{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,3,30]],"date-time":"2022-03-30T15:14:08Z","timestamp":1648653248536},"reference-count":24,"publisher":"Springer Science and Business Media LLC","issue":"10","license":[{"start":{"date-parts":[[2010,9,7]],"date-time":"2010-09-07T00:00:00Z","timestamp":1283817600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Sci. China Inf. Sci."],"published-print":{"date-parts":[[2010,10]]},"DOI":"10.1007\/s11432-010-4062-1","type":"journal-article","created":{"date-parts":[[2010,9,6]],"date-time":"2010-09-06T09:26:57Z","timestamp":1283765217000},"page":"1977-1987","source":"Crossref","is-referenced-by-count":5,"title":["Design theory and method of multivariate hash function"],"prefix":"10.1007","volume":"53","author":[{"given":"HouZhen","family":"Wang","sequence":"first","affiliation":[]},{"given":"HuanGuo","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"QianHong","family":"Wu","sequence":"additional","affiliation":[]},{"given":"Yu","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"ChunLei","family":"Li","sequence":"additional","affiliation":[]},{"given":"XinYu","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2010,9,7]]},"reference":[{"key":"4062_CR1","series-title":"LNCS","doi-asserted-by":"crossref","first-page":"19","DOI":"10.1007\/11426639_2","volume-title":"Proceedings of EUROCRYPT 2005","author":"X. Y. Wang","year":"2005","unstructured":"Wang X Y, Yu H B. How to break MD5 and other hash functions. In: Proceedings of EUROCRYPT 2005, LNCS, vol. 3494. Berlin: Springer-Verlag, 2005. 19\u201335"},{"key":"4062_CR2","unstructured":"Wang X Y, Yao A, Yao F. Cryptanalysis of SHA-1 Hash Function. Cryptographic Hash Workshop, Invited Report, 2005"},{"key":"4062_CR3","first-page":"121","volume-title":"Proceedings of EUROCRYPT 2009","author":"X. Y. Wang","year":"2009","unstructured":"Wang X Y, Yu H B, Wang W, et al. Cryptanalysis on HMAC\/NMAC-MD5 and MD5-MAC. In: Proceedings of EUROCRYPT 2009. Berlin: Springer-Verlag, 2009. 121\u2013133"},{"key":"4062_CR4","first-page":"185","volume-title":"Proceedings of ACISP 2009","author":"H. B. Yu","year":"2009","unstructured":"Yu H B, Wang X Y. Distinguishing attack on the secret-prefix MAC based on the 39-step SHA-256. In: Proceedings of ACISP 2009. Berlin: Springer-Verlag, 2009. 185\u2013201"},{"key":"4062_CR5","doi-asserted-by":"crossref","first-page":"936","DOI":"10.1007\/s11432-008-0064-7","volume":"51","author":"H. N. Zhang","year":"2008","unstructured":"Zhang H N, Li L, Wang X Y. Fast correlation attack on stream cipher ABC v3. Sci China Ser F-Inf Sci, 2008, 51: 936\u2013947.","journal-title":"Sci China Ser F-Inf Sci"},{"key":"4062_CR6","unstructured":"NIST. Plan for new cryptographic hash functions. http:\/\/www.nist.gov\/hash-function\/"},{"key":"4062_CR7","doi-asserted-by":"crossref","first-page":"209","DOI":"10.1007\/978-3-642-03356-8_13","volume-title":"Proceedings of CRYPTO 2009","author":"Z. Yuan","year":"2009","unstructured":"Yuan Z, Wang W, Jia K T, et al. New birthday attacks on some MACs based on block ciphers. In: Proceedings of CRYPTO 2009. Berlin: Springer-Verlag, 2009. 209\u2013230"},{"key":"4062_CR8","first-page":"11","volume-title":"Multivariate Public Key Cryptosystems","author":"J. T. Ding","year":"2006","unstructured":"Ding J T. Multivariate Public Key Cryptosystems. Berlin: Springer-Verlag, 2006. 11\u2013190"},{"key":"4062_CR9","series-title":"LNCS","first-page":"309","volume-title":"Proceedings of ICISC 2007","author":"J. Aumasson","year":"2007","unstructured":"Aumasson J, Meier W. Analysis of multivariate hash functions. In: Proceedings of ICISC 2007, LNCS, vol. 4817. Berlin: Springer-Verlag, 2007. 309\u2013323"},{"key":"4062_CR10","series-title":"LNCS","first-page":"115","volume-title":"Proceedings of Inscrypt 2008","author":"L. Bettale","year":"2009","unstructured":"Bettale L, Faug\u00e8re J C, Perret L. Security analysis of multivariate polynomial for hashing. In: Proceedings of Inscrypt 2008, LNCS 5487, Vol. 347. Berlin: Springer-Verlag, 2009. 115\u2013124"},{"key":"4062_CR11","unstructured":"Biham E, Dunkelman O. A framework for iterative hash functions-HAIFA, ePrint report 2007\/278, 2007"},{"key":"4062_CR12","first-page":"75","volume-title":"Proceedings of ISSAC2002","author":"J. C. Faug\u00e8re","year":"2002","unstructured":"Faug\u00e8re J C. A new efficient algorithm for computing Grobner bases without reduction to zero (F5). In: Proceedings of ISSAC2002. New York: ACM Press, 2002. 75\u201383"},{"key":"4062_CR13","series-title":"LNCS","first-page":"392","volume-title":"Proceedings of Eurocrypt2000","author":"A. Shamir","year":"2000","unstructured":"Shamir A, Patarin J, Courtois N, et al. Efficient algorithms for solving overdefined systems of multivariate polynomial equation. In: Proceedings of Eurocrypt2000, LNCS, vol. 1807. Berlin: Springer-Verlag, 2000. 392\u2013407"},{"key":"4062_CR14","series-title":"LNCS","doi-asserted-by":"crossref","first-page":"267","DOI":"10.1007\/3-540-36178-2_17","volume-title":"Proceedings of Asiacrypt 2002","author":"N. Courtois","year":"2002","unstructured":"Courtois N, Pieprzyk J. Cryptanalysis of Block ciphers with overdefined systems of equations, In: Proceedings of Asiacrypt 2002, LNCS, vol. 2501. Berlin: Springer-Verlag, 2002. 267\u2013287"},{"key":"4062_CR15","first-page":"71","volume-title":"Proceedings of ICPSS 2004","author":"M. Bardet","year":"2004","unstructured":"Bardet M, Faug\u00e8re J C, Salvy B. On the complexity of Grobner basis computation of semi-regular overdetermined algebraic equations. In: Proceedings of ICPSS 2004. Berlin: Springer-Verlag, 2004. 71\u201374"},{"key":"4062_CR16","unstructured":"Raddum H V, Semaev I. New technique for solving sparse equation systems. Cryptology ePrint Archive, Report 2006\/475"},{"key":"4062_CR17","doi-asserted-by":"crossref","first-page":"1738","DOI":"10.1360\/jos181738","volume":"18","author":"X. J. Tang","year":"2007","unstructured":"Tang X J, Feng Y. Applying dixon resultants in cryptography. J Software, 2007, 18: 1738\u20131745","journal-title":"J Software"},{"key":"4062_CR18","unstructured":"Ding J, Yang B Y. Multivariates polynomials for hashing. Cryptology ePrint Archive, Report 2007\/137, 2007"},{"key":"4062_CR19","series-title":"LNCS","first-page":"474","volume-title":"Proceedings of ASIACRYPT2005","author":"Lucks","year":"2005","unstructured":"Lucks. A failure-friendly design principle for hash functions. In: Proceedings of ASIACRYPT2005, LNCS, vol. 3788. Berlin: Springer-Verlag, 2005. 474\u2013494"},{"key":"4062_CR20","series-title":"LNCS","doi-asserted-by":"crossref","first-page":"306","DOI":"10.1007\/978-3-540-28628-8_19","volume-title":"Proceedings of Crypto 2004","author":"A. Joux","year":"2004","unstructured":"Joux A. Multicollisions in iterated Hash functions. Application to cascaded constructions. In: Proceedings of Crypto 2004, LNCS, vol. 3152. Berlin: Springer-Verlag, 2004. 306\u2013316"},{"key":"4062_CR21","series-title":"LNCS","doi-asserted-by":"crossref","first-page":"474","DOI":"10.1007\/11426639_28","volume-title":"Proceedings of Eurocrypt 2005","author":"J. Kelsey","year":"2005","unstructured":"Kelsey J, Schneier B. Second preimages on n-bit hash functions for much less than 2n. In: Proceedings of Eurocrypt 2005, LNCS vol. 3494. Berlin: Springer-Verlag, 2005. 474\u2013490"},{"key":"4062_CR22","series-title":"LNCS","first-page":"183","volume-title":"Proceedings of Eurocrypt2006","author":"J. Kelsey","year":"2006","unstructured":"Kelsey J, Kohno T. Herding Hash functions and the nostradamus attack. In: Proceedings of Eurocrypt2006, LNCS, vol. 4004. Berlin: Springer-Verlag, 2006. 183\u2013200"},{"key":"4062_CR23","unstructured":"Rukbin A, Soto J, Nechvatal J, et al. A statistical test suit for random pseudorandom number generator for cryptographic applications. In: NIST Special Publication 800-22, 2001, http:\/\/csrc.nist.gov\/rng\/SP800-22b.pdf ."},{"key":"4062_CR24","doi-asserted-by":"crossref","first-page":"760","DOI":"10.1007\/s11432-010-0025-9","volume":"53","author":"H. Z. Wang","year":"2010","unstructured":"Wang H Z, Zhang H G, Guan H M, et al. A new perturbation algorithm and enhancing security of SFLASH signature scheme. Sci China Inf Sci, 2010, 53: 760\u2013768","journal-title":"Sci China Inf Sci"}],"container-title":["Science China Information Sciences"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11432-010-4062-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11432-010-4062-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11432-010-4062-1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T15:36:06Z","timestamp":1559403366000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11432-010-4062-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,9,7]]},"references-count":24,"journal-issue":{"issue":"10","published-print":{"date-parts":[[2010,10]]}},"alternative-id":["4062"],"URL":"https:\/\/doi.org\/10.1007\/s11432-010-4062-1","relation":{},"ISSN":["1674-733X","1869-1919"],"issn-type":[{"value":"1674-733X","type":"print"},{"value":"1869-1919","type":"electronic"}],"subject":[],"published":{"date-parts":[[2010,9,7]]}}}