{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,10]],"date-time":"2026-03-10T13:43:53Z","timestamp":1773150233231,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":8,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540648925","type":"print"},{"value":"9783540684626","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1998]]},"DOI":"10.1007\/bfb0055720","type":"book-chapter","created":{"date-parts":[[2006,7,27]],"date-time":"2006-07-27T21:12:36Z","timestamp":1154034756000},"page":"56-71","source":"Crossref","is-referenced-by-count":143,"title":["Differential collisions in SHA-0"],"prefix":"10.1007","author":[{"given":"Florent","family":"Chabaud","sequence":"first","affiliation":[]},{"given":"Antoine","family":"Joux","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2006,5,28]]},"reference":[{"key":"5_CR1","first-page":"487","volume":"740","author":"E. Biham","year":"1993","unstructured":"E. Biham, and A. Shamir. Cryptanalysis of the Full 16-Round DES, CRYPTO'92 LNCS 740, pp 487\u2013496, 1993.","journal-title":"LNCS"},{"key":"5_CR2","first-page":"293","volume":"773","author":"B. Boer den","year":"1994","unstructured":"B. den Boer, and A. Bosselaers. Collisions for the compression function of MD5, EUROCRYPT'93 LNCS 773, pp 293\u2013304, 1994.","journal-title":"LNCS"},{"issue":"1","key":"5_CR3","doi-asserted-by":"publisher","first-page":"367","DOI":"10.1109\/18.651067","volume":"IT-44","author":"A. Canteaut","year":"1998","unstructured":"A. Canteaut, and F. Chabaud. A new algorithm for finding minimum-weight words in a linear code: Application to primitive narrow-sense BCH codes of length 511, IEEE Trans. Inform. Theory, IT-44(1), pp 367\u2013378, Jan. 1998.","journal-title":"IEEE Trans. Inform. Theory"},{"key":"5_CR4","first-page":"53","volume":"1039","author":"H. Dobbertin","year":"1996","unstructured":"H. Dobbertin. Cryptanalysis of MD4, Fast Software Encryption LNCS 1039, pp 53\u201369, 1996.","journal-title":"LNCS"},{"key":"5_CR5","first-page":"303","volume":"537","author":"R. Rivest","year":"1991","unstructured":"R. Rivest. The MD4 Message-Digest Algorithm, CRYPTO'90 LNCS 537, pp 303\u2013311, 1991.","journal-title":"LNCS"},{"key":"5_CR6","doi-asserted-by":"crossref","unstructured":"R. Rivest. The MD5 Message-Digest Algorithm, Network Working Group Request for Comments: 1321, April 1992. http:\/\/theory.lcs.mit.edu\/~rivest\/Rivest-MD5.txt","DOI":"10.17487\/rfc1321"},{"key":"5_CR7","unstructured":"Secure Hash Standard. Federal Information Processing Standard Publication # 180, U.S. Department of Commerce, National Institute of Standards and Technology, 1993."},{"key":"5_CR8","unstructured":"Secure Hash Standard. Federal Information Processing Standard Publication # 180-1, U.S. Department of Commerce, National Institute of Standards and Technology, 1995 (addendum to [7])."}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2014 CRYPTO '98"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/BFb0055720","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,4,20]],"date-time":"2019-04-20T09:08:51Z","timestamp":1555751331000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/BFb0055720"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1998]]},"ISBN":["9783540648925","9783540684626"],"references-count":8,"URL":"https:\/\/doi.org\/10.1007\/bfb0055720","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[1998]]}}}