{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,15]],"date-time":"2024-09-15T14:28:10Z","timestamp":1726410490104},"publisher-location":"Berlin, Heidelberg","reference-count":43,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642349300"},{"type":"electronic","value":"9783642349317"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-34931-7_20","type":"book-chapter","created":{"date-parts":[[2012,12,5]],"date-time":"2012-12-05T17:24:04Z","timestamp":1354728244000},"page":"339-357","source":"Crossref","is-referenced-by-count":3,"title":["Embedded Syndrome-Based Hashing"],"prefix":"10.1007","author":[{"given":"Ingo","family":"von Maurich","sequence":"first","affiliation":[]},{"given":"Tim","family":"G\u00fcneysu","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"unstructured":"ECRYPT Benchmarking of Lightweight Hash Functions in Atmel AVR devices (2012), \n                    \n                      http:\/\/perso.uclouvain.be\/fstandae\/source_codes\/hash_atmel\/\n                    \n                    \n                   (accessed July 21, 2012)","key":"20_CR1"},{"unstructured":"Augot, D., Finiasz, M., Gaborit, P., Manuel, S., Sendrier, N.: SHA-3 proposal: FSB (2008), \n                    \n                      http:\/\/www.rocq.inria.fr\/secret\/CBCrypto\/fsbdoc.pdf","key":"20_CR2"},{"unstructured":"Augot, D., Finiasz, M., Sendrier, N.: A Fast Provably Secure Cryptographic Hash Function. Cryptology ePrint Archive, Report 2003\/230 (2003), \n                    \n                      http:\/\/eprint.iacr.org\/","key":"20_CR3"},{"key":"20_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"64","DOI":"10.1007\/11554868_6","volume-title":"Progress in Cryptology \u2013 Mycrypt 2005","author":"D. Augot","year":"2005","unstructured":"Augot, D., Finiasz, M., Sendrier, N.: A Family of Fast Syndrome Based Cryptographic Hash Functions. In: Dawson, E., Vaudenay, S. (eds.) Mycrypt 2005. LNCS, vol.\u00a03715, pp. 64\u201383. Springer, Heidelberg (2005)"},{"key":"20_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"336","DOI":"10.1007\/978-3-642-21518-6_23","volume-title":"Information Security and Cryptology","author":"P.S.L.M. Barreto","year":"2011","unstructured":"Barreto, P.S.L.M., Cayrel, P.-L., Misoczki, R., Niebuhr, R.: Quasi-Dyadic CFS Signatures. In: Lai, X., Yung, M., Lin, D. (eds.) Inscrypt 2010. LNCS, vol.\u00a06584, pp. 336\u2013349. Springer, Heidelberg (2011)"},{"issue":"2","key":"20_CR6","doi-asserted-by":"publisher","first-page":"198","DOI":"10.1016\/j.jss.2010.09.016","volume":"84","author":"P. Barreto","year":"2011","unstructured":"Barreto, P., Misoczki, R., Simplicio Jr., M.: One-time signature scheme from syndrome decoding over generic error-correcting codes. Journal of Systems and Software\u00a084(2), 198\u2013204 (2011)","journal-title":"Journal of Systems and Software"},{"unstructured":"Bernstein, D., Lange, T.: eBACS: ECRYPT Benchmarking of Cryptographic Systems (2012), \n                    \n                      http:\/\/bench.cr.yp.to\n                    \n                    \n                   (accessed July 21, 2012)","key":"20_CR7"},{"unstructured":"Bernstein, D., Lange, T.: eBASH: ECRYPT Benchmarking of All Submitted Hashes (2012), \n                    \n                      http:\/\/bench.cr.yp.to\/results-hash.html\n                    \n                    \n                   (accessed July 21, 2012)","key":"20_CR8"},{"key":"20_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"134","DOI":"10.1007\/978-3-642-21969-6_9","volume-title":"Progress in Cryptology \u2013 AFRICACRYPT 2011","author":"D.J. Bernstein","year":"2011","unstructured":"Bernstein, D.J., Lange, T., Peters, C., Schwabe, P.: Really Fast Syndrome-Based Hashing. In: Nitaj, A., Pointcheval, D. (eds.) AFRICACRYPT 2011. LNCS, vol.\u00a06737, pp. 134\u2013152. Springer, Heidelberg (2011)"},{"unstructured":"Beuchat, J., Sendrier, N., Tisserand, A., Villard, G.: FPGA Implementation of a Recently Published Signature Scheme. Rapport de recherche RR LIP 2004-14 (2004)","key":"20_CR10"},{"key":"20_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1007\/978-3-540-88403-3_4","volume-title":"Post-Quantum Cryptography","author":"B. Biswas","year":"2008","unstructured":"Biswas, B., Sendrier, N.: McEliece Cryptosystem Implementation: Theory and Practice. In: Buchmann, J., Ding, J. (eds.) PQCrypto 2008. LNCS, vol.\u00a05299, pp. 47\u201362. Springer, Heidelberg (2008)"},{"key":"20_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"138","DOI":"10.1007\/978-3-642-30057-8_9","volume-title":"Public Key Cryptography \u2013 PKC 2012","author":"P.-L. Cayrel","year":"2012","unstructured":"Cayrel, P.-L., Hoffmann, G., Persichetti, E.: Efficient Implementation of a CCA2-Secure Variant of McEliece Using Generalized Srivastava Codes. In: Fischlin, M., Buchmann, J., Manulis, M. (eds.) PKC 2012. LNCS, vol.\u00a07293, pp. 138\u2013155. Springer, Heidelberg (2012)"},{"unstructured":"Coron, J.-S., Joux, A.: Cryptanalysis of a Provably Secure Cryptographic Hash Function. Cryptology ePrint Archive, Report 2004\/013 (2004), \n                    \n                      http:\/\/eprint.iacr.org\/","key":"20_CR13"},{"key":"20_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"157","DOI":"10.1007\/3-540-45682-1_10","volume-title":"Advances in Cryptology - ASIACRYPT 2001","author":"N.T. Courtois","year":"2001","unstructured":"Courtois, N.T., Finiasz, M., Sendrier, N.: How to Achieve a McEliece-Based Digital Signature Scheme. In: Boyd, C. (ed.) ASIACRYPT 2001. LNCS, vol.\u00a02248, pp. 157\u2013174. Springer, Heidelberg (2001)"},{"key":"20_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"416","DOI":"10.1007\/0-387-34805-0_39","volume-title":"Advances in Cryptology - CRYPTO \u201989","author":"I.B. Damg\u00e5rd","year":"1990","unstructured":"Damg\u00e5rd, I.B.: A Design Principle for Hash Functions. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol.\u00a0435, pp. 416\u2013427. Springer, Heidelberg (1990)"},{"key":"20_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"49","DOI":"10.1007\/978-3-642-04138-9_4","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2009","author":"T. Eisenbarth","year":"2009","unstructured":"Eisenbarth, T., G\u00fcneysu, T., Heyse, S., Paar, C.: MicroEliece: McEliece for Embedded Devices. In: Clavier, C., Gaj, K. (eds.) CHES 2009. LNCS, vol.\u00a05747, pp. 49\u201364. Springer, Heidelberg (2009)"},{"key":"20_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"159","DOI":"10.1007\/978-3-642-19574-7_11","volume-title":"Selected Areas in Cryptography","author":"M. Finiasz","year":"2011","unstructured":"Finiasz, M.: Parallel-CFS: Strengthening the CFS McEliece-Based Signature Scheme. In: Biryukov, A., Gong, G., Stinson, D.R. (eds.) SAC 2010. LNCS, vol.\u00a06544, pp. 159\u2013170. Springer, Heidelberg (2011)"},{"unstructured":"Finiasz, M., Gaborit, P., Sendrier, N.: Improved fast syndrome based cryptographic hash functions. In: Proceedings of ECRYPT Hash Workshop, vol.\u00a02007, p. 155 (2007)","key":"20_CR18"},{"key":"20_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1007\/978-3-540-79263-5_2","volume-title":"Topics in Cryptology \u2013 CT-RSA 2008","author":"P.-A. Fouque","year":"2008","unstructured":"Fouque, P.-A., Leurent, G.: Cryptanalysis of a Hash Function Based on Quasi-cyclic Codes. In: Malkin, T. (ed.) CT-RSA 2008. LNCS, vol.\u00a04964, pp. 19\u201335. Springer, Heidelberg (2008)"},{"doi-asserted-by":"crossref","unstructured":"Gaborit, P., Lauradoux, C., Sendrier, N.: SYND: a Fast Code-Based Stream Cipher with a Security Reduction. In: IEEE International Symposium on Information Theory, ISIT 2007, pp. 186\u2013190 (2007)","key":"20_CR20","DOI":"10.1109\/ISIT.2007.4557224"},{"unstructured":"Gaj, K., Homsirikamol, E., Rogawski, M., Shahid, R., Sharif, M.U.: Comprehensive Evaluation of High-Speed and Medium-Speed Implementations of Five SHA-3 Finalists Using Xilinx and Altera FPGAs. Cryptology ePrint Archive, Report 2012\/368 (2012), \n                    \n                      http:\/\/eprint.iacr.org\/","key":"20_CR21"},{"unstructured":"Gyrfi, T., Cre, O., Hanrot, G., Brisebarre, N.: High-Throughput Hardware Architecture for the SWIFFT \/ SWIFFTX Hash Functions. Cryptology ePrint Archive, Report 2012\/343 (2012), \n                    \n                      http:\/\/eprint.iacr.org\/","key":"20_CR22"},{"unstructured":"Helion: Fast Hash Core Family for Xilinx FPGA (2011), \n                    \n                      http:\/\/heliontech.com\/fast_hash.htm\n                    \n                    \n                   (accessed July 21, 2012)","key":"20_CR23"},{"unstructured":"Heyse, S.: Code-based cryptography: Implementing the McEliece scheme in reconfigurable hardware. Diploma thesis (2009)","key":"20_CR24"},{"key":"20_CR25","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"165","DOI":"10.1007\/978-3-642-12929-2_13","volume-title":"Post-Quantum Cryptography","author":"S. Heyse","year":"2010","unstructured":"Heyse, S.: Low-Reiter: Niederreiter Encryption Scheme for Embedded Microcontrollers. In: Sendrier, N. (ed.) PQCrypto 2010. LNCS, vol.\u00a06061, pp. 165\u2013181. Springer, Heidelberg (2010)"},{"key":"20_CR26","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"143","DOI":"10.1007\/978-3-642-25405-5_10","volume-title":"Post-Quantum Cryptography","author":"S. Heyse","year":"2011","unstructured":"Heyse, S.: Implementation of McEliece Based on Quasi-dyadic Goppa Codes for Embedded Devices. In: Yang, B.-Y. (ed.) PQCrypto 2011. LNCS, vol.\u00a07071, pp. 143\u2013162. Springer, Heidelberg (2011)"},{"key":"20_CR27","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"340","DOI":"10.1007\/978-3-642-33027-8_20","volume-title":"Cryptographic Hardware and Embedded Systems \u2013 CHES 2012","author":"S. Heyse","year":"2012","unstructured":"Heyse, S., G\u00fcneysu, T.: Towards One Cycle per Bit Asymmetric Encryption: Code-Based Cryptography on Reconfigurable Hardware. In: Prouff, E., Schaumont, P. (eds.) CHES 2012. LNCS, vol.\u00a07428, pp. 340\u2013355. Springer, Heidelberg (2012)"},{"unstructured":"Kirchner, P.: Improved Generalized Birthday Attack. Cryptology ePrint Archive, Report 2011\/377 (2011), \n                    \n                      http:\/\/eprint.iacr.org\/","key":"20_CR28"},{"doi-asserted-by":"crossref","unstructured":"Landais, G., Sendrier, N.: CFS Software Implementation. Cryptology ePrint Archive, Report 2012\/132 (2012), \n                    \n                      http:\/\/eprint.iacr.org\/","key":"20_CR29","DOI":"10.1007\/978-3-642-34931-7_27"},{"unstructured":"Manuel, S.: Classification and Generation of Disturbance Vectors for Collision Attacks against SHA-1. Cryptology ePrint Archive, Report 2008\/469 (2008), \n                    \n                      http:\/\/eprint.iacr.org\/","key":"20_CR30"},{"issue":"44","key":"20_CR31","first-page":"114","volume":"42","author":"R. McEliece","year":"1978","unstructured":"McEliece, R.: A public-key cryptosystem based on algebraic coding theory. DSN progress report\u00a042(44), 114\u2013116 (1978)","journal-title":"DSN progress report"},{"key":"20_CR32","series-title":"CCIS","doi-asserted-by":"publisher","first-page":"111","DOI":"10.1007\/978-3-642-23141-4_11","volume-title":"Information Security and Assurance","author":"M. Meziani","year":"2011","unstructured":"Meziani, M., Cayrel, P.-L., El Yousfi Alaoui, S.M.: 2SC: An Efficient Code-Based Stream Cipher. In: Kim, T.-H., Adeli, H., Robles, R.J., Balitanas, M. (eds.) ISA 2011. CCIS, vol.\u00a0200, pp. 111\u2013122. Springer, Heidelberg (2011)"},{"key":"20_CR33","series-title":"CCIS","doi-asserted-by":"publisher","first-page":"132","DOI":"10.1007\/978-3-642-23141-4_13","volume-title":"Information Security and Assurance","author":"M. Meziani","year":"2011","unstructured":"Meziani, M., Dagdelen, \u00d6., Cayrel, P.-L., El Yousfi Alaoui, S.M.: S-FSB: An Improved Variant of the FSB Hash Family. In: Kim, T.-H., Adeli, H., Robles, R.J., Balitanas, M. (eds.) ISA 2011. CCIS, vol.\u00a0200, pp. 132\u2013145. Springer, Heidelberg (2011)"},{"unstructured":"Ness, J.: Microsoft certification authority signing certificates added to the Untrusted Certificate Store. Microsoft Security Research and Defense (2012), \n                    \n                      http:\/\/blogs.technet.com\/b\/srd\/archive\/2012\/06\/03\/microsoft-certification-authority-signing-certificates-added-to-the-untrusted-certificate-store.aspx\n                    \n                    \n                   (accessed July 21, 2012)","key":"20_CR34"},{"key":"20_CR35","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1007\/3-540-39805-8_4","volume-title":"Advances in Cryptology - EUROCRYPT \u201985","author":"H. Niederreiter","year":"1986","unstructured":"Niederreiter, H.: A Public-Key Cryptosystem Based on Shift Register Sequences. In: Pichler, F. (ed.) EUROCRYPT 1985. LNCS, vol.\u00a0219, pp. 35\u201339. Springer, Heidelberg (1986)"},{"unstructured":"NIST. Announcing Request for Candidate Algorithm Nominations for a New Cryptographic Hash Algorithm (SHA3) Family (2007), \n                    \n                      http:\/\/csrc.nist.gov\/groups\/ST\/hash\/documents\/FR_Notice_Nov07.pdf\n                    \n                    \n                   (accessed July 21, 2012)","key":"20_CR36"},{"unstructured":"U. D. of Commerce. Secure Hash Standard (SHS). Technical report, National Institute of Standards and Technology (2008)","key":"20_CR37"},{"doi-asserted-by":"crossref","unstructured":"Rivest, R.: RFC 1321: The MD5 message-digest algorithm (April 1992)","key":"20_CR38","DOI":"10.17487\/rfc1321"},{"unstructured":"Rothamel, L., Weiel, M.: Report Cryptography Lab SS2011 Implementation of the RFSB hash function (2011), \n                    \n                      http:\/\/www.cayrel.net\/IMG\/pdf\/Report.pdf","key":"20_CR39"},{"key":"20_CR40","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-540-77026-8_1","volume-title":"Progress in Cryptology \u2013 INDOCRYPT 2007","author":"M.-J.O. Saarinen","year":"2007","unstructured":"Saarinen, M.-J.O.: Linearization Attacks Against Syndrome Based Hashes. In: Srinathan, K., Rangan, C.P., Yung, M. (eds.) INDOCRYPT 2007. LNCS, vol.\u00a04859, pp. 1\u20139. Springer, Heidelberg (2007)"},{"doi-asserted-by":"crossref","unstructured":"Shoufan, A., Wink, T., Molter, G., Huss, S., Strentzke, F.: A novel processor architecture for McEliece cryptosystem and FPGA platforms. In: 20th IEEE International Conference on Application-specific Systems, Architectures and Processors, ASAP 2009, pp. 98\u2013105. IEEE (2009)","key":"20_CR41","DOI":"10.1109\/ASAP.2009.29"},{"unstructured":"Stevens, M.: On collisions for MD5. Master\u2019s thesis, Eindhoven University of Technology, Department of Mathematics and Computing Science (June 2007)","key":"20_CR42"},{"key":"20_CR43","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-540-72540-4_1","volume-title":"Advances in Cryptology - EUROCRYPT 2007","author":"M. Stevens","year":"2007","unstructured":"Stevens, M., Lenstra, A., de Weger, B.: Chosen-Prefix Collisions for MD5 and Colliding X.509 Certificates for Different Identities. In: Naor, M. (ed.) EUROCRYPT 2007. LNCS, vol.\u00a04515, pp. 1\u201322. Springer, Heidelberg (2007)"}],"container-title":["Lecture Notes in Computer Science","Progress in Cryptology - INDOCRYPT 2012"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-34931-7_20","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,9]],"date-time":"2019-05-09T14:29:53Z","timestamp":1557412193000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-34931-7_20"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642349300","9783642349317"],"references-count":43,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-34931-7_20","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2012]]}}}