.1056220"},{"key":"29_CR14","unstructured":"Vargas, E.C.: Aplicaciones Multi Hebras. Arequipa \u2013 Per\u00fa (Octubre 2001)"},{"key":"29_CR15","unstructured":"Alonso, J.M.: Programaci\u00f3n de aplicaciones paralelas con MPI. Enero (1997)"},{"key":"29_CR16","unstructured":"NVIDIA CUDA Compute Unified Device Architecture Programming Guide v2.0. (Septiembre 2008)"},{"key":"29_CR17","volume-title":"Conference on Computer and Communications Security","author":"C. Paul","year":"2004","unstructured":"Paul, C., et al.: Parallel Collision Search with Application to Hash Functions and Discrete Logarithms. In: Conference on Computer and Communications Security. ACM, New York (2004)"},{"key":"29_CR18","unstructured":"Lenstra, A., Wang, X., de Weger, B.: Colliding X.509 Certificates, Cryptology ePrint Archive Report 2005\/067 (March 1, 2005) (revised May 6, 2005), (retrieved July 27, 2008)"},{"key":"29_CR19","unstructured":"http:\/\/project-rainbowcrack.com\/ , (accessed April 26, 2010)"}],"container-title":["Advances in Intelligent and Soft Computing","Distributed Computing and Artificial Intelligence"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-14883-5_29","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,6,4]],"date-time":"2023-06-04T06:43:00Z","timestamp":1685860980000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-14883-5_29"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642148828","9783642148835"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-14883-5_29","relation":{},"ISSN":["1867-5662","1867-5670"],"issn-type":[{"type":"print","value":"1867-5662"},{"type":"electronic","value":"1867-5670"}],"subject":[],"published":{"date-parts":[[2010]]}}}