{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T09:43:01Z","timestamp":1725702181405},"publisher-location":"Berlin, Heidelberg","reference-count":6,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642341342"},{"type":"electronic","value":"9783642341359"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-34135-9_43","type":"book-chapter","created":{"date-parts":[[2012,9,10]],"date-time":"2012-09-10T12:08:15Z","timestamp":1347278895000},"page":"444-455","source":"Crossref","is-referenced-by-count":0,"title":["Implementation of MD6"],"prefix":"10.1007","author":[{"given":"Ananya","family":"Chowdhury","sequence":"first","affiliation":[]},{"given":"Utpal Kumar","family":"Ray","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"43_CR1","unstructured":"Stallings, W.: Cryptography and Network Security (Principles and Practices), 5th edn., p. 624, pp. 638\u2013640, 642\u2013644"},{"key":"43_CR2","unstructured":"Rivest, R.L., Agre, B., Bailey, D.V., Crutchfield, C., Dodis, Y., Elliott, K., Khan, F.A., Krishnamurthy, J., Lin, Y., Reyzin, L., Shen, E., Sukha, J., Sutherland, D., Tromer, E., Yin, Y.L.: The MD6 hash function: A proposal to NIST for SHA-3 (2008)"},{"key":"43_CR3","unstructured":"Christopher Yale Crutchfield, B.S.: Electrical Engineering and Computer Science (2006)"},{"key":"43_CR4","unstructured":"Heilman, E.: Restoring the Differential Resistance of MD6 (2001), \n                    \n                      http:\/\/eprint.iacr.org\/2011\/374"},{"key":"43_CR5","unstructured":"Schneier on Security, \n                    \n                      http:\/\/www.schneier.com\/blog\/archives\/2009\/07\/md6.html"},{"key":"43_CR6","unstructured":"Bellare, M., Canetti, R., Krawczyk, H.: Keying Hash Functions for Message Authentication"}],"container-title":["Communications in Computer and Information Science","Recent Trends in Computer Networks and Distributed Systems Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-34135-9_43.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,4]],"date-time":"2021-05-04T12:45:56Z","timestamp":1620132356000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-34135-9_43"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642341342","9783642341359"],"references-count":6,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-34135-9_43","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2012]]}}}