{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T12:51:46Z","timestamp":1725454306374},"publisher-location":"Berlin, Heidelberg","reference-count":6,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540593393"},{"type":"electronic","value":"9783540492368"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1995]]},"DOI":"10.1007\/bfb0000443","type":"book-chapter","created":{"date-parts":[[2005,10,7]],"date-time":"2005-10-07T15:27:29Z","timestamp":1128698849000},"page":"305-321","source":"Crossref","is-referenced-by-count":4,"title":["Collisions and inversions for Damg\u00e5rd's whole hash function"],"prefix":"10.1007","author":[{"given":"Jacques","family":"Patarin","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2005,9,8]]},"reference":[{"key":"24_CR1","doi-asserted-by":"crossref","unstructured":"P. Camion and J. Patarin, \u201cThe Knapsack Hash Function proposed at Crypto'89 can be broken\u201d, Proceedings of Eurocrypt'91, pp. 39\u201353, Springer Verlag.","DOI":"10.1007\/3-540-46416-6_3"},{"key":"24_CR2","doi-asserted-by":"crossref","unstructured":"I. Damg\u00e5rd, \u201cA Design Principles for Hash Functions\u201d, Proceedings of Crypto'89, pp. 416\u2013427, Springer Verlag.","DOI":"10.1007\/0-387-34805-0_39"},{"key":"24_CR3","unstructured":"A. Joux and L. Granboulan, \u201cA practical attack against Knapsack based Hash Functions\u201d, Proceedings of Eurocrypt'94."},{"key":"24_CR4","doi-asserted-by":"crossref","unstructured":"J. Patarin, \u201cHow to find and avoid collisions for the Knapsack Hash Function\u201d, Proceedings of Eurocrypt'93, pp. 305\u2013317.","DOI":"10.1007\/3-540-48285-7_27"},{"key":"24_CR5","unstructured":"B. Preneel, \u201cAnalysis and Design of Cryptographic Hash Functions\u201d, Katolieke Universiteit Leuven."},{"key":"24_CR6","unstructured":"C.P. Schnorr, unpublished communication, 1991."}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2014 ASIACRYPT'94"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/BFb0000443","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,4,10]],"date-time":"2020-04-10T06:17:28Z","timestamp":1586499448000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/BFb0000443"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1995]]},"ISBN":["9783540593393","9783540492368"],"references-count":6,"URL":"https:\/\/doi.org\/10.1007\/bfb0000443","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[1995]]}}}