{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T10:10:27Z","timestamp":1743156627286,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":32,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642312830"},{"type":"electronic","value":"9783642312847"}],"license":[{"start":{"date-parts":[[2012,1,1]],"date-time":"2012-01-01T00:00:00Z","timestamp":1325376000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-31284-7_17","type":"book-chapter","created":{"date-parts":[[2012,6,13]],"date-time":"2012-06-13T06:15:58Z","timestamp":1339568158000},"page":"275-292","source":"Crossref","is-referenced-by-count":14,"title":["Distinguishers beyond Three Rounds of the RIPEMD-128\/-160 Compression Functions"],"prefix":"10.1007","author":[{"given":"Yu","family":"Sasaki","sequence":"first","affiliation":[]},{"given":"Lei","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"17_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1007\/11426639_2","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2005","author":"X. Wang","year":"2005","unstructured":"Wang, X., Yu, H.: How to Break MD5 and Other Hash Functions. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol.\u00a03494, pp. 19\u201335. Springer, Heidelberg (2005)"},{"key":"17_CR2","series-title":"Lecture Notes in Computer Science","first-page":"17","volume-title":"Advances in Cryptology \u2013 CRYPTO 2005","author":"X. Wang","year":"2005","unstructured":"Wang, X., Yin, Y.L., Yu, H.: Finding Collisions in the Full SHA-1. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol.\u00a03621, pp. 17\u201336. Springer, Heidelberg (2005)"},{"key":"17_CR3","unstructured":"U.S. Department of Commerce, National Institute of Standards and Technology: Federal Register \/Vol. 72, No. 212\/Friday, November 2, 2007\/Notices (2007), \n                    \n                      http:\/\/csrc.nist.gov\/groups\/ST\/hash\/documents\/FR_Notice_Nov07.pdf\n                    \n                    \n                  ."},{"key":"17_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"71","DOI":"10.1007\/3-540-60865-6_44","volume-title":"Fast Software Encryption","author":"H. Dobbertin","year":"1996","unstructured":"Dobbertin, H., Bosselaers, A., Preneel, B.: RIPEMD-160: A Strengthened Version of RIPEMD. In: Gollmann, D. (ed.) FSE 1996. LNCS, vol.\u00a01039, pp. 71\u201382. Springer, Heidelberg (1996)"},{"key":"17_CR5","unstructured":"International Organization for Standardization: ISO\/IEC 10118-3:2004, Information technology \u2013 Security techniques \u2013 Hash-functions \u2013 Part 3: Dedicated hash-functions (2004)"},{"key":"17_CR6","unstructured":"Cryptography Research and Evaluation Committees (CRYPTREC): e-Government recommended ciphers list (2003), \n                    \n                      http:\/\/www.cryptrec.go.jp\/english\/images\/cryptrec_01en.pdf"},{"key":"17_CR7","unstructured":"Freier, A., Karlton, P., Kocher, P.: The Secure Sockets Layer (SSL) Protocol Version 3.0. Internet Engineering Task Force (IETF), RFC 6101 (2001), \n                    \n                      http:\/\/www.ietf.org\/rfc\/rfc6101.txt"},{"key":"17_CR8","unstructured":"Project, T.O. (crypto - OpenSSL cryptographic library), \n                    \n                      http:\/\/www.openssl.org\/docs\/crypto\/ripemd.html"},{"key":"17_CR9","unstructured":"The Legion of the Bouncy Castle (Bouncy Castle Crypto APIs), \n                    \n                      http:\/\/www.bouncycastle.org\/"},{"key":"17_CR10","unstructured":"Technische Universit\u00e4t Darmstadt (FlexiProvider), \n                    \n                      http:\/\/www.flexiprovider.de\/"},{"key":"17_CR11","unstructured":"The GNU Crypto project: (GNU Crypto), \n                    \n                      http:\/\/www.gnu.org\/software\/gnu-crypto\/"},{"key":"17_CR12","unstructured":"Crypto++: (Crypto++ Library 5.6.1 API Reference), \n                    \n                      http:\/\/www.cryptopp.com\/"},{"key":"17_CR13","doi-asserted-by":"crossref","unstructured":"Kap, J.: Test Cases for HMAC-RIPEMD160 and HMAC-RIPEMD128. Internet Engineering Task Force (IETF), RFC 2286 (1998), \n                    \n                      http:\/\/www.ietf.org\/rfc\/rfc2286.txt","DOI":"10.17487\/rfc2286"},{"key":"17_CR14","doi-asserted-by":"crossref","unstructured":"Keromyti, A., Provos, N.: The Use of HMAC-RIPEMD-160-96 within ESP and AH. Internet Engineering Task Force (IETF), RFC 2857 (2001), \n                    \n                      http:\/\/www.ietf.org\/rfc\/rfc2857.txt","DOI":"10.17487\/rfc2857"},{"key":"17_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"56","DOI":"10.1007\/978-3-642-17373-8_4","volume-title":"Advances in Cryptology - ASIACRYPT 2010","author":"J. Guo","year":"2010","unstructured":"Guo, J., Ling, S., Rechberger, C., Wang, H.: Advanced Meet-in-the-Middle Preimage Attacks: First Results on Full Tiger, and Improved Results on MD4 and SHA-2. In: Abe, M. (ed.) ASIACRYPT 2010. LNCS, vol.\u00a06477, pp. 56\u201375. Springer, Heidelberg (2010)"},{"key":"17_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"134","DOI":"10.1007\/978-3-642-01001-9_8","volume-title":"Advances in Cryptology - EUROCRYPT 2009","author":"Y. Sasaki","year":"2009","unstructured":"Sasaki, Y., Aoki, K.: Finding Preimages in Full MD5 Faster Than Exhaustive Search. In: Joux, A. (ed.) EUROCRYPT 2009. LNCS, vol.\u00a05479, pp. 134\u2013152. Springer, Heidelberg (2009)"},{"key":"17_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"214","DOI":"10.1007\/978-3-642-02620-1_15","volume-title":"Information Security and Privacy","author":"Y. Sasaki","year":"2009","unstructured":"Sasaki, Y., Aoki, K.: Meet-in-the-Middle Preimage Attacks on Double-Branch Hash Functions: Application to RIPEMD and Others. In: Boyd, C., Gonz\u00e1lez Nieto, J. (eds.) ACISP 2009. LNCS, vol.\u00a05594, pp. 214\u2013231. Springer, Heidelberg (2009)"},{"key":"17_CR18","unstructured":"Chang, D., Hong, S., Kang, C., Kang, J., Kim, J., Lee, C., Lee, J., Lee, J., Lee, S., Lee, Y., Lim, J., Sung, J. (ARIRANG), Available at NIST home page: \n                    \n                      http:\/\/csrc.nist.gov\/groups\/ST\/hash\/sha-3\/Round1\/submissions_rnd1.html"},{"key":"17_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"40","DOI":"10.1007\/978-3-642-27890-7_4","volume-title":"Information Security Applications","author":"C. Ohtahara","year":"2012","unstructured":"Ohtahara, C., Okada, K., Sasaki, Y., Shimoyama, T.: Preimage Attacks on Full-ARIRANG: Analysis of DM-Mode with Middle Feed-Forward. In: Jung, S., Yung, M. (eds.) WISA 2011. LNCS, vol.\u00a07115, pp. 40\u201354. Springer, Heidelberg (2012)"},{"key":"17_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"101","DOI":"10.1007\/11836810_8","volume-title":"Information Security","author":"F. Mendel","year":"2006","unstructured":"Mendel, F., Pramstaller, N., Rechberger, C., Rijmen, V.: On the Collision Resistance of RIPEMD-160. In: Katsikas, S.K., L\u00f3pez, J., Backes, M., Gritzalis, S., Preneel, B. (eds.) ISC 2006. LNCS, vol.\u00a04176, pp. 101\u2013116. Springer, Heidelberg (2006)"},{"key":"17_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"169","DOI":"10.1007\/978-3-642-21518-6_13","volume-title":"Information Security and Cryptology","author":"C. Ohtahara","year":"2011","unstructured":"Ohtahara, C., Sasaki, Y., Shimoyama, T.: Preimage Attacks on Step-Reduced RIPEMD-128 and RIPEMD-160. In: Lai, X., Yung, M., Lin, D. (eds.) Inscrypt 2010. LNCS, vol.\u00a06584, pp. 169\u2013186. Springer, Heidelberg (2011)"},{"key":"17_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"197","DOI":"10.1007\/978-3-642-19074-2_14","volume-title":"Topics in Cryptology \u2013 CT-RSA 2011","author":"L. Wang","year":"2011","unstructured":"Wang, L., Sasaki, Y., Komatsubara, W., Ohta, K., Sakiyama, K. (Second) Preimage Attacks on Step-Reduced RIPEMD\/RIPEMD-128 with a New Local-Collision Approach. In: Kiayias, A. (ed.) CT-RSA 2011. LNCS, vol.\u00a06558, pp. 197\u2013212. Springer, Heidelberg (2011)"},{"key":"17_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"156","DOI":"10.1007\/3-540-48519-8_12","volume-title":"Fast Software Encryption","author":"D. Wagner","year":"1999","unstructured":"Wagner, D.: The Boomerang Attack. In: Knudsen, L.R. (ed.) FSE 1999. LNCS, vol.\u00a01636, pp. 156\u2013170. Springer, Heidelberg (1999)"},{"key":"17_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"542","DOI":"10.1007\/978-3-642-10366-7_32","volume-title":"Advances in Cryptology \u2013 ASIACRYPT 2009","author":"J.-P. Aumasson","year":"2009","unstructured":"Aumasson, J.-P., \u00c7al\u0131k, \u00c7., Meier, W., \u00d6zen, O., Phan, R.C.-W., Var\u0131c\u0131, K.: Improved Cryptanalysis of Skein. In: Matsui, M. (ed.) ASIACRYPT 2009. LNCS, vol.\u00a05912, pp. 542\u2013559. Springer, Heidelberg (2009)"},{"key":"17_CR25","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"218","DOI":"10.1007\/978-3-642-21702-9_13","volume-title":"Fast Software Encryption","author":"A. Biryukov","year":"2011","unstructured":"Biryukov, A., Nikoli\u0107, I., Roy, A.: Boomerang Attacks on BLAKE-32. In: Joux, A. (ed.) FSE 2011. LNCS, vol.\u00a06733, pp. 218\u2013237. Springer, Heidelberg (2011)"},{"key":"17_CR26","unstructured":"Lamberger, M., Mendel, F.: Higher-order differential attack on reduced SHA-256. Cryptology ePrint Archive, Report 2011\/037 (2011), \n                    \n                      http:\/\/eprint.iacr.org\/2011\/037"},{"key":"17_CR27","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-642-28496-0_1","volume-title":"Selected Areas in Cryptography","author":"Y. Sasaki","year":"2012","unstructured":"Sasaki, Y.: Boomerang Distinguishers on MD4-Family: First Practical Results on Full 5-Pass HAVAL. In: Miri, A., Vaudenay, S. (eds.) SAC 2011. LNCS, vol.\u00a07118, pp. 1\u201318. Springer, Heidelberg (2012)"},{"key":"17_CR28","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"288","DOI":"10.1007\/3-540-45708-9_19","volume-title":"Advances in Cryptology - CRYPTO 2002","author":"D. Wagner","year":"2002","unstructured":"Wagner, D.: A Generalized Birthday Problem. In: Yung, M. (ed.) CRYPTO 2002. LNCS, vol.\u00a02442, pp. 288\u2013303. Springer, Heidelberg (2002)"},{"key":"17_CR29","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"270","DOI":"10.1007\/978-3-642-25385-0_15","volume-title":"ASIACRYPT 2011","author":"A. Biryukov","year":"2011","unstructured":"Biryukov, A., Lamberger, M., Mendel, F., Nikoli\u0107, I.: Second-Order Differential Collisions for Reduced SHA-256. In: Lee, D.H. (ed.) ASIACRYPT 2011. LNCS, vol.\u00a07073, pp. 270\u2013287. Springer, Heidelberg (2011)"},{"key":"17_CR30","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"260","DOI":"10.1007\/978-3-642-03317-9_16","volume-title":"Fast Software Encryption","author":"F. Mendel","year":"2009","unstructured":"Mendel, F., Rechberger, C., Schl\u00e4ffer, M., Thomsen, S.S.: The Rebound Attack: Cryptanalysis of Reduced Whirlpool and Gr\u00f8stl. In: Dunkelman, O. (ed.) FSE 2009. LNCS, vol.\u00a05665, pp. 260\u2013276. Springer, Heidelberg (2009)"},{"key":"17_CR31","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"231","DOI":"10.1007\/978-3-642-03356-8_14","volume-title":"Advances in Cryptology - CRYPTO 2009","author":"A. Biryukov","year":"2009","unstructured":"Biryukov, A., Khovratovich, D., Nikoli\u0107, I.: Distinguisher and Related-Key Attack on the Full AES-256. In: Halevi, S. (ed.) CRYPTO 2009. LNCS, vol.\u00a05677, pp. 231\u2013249. Springer, Heidelberg (2009)"},{"key":"17_CR32","unstructured":"RIPE Integrity Primitives Berlin, Heidelberg, New York: Integrity Primitives for Secure Information Systems, Final RIPE Report of RACE Integrity Primitives Evaluation, RIPE-RACE 1040 (1995)"}],"container-title":["Lecture Notes in Computer Science","Applied Cryptography and Network Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-31284-7_17","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,19]],"date-time":"2019-05-19T20:43:33Z","timestamp":1558298613000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-31284-7_17"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642312830","9783642312847"],"references-count":32,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-31284-7_17","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2012]]}}}