{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T09:42:58Z","timestamp":1725702178964},"publisher-location":"Berlin, Heidelberg","reference-count":18,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642341342"},{"type":"electronic","value":"9783642341359"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-34135-9_21","type":"book-chapter","created":{"date-parts":[[2012,9,10]],"date-time":"2012-09-10T12:08:15Z","timestamp":1347278895000},"page":"205-214","source":"Crossref","is-referenced-by-count":0,"title":["Crypto-Precision: Testing Tool for Hash Function"],"prefix":"10.1007","author":[{"given":"Harshvardhan","family":"Tiwari","sequence":"first","affiliation":[]},{"given":"Ankit","family":"Luthra","sequence":"additional","affiliation":[]},{"given":"Himanshu","family":"Goel","sequence":"additional","affiliation":[]},{"given":"Sambhav","family":"Sharma","sequence":"additional","affiliation":[]},{"given":"Krishna","family":"Asawa","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"21_CR1","unstructured":"Hong, D., Chang, D., Sung, J., Lee, S., Hong, S., Lee, J., Moon, D., Chee, S.: New FORK-256. IACR Cryptology ePrint Archive (2007)"},{"key":"21_CR2","doi-asserted-by":"crossref","unstructured":"Chatterjee, R., Saifee, M.A., Chowdhury, D.R.: Modifications of SHA-0 to Prevent Attacks. IIT Kharagpur (2005)","DOI":"10.1007\/11593980_21"},{"issue":"2","key":"21_CR3","doi-asserted-by":"publisher","first-page":"271","DOI":"10.1007\/s00145-010-9095-5","volume":"25","author":"S. Hirose","year":"2012","unstructured":"Hirose, S., Park, J.H., Yun, A.: A Simple Variant of the Merkle\u2013Damg\u00e5rd Scheme with a Permutation. J. Cryptology\u00a025(2), 271\u2013309 (2012)","journal-title":"J. Cryptology"},{"key":"21_CR4","unstructured":"Biham, E., Dunkelman, O.: A Framework for Iterative Hash Functions \u2014 HAIFA. IACR"},{"key":"21_CR5","unstructured":"Cryptology ePrint Archive 2007: 278 (2007)"},{"key":"21_CR6","unstructured":"Rivest, R.L.: Abelian square-free dithering for iterated hash functions, \n                    \n                      http:\/\/theory.lcs.mit.edu\/rivest\/RivestAbelianSquareFreeDitheringForIteratedHashFunctions.pdf\n                    \n                    \n                   (accessed)"},{"key":"21_CR7","doi-asserted-by":"crossref","first-page":"179","DOI":"10.1142\/S0219622004000982","volume":"3","author":"S. Piechowiak","year":"2003","unstructured":"Piechowiak, S., Kolski, C.: Towards a Generic Object Oriented Decision Support System for University Timetabling: An Interactive Approach. International Journal of Information Technology and Decision Making\u00a03, 179\u2013208 (2003)","journal-title":"International Journal of Information Technology and Decision Making"},{"key":"21_CR8","unstructured":"Hu, M., Wang, Y.: The Collision Rate Tests of Two Known Message Digest Algorithms"},{"key":"21_CR9","unstructured":"Kaur, G., Nayak, V.S.: Analysis of the Hash Function \u2013 Modified Gr\u00f8stl"},{"key":"21_CR10","unstructured":"OpenSSL, \n                    \n                      http:\/\/www.openssl.org\/"},{"key":"21_CR11","unstructured":"Crypto++, \n                    \n                      http:\/\/www.cryptopp.com\/\/"},{"key":"21_CR12","unstructured":"Specifications of Cryptographic Algorithm Implementation Testing - Hash Functions: Information-Technology Promotion Agency, Japan (2009)"},{"key":"21_CR13","unstructured":"Pattinson, F.: Assurance in Implementation Correctness of Cryptographic Algorithms Gained Through the NIST Cryptographic Algorithm Validation Program"},{"key":"21_CR14","unstructured":"Filho, B., Viana, W., Andrade, R., Monteiro, A.J.: PEARL: a PErformance evaluAtor of cRyptographic aLgorithms for mobile devices"},{"key":"21_CR15","unstructured":"Lamprecht, C., van Moorsel, A., Tomlinson, P., Thomas, N.: Investigating the efficiency of Cryptographic Algorithms in online transactions"},{"key":"21_CR16","unstructured":"SlavaSoft HashCalc, \n                    \n                      http:\/\/www.slavasoft.com\/hashcalc\/index.html"},{"key":"21_CR17","unstructured":"HashTab: \n                    \n                      http:\/\/implbits.com\/HashTab\/HashTabWindows.aspx"},{"key":"21_CR18","unstructured":"JavaTM\u00a0Cryptography Extension (JCE), \n                    \n                      http:\/\/docs.oracle.com\/javase\/1.4.2\/docs\/guide\/security\/jce\/JCERefGuide.html"}],"container-title":["Communications in Computer and Information Science","Recent Trends in Computer Networks and Distributed Systems Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-34135-9_21.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,4]],"date-time":"2021-05-04T12:45:46Z","timestamp":1620132346000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-34135-9_21"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642341342","9783642341359"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-34135-9_21","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2012]]}}}