{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,4]],"date-time":"2022-04-04T17:39:55Z","timestamp":1649093995837},"reference-count":49,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2014,5,28]],"date-time":"2014-05-28T00:00:00Z","timestamp":1401235200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Cryptol"],"published-print":{"date-parts":[[2015,10]]},"DOI":"10.1007\/s00145-014-9186-9","type":"journal-article","created":{"date-parts":[[2014,5,27]],"date-time":"2014-05-27T21:42:36Z","timestamp":1401226956000},"page":"879-898","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Collision Attack on Grindahl"],"prefix":"10.1007","volume":"28","author":[{"given":"Thomas","family":"Peyrin","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,5,28]]},"reference":[{"key":"9186_CR1","doi-asserted-by":"crossref","unstructured":"D. Augot, M. Finiasz, N. Sendrier. A family of fast syndrome based cryptographic hash functions, in E. Dawson, S. Vaudenay, editors, Progress in Cryptology\u2014Mycrypt 2005. Lecture Notes in Computer Science, vol. 3715 (Springer-Verlag, Berlin, 2005), pp. 64\u201383","DOI":"10.1007\/11554868_6"},{"key":"9186_CR2","doi-asserted-by":"crossref","unstructured":"M. Bellare, T. Ristenpart, Multi-property-preserving hash domain extension and the EMD transform, in X. Lai, K. Chen, editors, Advances in Cryptology\u2014ASIACRYPT 2006, Lecture Notes in Computer Science, vol. 4284, (Springer-Verlag, Berlin, 2006), pp. 299\u2013314","DOI":"10.1007\/11935230_20"},{"key":"9186_CR3","unstructured":"K. Bentahar, D. Page, M-J.O. Saarinen, J.H. Silverman, N.P. Smart, LASH, in Proceedings of Second NIST Cryptographic Hash Workshop, 2006. Available from: \n                    www.csrc.nist.gov\/pki\/HashWorkshop\/2006\/program_2006.htm"},{"key":"9186_CR4","unstructured":"G. Bertoni, J. Daemen, M. Peeters, G. Van Assche, The Keccak SHA-3 submission, in Submission to NIST (Round 3), 2011. Available from: \n                    http:\/\/keccak.noekeon.org\/Keccak-submission-3.pdf"},{"key":"9186_CR5","unstructured":"G. Bertoni, J. Daemen, M. Peeters, G. Van Assche. RadioGatun, a Belt-and-Mill hash function, in Proceedings of Second NIST Cryptographic Hash Workshop, 2006. Available from: \n                    www.csrc.nist.gov\/pki\/HashWorkshop\/2006\/program_2006.htm"},{"key":"9186_CR6","unstructured":"E. Biham, O. Dunkelman, A framework for iterative hash functions: HAIFA, in Proceedings of Second NIST Cryptographic Hash Workshop, 2006. Available from: \n                    www.csrc.nist.gov\/pki\/HashWorkshop\/2006\/program_2006.htm"},{"key":"9186_CR7","doi-asserted-by":"crossref","unstructured":"O. Billet, M.J.B. Robshaw, T. Peyrin, On building hash functions from multivariate quadratic equations, in J. Pieprzyk, H. Ghodosi, E. Dawson, editors, Information Security and Privacy\u2014ACISP 2007, Lecture Notes in Computer Science, vol. 4586 (Springer-Verlag, Berlin, 2007), pp. 82\u201395","DOI":"10.1007\/978-3-540-73458-1_7"},{"key":"9186_CR8","doi-asserted-by":"crossref","unstructured":"J. Black, P. Rogaway, T. Shrimpton, Black-box analysis of the block-cipher-based hash-function constructions from PGV, in M. Yung, editor, Advances in Cryptology\u2014CRYPTO 2002, Lecture Notes in Computer Science, vol. 2442 (Springer-Verlag, Berlin, 2002) pp. 320\u2013335","DOI":"10.1007\/3-540-45708-9_21"},{"key":"9186_CR9","doi-asserted-by":"crossref","unstructured":"S. Contini, A.K. Lenstra, R. Steinfeld, VSH, an efficient and provable collision-resistant hash function, in S. Vaudenay, editor, Advances in Cryptology\u2014EUROCRYPT 2006, Lecture Notes in Computer Science, vol. 4004 (Springer-Verlag, Berlin, 2006) pp. 165\u2013182","DOI":"10.1007\/11761679_11"},{"key":"9186_CR10","doi-asserted-by":"crossref","unstructured":"J. Daemen, V. Rijmen, The design of rijndael. (Springer-Verlag, Berlin, 2002)","DOI":"10.1007\/978-3-662-04722-4"},{"key":"9186_CR11","unstructured":"W. Dai. OFFICIAL COMMENT: LUX. NIST mailing list (local link), 2008. Available from: \n                    http:\/\/ehash.iaik.tugraz.at\/uploads\/e\/ec\/Lux_dai.txt"},{"key":"9186_CR12","doi-asserted-by":"crossref","unstructured":"I. Damg\u00e5rd, A design principle for hash functions, in G. Brassard, editor, Advances in Cryptology\u2014CRYPTO\u201989, Lecture Notes in Computer Science, vol. 435 (Springer-Verlag, Berlin, 1989), pp. 416\u2013427","DOI":"10.1007\/0-387-34805-0_39"},{"key":"9186_CR13","unstructured":"R.D. Dean, Formal aspects of mobile code security, PhD thesis. (Princeton University, Princeton, 1999)"},{"key":"9186_CR14","unstructured":"N. Ferguson, RE:OFFICIAL COMMENT:LUX. NIST mailing list (local link), 2009. Available from: \n                    http:\/\/ehash.iaik.tugraz.at\/uploads\/2\/21\/Lux_niels.txt"},{"key":"9186_CR15","unstructured":"N. Ferguson, S. Lucks, Attacks on AURORA-512 and the double-mix Merkle-Damgaard transform. Cryptology ePrint Archive, Report 2009\/113, 2009"},{"key":"9186_CR16","doi-asserted-by":"crossref","unstructured":"T. Fuhr, T. Peyrin. Cryptanalysis of radioGat\u00fan, in O. Dunkelman, editor, Fast Software Encryption\u2014FSE 2009, Lecture Notes in Computer Science, vol. 5665 (Springer-Verlag, Berlin, 2009), pp. 122\u2013138","DOI":"10.1007\/978-3-642-03317-9_8"},{"key":"9186_CR17","doi-asserted-by":"crossref","unstructured":"H. Gilbert, T. Peyrin, Super-sbox cryptanalysis: improved attacks for AES-like permutations, in S. Hong, T. Iwata, editors, Fast Software Encryption\u2014FSE 2010, Lecture Notes in Computer Science, vol. 6147 (Springer-Verlag, Berlin, 2010), pp. 365\u2013383","DOI":"10.1007\/978-3-642-13858-4_21"},{"key":"9186_CR18","doi-asserted-by":"crossref","unstructured":"M. Gorski, S. Lucks, T. Peyrin, Slide attacks on a class of hash functions, in J. Pieprzyk, editor, Advances in Cryptology\u2014ASIACRYPT 2008, Lecture Notes in Computer Science, vol. 5350 (Springer-Verlag, Berlin, 2008), pp. 143\u2013160","DOI":"10.1007\/978-3-540-89255-7_10"},{"key":"9186_CR19","unstructured":"S. Halevi, W.E. Hall, C.S. Jutla, The hash function fugue. Submission to NIST (updated), 2009"},{"key":"9186_CR20","doi-asserted-by":"crossref","unstructured":"S. Hirose, Some plausible constructions of double-block-length hash functions, in M.J.B. Robshaw, editor, Fast Software Encryption\u2014FSE 2006, Lecture Notes in Computer Science, vol. 4047 (Springer-Verlag, Berlin, 2006), pp. 210\u2013225","DOI":"10.1007\/11799313_14"},{"key":"9186_CR21","doi-asserted-by":"crossref","unstructured":"D. Hong, D. Chang, J. Sung, S. Lee, S. Hong, J. Lee, D. Moon, S. Chee, A new dedicated 256-bit hash function: FORK-256, in M.J.B. Robshaw, editor, Fast Software Encryption\u2014FSE 2006, Lecture Notes in Computer Science, vol. 4047 (Springer-Verlag, 2006), pp. 195\u2013209","DOI":"10.1007\/11799313_13"},{"key":"9186_CR22","unstructured":"T. Iwata, K. Shibutani, T. Shirai, S. Moriai, T. Akishita, AURORA: A Cryptographic Hash Algorithm Family. Submission to NIST, 2008. Available from: \n                    http:\/\/ehash.iaik.tugraz.at\/uploads\/b\/ba\/AURORA.pdf"},{"key":"9186_CR23","doi-asserted-by":"crossref","unstructured":"J-P. Aumasson, W. Meier, R.C.-W. Phan, The hash function family LAKE, in M.J.B. Robshaw, editor, Fast Software Encryption\u2014FSE 2008, Lecture Notes in Computer Science, vol. 5086, (Springer-Verlag, Berlin, 2008), pp. 36\u201353","DOI":"10.1007\/978-3-540-71039-4_3"},{"key":"9186_CR24","doi-asserted-by":"crossref","unstructured":"A. Joux, Multi-collisions in iterated hash functions, Application to cascaded Constructions, in M. Franklin, editor, Advances in cryptology\u2014CRYPTO 2004, Lecture Notes in Computer Science, vol. 3152 (Springer-Verlag, Berlin, 2004), pp. 306\u2013316","DOI":"10.1007\/978-3-540-28628-8_19"},{"key":"9186_CR25","doi-asserted-by":"crossref","unstructured":"J. Kelsey and T. Kohno. Herding Hash Functions and the Nostradamus Attack. In S. Vaudenay, editor, Advances in Cryptology\u2014EUROCRYPT 2006, Lecture Notes in Computer Science, vol. 4004 (Springer-Verlag, Berlin, 2006), pp. 183\u2013200","DOI":"10.1007\/11761679_12"},{"key":"9186_CR26","doi-asserted-by":"crossref","unstructured":"J. Kelsey and B. Schneier, Second preimages on \n                    \n                      \n                    \n                    $$n$$\n                    \n                      \n                        n\n                      \n                    \n                  -bit hash functions for much less than \n                    \n                      \n                    \n                    $$2^n$$\n                    \n                      \n                        \n                          2\n                          n\n                        \n                      \n                    \n                   work, in R. Cramer, editor, Advances in Cryptology\u2014EUROCRYPT 2005, Lecture Notes in Computer Science, vol. 3494, (Springer-Verlag, Berlin, 2005), pp. 474\u2013490","DOI":"10.1007\/11426639_28"},{"key":"9186_CR27","doi-asserted-by":"crossref","unstructured":"D. Khovratovich, Cryptanalysis of hash functions with structures, in M.J. Jacobson Jr., V. Rijmen, R. Safavi-Naini, editors, Selected Areas in Cryptography\u2014SAC 2009, Lecture Notes in Computer Science, vol. 5867, (Springer-Verlag, Berlin, 2009), pp. 108\u2013125","DOI":"10.1007\/978-3-642-05445-7_7"},{"key":"9186_CR28","doi-asserted-by":"crossref","unstructured":"L.R. Knudsen, Truncated and higher order differentials, in B. Preneel, editor, Fast Software Encryption\u2014FSE 1994, Lecture Notes in Computer Science, vol. 1008 (Springer-Verlag, 1995), pp. 196\u2013211","DOI":"10.1007\/3-540-60590-8_16"},{"key":"9186_CR29","unstructured":"L.R. Knudsen, C. Rechberger, S.S. Thomsen, Grindahl\u2014a family of hash functions, in A. Biryukov, editor, Fast Software Encryption\u2014FSE 2007, Lecture Notes in Computer Science, vol. 4593 (Springer-Verlag, Berlin, 2007), pp. 39\u201357"},{"key":"9186_CR30","doi-asserted-by":"crossref","unstructured":"M. Lamberger, F. Mendel, C. Rechberger, V. Rijmen, M. Schl\u00e4ffer, Rebound distinguishers: results on the full whirlpool compression function, in M. Matsui, editor, Advances in Cryptology\u2014ASIACRYPT 2009, Lecture Notes in Computer Science, vol. 5912 (Springer-Verlag, Berlin, 2009), pp. 126\u2013143","DOI":"10.1007\/978-3-642-10366-7_8"},{"key":"9186_CR31","doi-asserted-by":"crossref","unstructured":"F. Mendel, T. Peyrin, C. Rechberger, M. Schl\u00e4ffer, Improved cryptanalysis of the reduced gr\u00f8stl compression function, ECHO permutation and AES block cipher, in M.J. Jacobson Jr., V. Rijmen, R. Safavi-Naini, editors, Selected Areas in Cryptography\u2014SAC 2009, Lecture Notes in Computer Science, vol. 5867 (Springer-Verlag, Berlin, 2009), pp. 16\u201335","DOI":"10.1007\/978-3-642-05445-7_2"},{"key":"9186_CR32","doi-asserted-by":"crossref","unstructured":"F. Mendel, C. Rechberger, M. Schl\u00e4ffer, S.S. Thomsen, The rebound attack: cryptanalysis of reduced whirlpool and gr\u00f8stl, in O. Dunkelman, editor, Fast Software Encryption\u2014FSE 2009, Lecture Notes in Computer Science, vol. 5665 (Springer-Verlag, Berlin, 2009), pp. 260\u2013276","DOI":"10.1007\/978-3-642-03317-9_16"},{"key":"9186_CR33","unstructured":"A.J. Menezes, S.A. Vanstone, P.C. Van Oorschot, Handbook of applied cryptography, (CRC Press Inc, Boca Raton, FL, 1996)"},{"key":"9186_CR34","doi-asserted-by":"crossref","unstructured":"R.C. Merkle, One way hash functions and DES, in G. Brassard, editor, Advances in Cryptology\u2014CRYPTO\u201989, Lecture Notes in Computer Science, vol. 435 (Springer-Verlag, Berlin, 1989), pp. 428\u2013446","DOI":"10.1007\/0-387-34805-0_40"},{"key":"9186_CR35","unstructured":"I. Nikoli\u0107, A. Biryukov, D. Khovratovich, Hash family LUX\u2014Algorithm Specifications and Supporting Documentation. Submission to NIST, 2008. Available from: \n                    http:\/\/ehash.iaik.tugraz.at\/uploads\/f\/f3\/LUX.pdf"},{"key":"9186_CR36","unstructured":"NIST. National institute of standards and technology: Advanced hash standard. Available from: \n                    www.csrc.nist.gov\/pki\/HashWorkshop\/index.html"},{"key":"9186_CR37","unstructured":"NIST. National institute of standards and technology: FIPS 180\u20132: Secure hash standard, August 2002. Available from: \n                    www.csrc.nist.gov"},{"key":"9186_CR38","unstructured":"NIST. National institute of standards and technology: FIPS 197 advanced encryption standard, November 2001. Available from: \n                    www.csrc.nist.gov"},{"key":"9186_CR39","doi-asserted-by":"crossref","unstructured":"T. Peyrin, Cryptanalysis of grindahl, in K. Kurosawa, editor, Advances in Cryptology\u2014ASIACRYPT 2007, Lecture Notes in Computer Science, vol. 4833 (Springer-Verlag, Berlin, 2007), pp. 551\u2013567","DOI":"10.1007\/978-3-540-76900-2_34"},{"key":"9186_CR40","unstructured":"T. Peyrin, Slide attacks on LUX. NIST mailing list (local link), 2008. Available from: \n                    http:\/\/ehash.iaik.tugraz.at\/uploads\/6\/62\/Lux_peyrin.txt"},{"key":"9186_CR41","doi-asserted-by":"crossref","unstructured":"T. Peyrin, H. Gilbert, F. Muller, M.J.B. Robshaw, Combining compression functions and block cipher-based hash functions, in X. Lai, K. Chen, editors, Advances in Cryptology\u2014ASIACRYPT 2006, Lecture Notes in Computer Science, vol. 4284 (Springer-Verlag, Berlin, 2006), pp. 315\u2013331","DOI":"10.1007\/11935230_21"},{"key":"9186_CR42","unstructured":"B. Preneel, Analysis and design of cryptographic hash functions, PhD thesis, Katholieke Universiteit Leuven, 1993"},{"key":"9186_CR43","doi-asserted-by":"crossref","unstructured":"B. Preneel, R. Govaerts, J. Vandewalle, Hash functions based on block ciphers: a synthetic approach, in D.R. Stinson, editor, Advances in Cryptology\u2014CRYPTO \u201993, Lecture Notes in Computer Science, vol. 773 (Springer-Verlag, Berlin, 1993), pp. 368\u2013378","DOI":"10.1007\/3-540-48329-2_31"},{"key":"9186_CR44","doi-asserted-by":"crossref","unstructured":"R. L. Rivest, RFC 1321: The MD5 message-digest algorithm, April 1992. Available from: \n                    http:\/\/www.ietf.org\/rfc\/rfc1321.txt\n                    \n                  .","DOI":"10.17487\/rfc1321"},{"key":"9186_CR45","doi-asserted-by":"crossref","unstructured":"Y. Seurin, T. Peyrin, Security analysis of constructions combining FIL random oracles, in A. Biryukov, editor, Fast Software Encryption\u2014FSE 2007, Lecture Notes in Computer Science, vol. 4593 (Springer-Verlag, Berlin, 2007), pp. 119\u2013136","DOI":"10.1007\/978-3-540-74619-5_8"},{"key":"9186_CR46","doi-asserted-by":"crossref","unstructured":"X. Wang, X. Lai, D. Feng, H. Chen, X. Yu, Cryptanalysis of the hash functions MD4 and RIPEMD, in R. Cramer, editor, Advances in Cryptology\u2014EUROCRYPT 2005, Lecture Notes in Computer Science, vol. 3494 (Springer-Verlag, Berlin, 2005), pp. 1\u201318","DOI":"10.1007\/11426639_1"},{"key":"9186_CR47","doi-asserted-by":"crossref","unstructured":"X. Wang, Y.L. Yin, H. Yu, Finding collisions in the full SHA-1, in V. Shoup, editor, Advances in Cryptology\u2014CRYPTO 2005, Lecture Notes in Computer Science, vol. 3621 (Springer-Verlag, Berlin, 2005), pp. 17\u201336","DOI":"10.1007\/11535218_2"},{"key":"9186_CR48","doi-asserted-by":"crossref","unstructured":"X. Wang, H. Yu, How to break MD5 and other hash functions, in R. Cramer, editor, Advances in Cryptology\u2014EUROCRYPT 2005, Lecture Notes in Computer Science, vol. 3494 (Springer-Verlag, Berlin, 2005), pp. 19\u201335","DOI":"10.1007\/11426639_2"},{"key":"9186_CR49","doi-asserted-by":"crossref","unstructured":"X. Wang, H. Yu, Y.L. Yin, Efficient collision search attacks on SHA-0, in V. Shoup, editor, Advances in Cryptology\u2014CRYPTO 2005, Lecture Notes in Computer Science, vol. 3621 (Springer-Verlag, Berlin, 2005), pp. 1\u201316","DOI":"10.1007\/11535218_1"}],"container-title":["Journal of Cryptology"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00145-014-9186-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s00145-014-9186-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00145-014-9186-9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00145-014-9186-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,4,8]],"date-time":"2020-04-08T08:16:13Z","timestamp":1586333773000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s00145-014-9186-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,5,28]]},"references-count":49,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2015,10]]}},"alternative-id":["9186"],"URL":"https:\/\/doi.org\/10.1007\/s00145-014-9186-9","relation":{},"ISSN":["0933-2790","1432-1378"],"issn-type":[{"value":"0933-2790","type":"print"},{"value":"1432-1378","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014,5,28]]},"assertion":[{"value":"2 November 2007","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"28 May 2014","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}