{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T13:51:05Z","timestamp":1762005065828},"reference-count":23,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2019,1,29]],"date-time":"2019-01-29T00:00:00Z","timestamp":1548720000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Sci. China Inf. Sci."],"published-print":{"date-parts":[[2019,3]]},"DOI":"10.1007\/s11432-018-9568-2","type":"journal-article","created":{"date-parts":[[2019,2,2]],"date-time":"2019-02-02T07:49:29Z","timestamp":1549093769000},"update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Pseudo random oracle of Merkle-Damg\u00e5rd hash functions revisited"],"prefix":"10.1007","volume":"62","author":[{"given":"Kamel","family":"Ammour","sequence":"first","affiliation":[]},{"given":"Lei","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Dawu","family":"Gu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,1,29]]},"reference":[{"key":"9568_CR1","first-page":"416","volume-title":"Proceedings of the 9th Annual International Cryptology Conference, Santa Barbara","author":"I Damg\u00e5rd","year":"1989","unstructured":"Damg\u00e5rd I. A design principle for hash functions. In: Proceedings of the 9th Annual International Cryptology Conference, Santa Barbara, 1989. 416\u2013427"},{"key":"9568_CR2","first-page":"428","volume-title":"Proceedings of the 9th Annual International Cryptology Conference, Santa Barbara","author":"R C Merkle","year":"1989","unstructured":"Merkle R C. One way hash functions and DES. In: Proceedings of the 9th Annual International Cryptology Conference, Santa Barbara, 1989. 428\u2013446"},{"key":"9568_CR3","doi-asserted-by":"crossref","first-page":"62","DOI":"10.1145\/168588.168596","volume-title":"Proceedings of the 1st ACM Conference on Computer and Communications Security, Fairfax","author":"M Bellare","year":"1993","unstructured":"Bellare M, Rogaway P. Random oracles are practical: a paradigm for designing efficient protocols. In: Proceedings of the 1st ACM Conference on Computer and Communications Security, Fairfax, 1993. 62\u201373"},{"key":"9568_CR4","doi-asserted-by":"publisher","first-page":"92","DOI":"10.1007\/BFb0053428","volume-title":"Advances in Cryptology \u2014 EUROCRYPT\u201994. Berlin: Springer","author":"M Bellare","year":"1995","unstructured":"Bellare M, Rogaway P. Optimal asymmetric encryption. In: Advances in Cryptology \u2014 EUROCRYPT\u201994. Berlin: Springer, 1995. 92\u2013111"},{"key":"9568_CR5","doi-asserted-by":"publisher","first-page":"611","DOI":"10.1007\/s10623-015-0096-0","volume":"77","author":"E Andreeva","year":"2015","unstructured":"Andreeva E, Mennink B, Preneel B. Open problems in hash function security. Des Code Cryptogr, 2015, 77: 611\u2013631","journal-title":"Des Code Cryptogr"},{"key":"9568_CR6","doi-asserted-by":"publisher","first-page":"38","DOI":"10.1007\/978-3-319-59870-3_3","volume-title":"Proceedings of the 22nd Australasian Conference on Information Security and Privacy, Auckland","author":"Y Naito","year":"2017","unstructured":"Naito Y. Indifferentiability of double-block-length hash function without feed-forward operations. In: Proceedings of the 22nd Australasian Conference on Information Security and Privacy, Auckland, 2017. 38\u201357"},{"key":"9568_CR7","doi-asserted-by":"publisher","first-page":"171","DOI":"10.1007\/978-3-540-24676-3_11","volume-title":"Advances in Cryptology - EUROCRYPT 2004. Berlin: Springer","author":"M Bellare","year":"2004","unstructured":"Bellare M, Boldyreva A, Palacio A. An uninstantiable random-oracle-model scheme for a hybrid-encryption problem. In: Advances in Cryptology - EUROCRYPT 2004. Berlin: Springer, 2004. 171\u2013188"},{"key":"9568_CR8","first-page":"209","volume-title":"Proceedings of the 30th Annual ACM Symposium on the Theory of Computing, Dallas","author":"R Canetti","year":"1998","unstructured":"Canetti R, Goldreich O, Halevi S. The random oracle methodology, revisited (preliminary version). In: Proceedings of the 30th Annual ACM Symposium on the Theory of Computing, Dallas, 1998. 209\u2013218"},{"key":"9568_CR9","doi-asserted-by":"publisher","first-page":"40","DOI":"10.1007\/978-3-540-24638-1_3","volume-title":"Theory of Cryptography. Berlin: Springer","author":"R Canetti","year":"2004","unstructured":"Canetti R, Goldreich O, Halevi S. On the random-oracle methodology as applied to length-restricted signature schemes. In: Theory of Cryptography. Berlin: Springer, 2004. 40\u201357"},{"key":"9568_CR10","first-page":"21","volume-title":"Proceedings of the 1st Theory of Cryptography Conference on Theory of Cryptography, Cambridge","author":"U M Maurer","year":"2004","unstructured":"Maurer U M, Renner R, Holenstein C. Indifferentiability, impossibility results on reductions, and applications to the random oracle methodology. In: Proceedings of the 1st Theory of Cryptography Conference on Theory of Cryptography, Cambridge, 2004. 21\u201339"},{"key":"9568_CR11","first-page":"430","volume-title":"Proceedings of the 25th Annual International Cryptology Conference, Santa Barbara","author":"J Coron","year":"2005","unstructured":"Coron J, Dodis Y, Malinaud C, et al. Merkle-damg\u00e5rd revisited: how to construct a hash function. In: Proceedings of the 25th Annual International Cryptology Conference, Santa Barbara, 2005. 430\u2013448"},{"key":"9568_CR12","doi-asserted-by":"publisher","first-page":"4050","DOI":"10.1109\/TIT.2017.2679757","volume":"63","author":"J Lee","year":"2017","unstructured":"Lee J. Indifferentiability of the sum of random permutations toward optimal security. IEEE Trans Inform Theor, 2017, 63: 4050\u20134054","journal-title":"IEEE Trans Inform Theor"},{"key":"9568_CR13","first-page":"3","volume-title":"Proceedings of the 14th International Conference on Theory of Cryptography, Beijing","author":"U Maurer","year":"2016","unstructured":"Maurer U, Renner R. From indifferentiability to constructive cryptography (and back). In: Proceedings of the 14th International Conference on Theory of Cryptography, Beijing, 2016. 3\u201324"},{"key":"9568_CR14","doi-asserted-by":"publisher","first-page":"237","DOI":"10.1007\/s10623-015-0047-9","volume":"79","author":"D Moody","year":"2016","unstructured":"Moody D, Paul S, Smith-Tone D. Improved indifferentiability security bound for the JH mode. Des Code Cryptogr, 2016, 79: 237\u2013259","journal-title":"Des Code Cryptogr"},{"key":"9568_CR15","doi-asserted-by":"publisher","first-page":"419","DOI":"10.1007\/s10207-012-0175-4","volume":"11","author":"N Bagheri","year":"2012","unstructured":"Bagheri N, Gauravaram P, Knudsen L R, et al. The suffix-free-prefix-free hash function construction and its indifferentiability security analysis. Int J Inf Secur, 2012, 11: 419\u2013434","journal-title":"Int J Inf Secur"},{"key":"9568_CR16","first-page":"283","volume-title":"Proceedings of the 12th international conference on Theory and Application of Cryptology and Information Security, Shanghai","author":"D Chang","year":"2006","unstructured":"Chang D, Lee S, Nandi M, et al. Indifferentiable security analysis of popular hash functions with prefix-free padding. In: Proceedings of the 12th international conference on Theory and Application of Cryptology and Information Security, Shanghai, 2006. 283\u2013298"},{"key":"9568_CR17","doi-asserted-by":"publisher","first-page":"429","DOI":"10.1007\/978-3-540-71039-4_27","volume-title":"Proceedings of the 15th International Workshop on Fast Software Encryption, Lausanne","author":"D Chang","year":"2008","unstructured":"Chang D, Nandi M. Improved indifferentiability security analysis of chopmd hash function. In: Proceedings of the 15th International Workshop on Fast Software Encryption, Lausanne, 2008. 429\u2013443"},{"key":"9568_CR18","first-page":"407","volume":"2008","author":"D Chang","year":"2008","unstructured":"Chang D, Sung J, Hong S, et al. Indifferentiable security analysis of choppfmd, chopmd, a chopmdp, chopwph, chopni, chopemd, chopcs, and chopesh hash domain extensions. IACR Cryptol ePrint Arch, 2008, 2008: 407","journal-title":"IACR Cryptol ePrint Arch"},{"key":"9568_CR19","doi-asserted-by":"publisher","first-page":"293","DOI":"10.1007\/s10623-008-9208-4","volume":"48","author":"Z Gong","year":"2008","unstructured":"Gong Z, Lai X, Chen K. A synthetic indifferentiability analysis of some block-cipher-based hash functions. Des Code Cryptogr, 2008, 48: 293\u2013305","journal-title":"Des Code Cryptogr"},{"key":"9568_CR20","first-page":"299","volume-title":"Proceedings of the 12th International Conference on the Theory and Application of Cryptology and Information Security, Shanghai","author":"M Bellare","year":"2006","unstructured":"Bellare M, Ristenpart T. Multi-property-preserving hash domain extension and the EMD transform. In: Proceedings of the 12th International Conference on the Theory and Application of Cryptology and Information Security, Shanghai, 2006. 299\u2013314"},{"key":"9568_CR21","doi-asserted-by":"publisher","first-page":"271","DOI":"10.1007\/s00145-010-9095-5","volume":"25","author":"S Hirose","year":"2012","unstructured":"Hirose S, Park J H, Yun A. A simple variant of the Merkle-Damg\u00e5rd scheme with a permutation. J Cryptol, 2012, 25: 271\u2013309","journal-title":"J Cryptol"},{"key":"9568_CR22","doi-asserted-by":"publisher","first-page":"11","DOI":"10.3390\/cryptography2020011","volume":"2","author":"S Hirose","year":"2018","unstructured":"Hirose S. Sequential hashing with minimum padding. Cryptography, 2018, 2: 11","journal-title":"Cryptography"},{"key":"9568_CR23","first-page":"358","volume-title":"Proceedings of the 13th International Workshop on Selected Areas in Cryptography, Montreal","author":"M Liskov","year":"2006","unstructured":"Liskov M. Constructing an ideal hash function from weak ideal compression functions. In: Proceedings of the 13th International Workshop on Selected Areas in Cryptography, Montreal, 2006. 358\u2013375"}],"container-title":["Science China Information Sciences"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11432-018-9568-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11432-018-9568-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11432-018-9568-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,13]],"date-time":"2023-09-13T10:54:17Z","timestamp":1694602457000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11432-018-9568-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,1,29]]},"references-count":23,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2019,3]]}},"alternative-id":["9568"],"URL":"https:\/\/doi.org\/10.1007\/s11432-018-9568-2","relation":{},"ISSN":["1674-733X","1869-1919"],"issn-type":[{"value":"1674-733X","type":"print"},{"value":"1869-1919","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,1,29]]},"assertion":[{"value":"8 June 2018","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"21 August 2018","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"29 January 2019","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}],"article-number":"32112"}}