{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,3,29]],"date-time":"2022-03-29T05:54:46Z","timestamp":1648533286285},"reference-count":29,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2015,8,25]],"date-time":"2015-08-25T00:00:00Z","timestamp":1440460800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Cryptol"],"published-print":{"date-parts":[[2016,10]]},"DOI":"10.1007\/s00145-015-9213-5","type":"journal-article","created":{"date-parts":[[2015,8,24]],"date-time":"2015-08-24T19:48:31Z","timestamp":1440445711000},"page":"927-951","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Cryptanalysis of Full RIPEMD-128"],"prefix":"10.1007","volume":"29","author":[{"given":"Franck","family":"Landelle","sequence":"first","affiliation":[]},{"given":"Thomas","family":"Peyrin","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,8,25]]},"reference":[{"key":"9213_CR1","unstructured":"G. Bertoni, J. Daemen, M. Peeters, G. Van Assche (2008). Keccak specifications. Submission to NIST, \n                    http:\/\/keccak.noekeon.org\/Keccak-specifications.pdf"},{"key":"9213_CR2","doi-asserted-by":"crossref","unstructured":"A. Bosselaers, B. Preneel, (eds.), in Integrity Primitives for Secure Information Systems, Final Report of RACE Integrity Primitives Evaluation RIPE-RACE 1040, volume 1007 of LNCS. (Springer, Berlin, 1995)","DOI":"10.1007\/3-540-60640-8"},{"key":"9213_CR3","unstructured":"C. De Canni\u00e8re, C. Rechberger, Finding SHA-1 characteristics: general results and applications, in ASIACRYPT (2006), pp. 1\u201320"},{"key":"9213_CR4","doi-asserted-by":"crossref","unstructured":"I. Damg\u00e5rd. A design principle for hash functions, in CRYPTO, volume 435 of LNCS, ed. by G. Brassard (Springer, 1989), pp. 416\u2013427","DOI":"10.1007\/0-387-34805-0_39"},{"key":"9213_CR5","unstructured":"B. den Boer, A. Bosselaers. Collisions for the compression function of MD5. In EUROCRYPT (1993), pp. 293\u2013304"},{"key":"9213_CR6","unstructured":"H. Dobbertin, Cryptanalysis of MD5 compress, in Rump Session of Advances in Cryptology EUROCRYPT 1996 (1996). \n                    ftp:\/\/ftp.rsasecurity.com\/pub\/cryptobytes\/crypto2n2.pdf"},{"key":"9213_CR7","doi-asserted-by":"crossref","unstructured":"H. Dobbertin, RIPEMD with two-round compress function is not collision-free. J. Cryptol.\n                           10(1), 51\u201370 (1997)","DOI":"10.1007\/s001459900019"},{"key":"9213_CR8","unstructured":"H. Dobbertin, A. Bosselaers, B. Preneel, RIPEMD-160: a strengthened version of RIPEMD, in FSE (1996), pp. 71\u201382"},{"key":"9213_CR9","unstructured":"H. Gilbert, T. Peyrin, Super-Sbox cryptanalysis: improved attacks for AES-like permutations, in FSE (2010), pp. 365\u2013383"},{"key":"9213_CR10","unstructured":"ISO. ISO\/IEC 10118-3:2004: Information technology\u2014-Security techniques\u2014Hash-functions\u2014Part 3: Dedicated hash-functions. pub-ISO, pub-ISO:adr, Feb 2004"},{"key":"9213_CR11","unstructured":"M. Iwamoto, T. Peyrin, Y. Sasaki. Limited-birthday distinguishers for hash functions\u2014collisions beyond the birthday bound can be meaningful, in ASIACRYPT (2) (2013), pp. 504\u2013523"},{"key":"9213_CR12","unstructured":"A. Joux, T. Peyrin. Hash functions and the (amplified) boomerang attack, in CRYPTO (2007), pp. 244\u2013263"},{"key":"9213_CR13","unstructured":"F. Landelle, T. Peyrin. Cryptanalysis of Full RIPEMD-128, in EUROCRYPT (2013), pp. 228\u2013244"},{"key":"9213_CR14","doi-asserted-by":"crossref","unstructured":"S. Manuel, T. Peyrin, Collisions on SHA-0 in one hour, in FSE, pp. 16\u201335 (2008)","DOI":"10.1007\/978-3-540-71039-4_2"},{"key":"9213_CR15","unstructured":"F. Mendel, T. Nad, S. Scherz, M. Schl\u00e4ffer, Differential attacks on reduced RIPEMD-160, in ISC (2012), pp. 23\u201338"},{"key":"9213_CR16","unstructured":"F. Mendel, T. Nad, M. Schl\u00e4ffer. Collision attacks on the reduced dual-stream hash function RIPEMD-128, in FSE (2012), pp. 226\u2013243"},{"key":"9213_CR17","unstructured":"F. Mendel, T. Peyrin, M. Schl\u00e4ffer, L. Wang, S. Wu, Improved cryptanalysis of reduced RIPEMD-160, in ASIACRYPT (2) (2013), pp. 484\u2013503"},{"key":"9213_CR18","unstructured":"F. Mendel, N. Pramstaller, C. Rechberger, V. Rijmen, On the collision resistance of RIPEMD-160, in ISC (2006), pp. 101\u2013116"},{"key":"9213_CR19","doi-asserted-by":"crossref","unstructured":"R.C. Merkle. One way hash functions and DES, in CRYPTO (1989), pp. 428\u2013446","DOI":"10.1007\/0-387-34805-0_40"},{"key":"9213_CR20","unstructured":"C. Ohtahara, Y. Sasaki, T. Shimoyama, Preimage attacks on step-reduced RIPEMD-128 and RIPEMD-160, in Inscrypt (2010), pp. 169\u2013186"},{"key":"9213_CR21","doi-asserted-by":"crossref","unstructured":"R.L. Rivest, The MD4 message-digest algorithm. Request for Comments (RFC) 1320, Internet Activities Board, Internet Privacy Task Force, April 1992","DOI":"10.17487\/rfc1320"},{"key":"9213_CR22","unstructured":"Y. Sasaki, K. Aoki, Meet-in-the-middle preimage attacks on double-branch hash functions: application to RIPEMD and others, in ACISP (2009), pp. 214\u2013231"},{"key":"9213_CR23","unstructured":"Y. Sasaki, L. Wang, Distinguishers beyond three rounds of the RIPEMD-128\/-160 compression functions, in ACNS (2012), pp. 275\u2013292"},{"key":"9213_CR24","unstructured":"M. Stevens, A. Sotirov, J. Appelbaum, A.K. Lenstra, D. Molnar, D.A. Osvik, B. de\u00a0Weger, Short chosen-prefix collisions for MD5 and the creation of a Rogue CA certificate, in CRYPTO (2009), pp. 55\u201369"},{"key":"9213_CR25","unstructured":"L. Wang, Y. Sasaki, W. Komatsubara, K. Ohta, K. Sakiyama. (Second) Preimage attacks on step-reduced RIPEMD\/RIPEMD-128 with a new local-collision approach, in CT-RSA (2011), pp. 197\u2013212"},{"key":"9213_CR26","unstructured":"X. Wang, X. Lai, D. Feng, H. Chen, X. Yu, Cryptanalysis of the hash functions MD4 and RIPEMD, in EUROCRYPT (2005), pp. 1\u201318"},{"key":"9213_CR27","unstructured":"X. Wang, Y.L. Yin, H. Yu, Finding collisions in the full SHA-1, in CRYPTO (2005), pp. 17\u201336"},{"key":"9213_CR28","unstructured":"X. Wang, H. Yu, How to break MD5 and other hash functions, in EUROCRYPT (2005), pp. 19\u201335"},{"key":"9213_CR29","unstructured":"X. Wang, H. Yu, Y.L. Yin, Efficient collision search attacks on SHA-0. In CRYPTO (2005), pp. 1\u201316"}],"container-title":["Journal of Cryptology"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00145-015-9213-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s00145-015-9213-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00145-015-9213-5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00145-015-9213-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,4,8]],"date-time":"2020-04-08T08:11:53Z","timestamp":1586333513000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s00145-015-9213-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,8,25]]},"references-count":29,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2016,10]]}},"alternative-id":["9213"],"URL":"https:\/\/doi.org\/10.1007\/s00145-015-9213-5","relation":{},"ISSN":["0933-2790","1432-1378"],"issn-type":[{"value":"0933-2790","type":"print"},{"value":"1432-1378","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015,8,25]]},"assertion":[{"value":"10 June 2013","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"25 August 2015","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}