{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,2]],"date-time":"2022-04-02T21:58:08Z","timestamp":1648936688116},"reference-count":22,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2012,4,21]],"date-time":"2012-04-21T00:00:00Z","timestamp":1334966400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Des. Codes Cryptogr."],"published-print":{"date-parts":[[2014,3]]},"DOI":"10.1007\/s10623-012-9674-6","type":"journal-article","created":{"date-parts":[[2012,4,20]],"date-time":"2012-04-20T06:13:58Z","timestamp":1334902438000},"page":"251-271","source":"Crossref","is-referenced-by-count":0,"title":["Internal differential collision attacks on the reduced-round Gr\u00f8stl-0 hash function"],"prefix":"10.1007","volume":"70","author":[{"given":"Kota","family":"Ideguchi","sequence":"first","affiliation":[]},{"given":"Elmar","family":"Tischhauser","sequence":"additional","affiliation":[]},{"given":"Bart","family":"Preneel","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2012,4,21]]},"reference":[{"key":"9674_CR1","doi-asserted-by":"crossref","unstructured":"Daemen J., Rijmen V.: Design of Rijndael. Springer (2001).","DOI":"10.1007\/978-3-662-04722-4"},{"key":"9674_CR2","doi-asserted-by":"crossref","unstructured":"Daemen J., Rijmen V.: Understanding two-round differentials in AES. In: De Prisco R., Yung M. (eds.) Security and Cryptography for Networks\u2014SCN \u201906. LNCS, vol. 4116, pp. 78\u201394. Springer (2006)","DOI":"10.1007\/11832072_6"},{"key":"9674_CR3","unstructured":"Daemen J., Rijmen V.: Plateau Characteristics, Information Security, IET, vol. 1\u20131, pp. 11\u201317 (2007)."},{"key":"9674_CR4","unstructured":"De Canni\u00e8re C., Rechberger C.: Finding SHA-1 characteristics: general results and applications. In: Lai X., Chen K. (eds.) Advances in Cryptology\u2014ASIACRYPT \u201906. LNCS, vol. 4284, pp. 1\u201320. Springer (2006)."},{"key":"9674_CR5","unstructured":"Gauravaram P., Knudsen L.R., Matusiewicz K., Mendel F., Rechberger C., Schl\u00e4ffer M., Thomsen S.S.: Gr\u00f8stl\u2014a SHA-3 candidate (2008)."},{"key":"9674_CR6","unstructured":"Gauravaram P., Knudsen L.R., Matusiewicz K., Mendel F., Rechberger C., Schl\u00e4ffer M., Thomsen S.S.: Gr\u00f8stl\u2014a SHA-3 candidate, tweaked version (2011)."},{"key":"9674_CR7","unstructured":"Gilbert H., Peyrin T.: Super-Sbox cryptanalysis: improved attacks for AES-like permutations. In: Hong S., Iwata T. (eds.) Fast Software Encryption\u2014FSE \u201910, LNCS, vol. 6174, pp. 365\u2013383. Springer (2010)."},{"key":"9674_CR8","unstructured":"Ideguchi K., Tischhauser E., Preneel B.: Improved collision attacks on the reduced-round Gr\u00f8stl hash function. In: Burmester M., Tsudik G., Magliveras S.S., Ili\u0107 I. (eds.) Information Security\u2014 ISC \u201910. LNCS, vol. 6531, pp. 1\u201316 (2011)."},{"key":"9674_CR9","unstructured":"Knudsen L.R.: Truncated and higher order differentials. In: Preneel B. (ed.) Fast Software Encryption\u2014FSE \u201994. LNCS, vol. 1008, pp. 196\u2013211. Springer (1995)."},{"key":"9674_CR10","unstructured":"Knuth D.E.: The Art of Computer Programming\u2014Seminumerical Algorithms, vol. 2, 3rd edn. Addison-Wesley (1997)."},{"key":"9674_CR11","unstructured":"Lamberger M., Mendel F., Rechberger C., Rijmen V., Schl\u00e4ffer M.: Rebound distinguishers: results on the full whirlpool compression function. In: Matsui M. (ed.) Advances in Cryptology\u2014ASIACRYPT \u201909. LNCS, vol. 5912, pp. 126\u2013143. Springer (2009)."},{"key":"9674_CR12","unstructured":"Lamberger M., Mendel F., Rechberger C., Rijmen V., Schl\u00e4ffer M.: The Rebound Attack and Subspace Distinguishers: Application to Whirlpool, Cryptology ePrint Archive: Report 2010\/198."},{"key":"9674_CR13","unstructured":"Mendel F., Rechberger C., Schl\u00e4ffer M., Thomsen S.S.: The rebound attack: cryptanalysis of reduced whirlpool and Gr\u00f8stl. In: Dunkelman O. (ed.) Fast Software Encryption\u2014FSE \u201909. LNCS, vol. 5665, pp. 260\u2013276. Springer (2009)."},{"key":"9674_CR14","unstructured":"Mendel F., Peyrin T., Rechberger C., Schl\u00e4ffer M.: Improved cryptanalysis of the reduced Gr\u00f8stl compression function, ECHO permutation and AES block cipher. In: Jacobson M.J., Rijmen V., Safavi-Naini R. (eds.) Selected Areas in Cryptography\u2014SAC \u201909. LNCS, vol. 5867, pp. 16\u201335. Springer (2009)."},{"key":"9674_CR15","unstructured":"Mendel F., Rechberger C., Schl\u00e4ffer M., Thomsen S.S.: Rebound attacks on the reduced Gr\u00f8stl hash function. In: Pieprzyk J. (ed.) Topics in Cryptology\u2014CT-RSA \u201910. LNCS, vol. 5985, pp. 350\u2013365. Springer (2010)."},{"key":"9674_CR16","unstructured":"National Institute of Standards and Technology, Announcing Request for Candidate Algorithm Nominations for a New Cryptographic Hash Algorithm (SHA-3) Family, Federal Register, 27(212), 62212\u201362220 (Nov. 2007)"},{"key":"9674_CR17","unstructured":"Nikoli\u0107 I., Pieprzyk J., Sokolowski P., Steinfeld R.: Known and chosen key differential distinguishers for block ciphers. In: Rhee K.H., Nyang D.H. (eds.) Information Security and Cryptology\u2014ICISC \u201910. LNCS, vol. 6829, pp. 29\u201348. Springer (2011)."},{"key":"9674_CR18","unstructured":"Peyrin T.: Cryptanalysis of grindahl. In: Kurosawa K. (ed.) Advances in Cryptology\u2014ASIACRYPT \u201907. LNCS, vol. 4833, pp. 551\u2013567. Springer (2008)."},{"key":"9674_CR19","unstructured":"Peyrin T.: Improved differential attacks for ECHO and Gr\u00f8stl. In: Rabin T. (ed.) Advances in Cryptology\u2014CRYPTO \u201910. LNCS, vol. 6223, pp. 370\u2013392. Springer (2010)."},{"key":"9674_CR20","unstructured":"Sasaki Y., Li Y., Wang L., Sakiyama K., Ohta K.: Non-full-active Super-Sbox analysis: applications to ECHO and Gr\u00f8stl. In: Abe M. (ed.) Advances in Cryptology\u2014ASIACRYPT \u201910. LNCS, vol. 6477, pp. 38\u201355. Springer (2010)."},{"key":"9674_CR21","unstructured":"Wang X., Yu H.: How to break MD5 and other hash functions. In: Cramer R. (ed.) Advances in Cryptology\u2014EUROCRYPT \u201905. LNCS, vol. 3494, pp. 19\u201335. Springer (2005)."},{"key":"9674_CR22","unstructured":"Wang X., Yin Y.L., Yu H.: Finding collisions in the full SHA-1. In: Shoup V. (ed.) Advances in Cryptology\u2014CRYPTO \u201905. LNCS, vol. 3621, pp. 17\u201336. Springer (2005)."}],"container-title":["Designs, Codes and Cryptography"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-012-9674-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10623-012-9674-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-012-9674-6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,27]],"date-time":"2019-06-27T12:14:19Z","timestamp":1561637659000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10623-012-9674-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,4,21]]},"references-count":22,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2014,3]]}},"alternative-id":["9674"],"URL":"https:\/\/doi.org\/10.1007\/s10623-012-9674-6","relation":{},"ISSN":["0925-1022","1573-7586"],"issn-type":[{"value":"0925-1022","type":"print"},{"value":"1573-7586","type":"electronic"}],"subject":[],"published":{"date-parts":[[2012,4,21]]}}}