{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T16:04:51Z","timestamp":1725465891273},"publisher-location":"Berlin, Heidelberg","reference-count":11,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540601760"},{"type":"electronic","value":"9783540447177"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1995]]},"DOI":"10.1007\/bfb0053455","type":"book-chapter","created":{"date-parts":[[2006,6,7]],"date-time":"2006-06-07T00:05:50Z","timestamp":1149638750000},"page":"410-418","source":"Crossref","is-referenced-by-count":8,"title":["New attacks on all double block length hash functions of hash rate 1, including the Parallel-DM"],"prefix":"10.1007","author":[{"given":"Lars R.","family":"Knudsen","sequence":"first","affiliation":[]},{"given":"Xuejia","family":"Lai","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2006,5,23]]},"reference":[{"key":"37_CR1","doi-asserted-by":"crossref","unstructured":"L. Brown, J. Pieprzyk and J. Seberry, \u201cLOKI \u2014 A Cryptographic Primitive for Authentication and Secrecy Applications\u201d, Advances in Cryptology \u2014 AUSCRYPT'90, Proceedings, LNCS 453, pp. 229\u2013236, Springer-Verlag, 1990.","DOI":"10.1007\/BFb0030364"},{"key":"37_CR2","doi-asserted-by":"crossref","unstructured":"I. B. Damgaard, \u201cA Design Principle for Hash Functions\u201d, Advances in Cryptology \u2014 CRYPTO'89, LNCS 435, pp. 416\u2013427, Springer-Verlag, 1990.","DOI":"10.1007\/0-387-34805-0_39"},{"key":"37_CR3","doi-asserted-by":"crossref","unstructured":"W. Hohl, X. Lai, T. Meier and C. Waldvogel, \u201cSecurity of Iterated Hash Function Based on Block Ciphers\u201d, Advances in Cryptology \u2014 CRYPTO'93 Proceedings, pp. 379\u2013390, LNCS 773, Springer Verlag, 1994.","DOI":"10.1007\/3-540-48329-2_32"},{"key":"37_CR4","unstructured":"ISO\/IEC 10118, Information technology \u2014 Security techniques \u2014 Hash-functions, Part 2:Hash-functions using an n-bit block cipher, I.S.O., 1994."},{"key":"37_CR5","volume-title":"ETH Series in Information Processing","author":"X. Lai","year":"1992","unstructured":"X. Lai, On the Design and Security of Block Ciphers, ETH Series in Information Processing (Edt: J. L. Massey), Vol. 1, Hartung-Gorre Verlag, Konstanz, 1992."},{"key":"37_CR6","doi-asserted-by":"crossref","unstructured":"X. Lai and L. Knudsen \u201cAttacks on Double Block Length Hash Functions\u201d To appear in the proceedings from The Algortihm Workshop, Cambridge, U.K., Dec. 1993.","DOI":"10.1007\/3-540-58108-1_19"},{"key":"37_CR7","doi-asserted-by":"crossref","unstructured":"X. Lai and J.L. Massey, \u201cHash Functions Based on Block Ciphers\u201d, Advances in Cryptology \u2014 EUROCRYPT'92 Proceedings, pp. 55\u201370, LNCS 658, Springer Verlag, 1993.","DOI":"10.1007\/3-540-47555-9_5"},{"key":"37_CR8","unstructured":"C. H. Meyer and M. Schilling, \u201cSecure Program Code with Modification Detection Code\u201d, Proceedings of SECURICOM 88, pp. 111\u2013130, SEDEP.8, Rue de la Michodies, 75002, Paris, France."},{"key":"37_CR9","doi-asserted-by":"crossref","unstructured":"B. Preneel, A. Bosselaers, R. Govaerts and J. Vandewalle, \u201cCollisionfree Hashfunctions Based on Blockcipher Algorithms\u201d, Proceedings of 1989 International Carnahan Conference on Security Technology, pp. 203\u2013210, 1989.","DOI":"10.1109\/CCST.1989.751980"},{"key":"37_CR10","volume-title":"Ph.D thesis","author":"B. Preneel","year":"1993","unstructured":"B. Preneel, Analysis and Design of Cryptographic Hash Hashfunctions, Ph.D thesis, Katholieke Universiteit Leuven, Belgium, January 1993."},{"key":"37_CR11","doi-asserted-by":"crossref","unstructured":"B. Preneel, \u201dHash functions based on block ciphers: A synthetic approach\u201d, Advances in Cryptology \u2014 Proceedings of Crypto'93, pp. 368\u2013378, LNCS 773, Springer Verlag, 1994.","DOI":"10.1007\/3-540-48329-2_31"}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2014 EUROCRYPT'94"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/BFb0053455","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,4,19]],"date-time":"2019-04-19T02:22:01Z","timestamp":1555640521000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/BFb0053455"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1995]]},"ISBN":["9783540601760","9783540447177"],"references-count":11,"URL":"https:\/\/doi.org\/10.1007\/bfb0053455","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[1995]]}}}