{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,3]],"date-time":"2022-04-03T08:24:33Z","timestamp":1648974273739},"reference-count":29,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2014,11,13]],"date-time":"2014-11-13T00:00:00Z","timestamp":1415836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cryptogr. Commun."],"published-print":{"date-parts":[[2015,9]]},"DOI":"10.1007\/s12095-014-0117-2","type":"journal-article","created":{"date-parts":[[2014,11,14]],"date-time":"2014-11-14T21:55:33Z","timestamp":1416002133000},"page":"289-295","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Attacks on a double length blockcipher-based hash proposal"],"prefix":"10.1007","volume":"7","author":[{"given":"Yiyuan","family":"Luo","sequence":"first","affiliation":[]},{"given":"Xuejia","family":"Lai","sequence":"additional","affiliation":[]},{"given":"Tiejun","family":"Jia","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,11,13]]},"reference":[{"key":"117_CR1","unstructured":"FIPS. FIPS 180-1 Secure Hash Standard: Federal Information Processing Standard (FIPS) Publication 180-1 National Institute of Standards and Technology, US Department of Commerce Washington D.C (1995)"},{"key":"117_CR2","doi-asserted-by":"crossref","unstructured":"Fleischmann, E., Gorski, M., Lucks, S.: Security of cyclic double block length hash functions. In: Cryptography and Coding 2009, vol. LNCS 5921, pp. 153\u2013175. Springer-Verlag (2009)","DOI":"10.1007\/978-3-642-10868-6_10"},{"key":"117_CR3","doi-asserted-by":"crossref","unstructured":"Fleischmann, E., Gorski, M., Lucks, S.: On the security of tandem-DM. LNCS of Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 5665, pp. 84\u2013103. Springer Verlag, Leuven Belgium (2009)","DOI":"10.1007\/978-3-642-03317-9_6"},{"key":"117_CR4","doi-asserted-by":"crossref","first-page":"290","DOI":"10.1007\/978-3-540-40974-8_23","volume":"2898","author":"M Hattori","year":"2003","unstructured":"Hattori, M., Hirose, S., Yoshida, S.: Analysis of double block length hash functions. Cryptogr. Coding Proc. 2898, 290\u2013302 (2003)","journal-title":"Cryptogr. Coding Proc."},{"key":"117_CR5","doi-asserted-by":"crossref","first-page":"2575","DOI":"10.1093\/ietfec\/e89-a.10.2575","volume":"E89A10","author":"S Hirose","year":"2006","unstructured":"Hirose, S.: A security analysis of double-block-length hash functions with the rate 1. Ieice Trans. on Fund. of Elect. Commun. Comput. Scie. E89A10, 2575\u20132582 (2006)","journal-title":"Ieice Trans. on Fund. of Elect. Commun. Comput. Scie."},{"key":"117_CR6","doi-asserted-by":"crossref","unstructured":"Hirose, S.: Some plausible constructions of double-block-length hash functions. In: Fast Software Encryption, vol. LNCS 4047, pp. 210\u2013225 (2006)","DOI":"10.1007\/11799313_14"},{"key":"117_CR7","doi-asserted-by":"crossref","unstructured":"Hohl, W., Lai, X., Meier, T., Christian W.: Security of iterated hash functions based on block ciphers. In: Advances in Cryptology - CRYPTO\u201993, vol. LNCS 773, pp. 379\u2013379. Springer-Verlag, Santa Barbara, CA United states (1994)","DOI":"10.1007\/3-540-48329-2_32"},{"key":"117_CR8","unstructured":"ISO: ISO\/IEC 10118 Information technology - Security techniques - Hash-functions (1994)"},{"issue":"1","key":"117_CR9","doi-asserted-by":"crossref","first-page":"59","DOI":"10.1007\/s001459900035","volume":"11","author":"LR Knudsen","year":"1998","unstructured":"Knudsen, L. R., Lai, X. J., Preneel, B.: Attacks on fast double block length hash functions. J. Cryptology 11(1), 59\u201372 (1998)","journal-title":"J. Cryptology"},{"key":"117_CR10","doi-asserted-by":"crossref","unstructured":"Knudsen, L.R., Muller, F.: Some attacks against a double length hash proposal. In: ASIACRYPT 2005, pp. 462\u2013473 (2005)","DOI":"10.1007\/11593447_25"},{"key":"117_CR11","volume-title":"On the design and security of block ciphers, vol 1 of ETH Series in Information Processing","author":"X Lai","year":"1992","unstructured":"Lai, X.: On the design and security of block ciphers, vol 1 of ETH Series in Information Processing. Hartung-Gorre Verlag, Konstanz (1992)"},{"key":"117_CR12","doi-asserted-by":"crossref","unstructured":"Lai, X., Massey, J.L.: Hash functions based on block ciphers. In: Rueppel, R.A. (ed.) Advances in Cryptography-Eurocrypt\u201992, vol. LNCS 658, pp. 55\u201370. Springer-Verlag (1992)","DOI":"10.1007\/3-540-47555-9_5"},{"key":"117_CR13","doi-asserted-by":"crossref","unstructured":"Lee, J., Hong, S., Sung, J., Park, H.: A new double-block-length hash function using feistel structure. In: J. H. Park et al. (ed.) ISA 2009, vol. LNCS 5576, pp. 11\u201320 (2009)","DOI":"10.1007\/978-3-642-02617-1_2"},{"key":"117_CR14","doi-asserted-by":"crossref","unstructured":"Lee, J., Steinberger, J.: Multi-property-preserving domain extension using polynomial-based modes of operation. In: Advances in Cryptology - EUROCRYPT\u201910, vol. LNCS 6110, pp. 573\u2013596. Springer-Verlag, French Riviera France (2010)","DOI":"10.1007\/978-3-642-13190-5_29"},{"key":"117_CR15","unstructured":"Lucks, S.: A collision-resistant rate-1 double-block-length hash function. In: Symmetric Cryptography, number 07021 in Dagstuhl Seminar Proceedings, Dagstuhl, Germany. Internationales Begegnungs \u2013 und Forschungszentrum f\u00fcr Informatik (IBFI), Schloss Dagstuhl Germany (2007)"},{"key":"117_CR16","unstructured":"Menezes, A.J., van Oorschot, P.C., Vanstone, S.A.: Handbook of Applied Cryptography. CRC Press (1997)"},{"key":"117_CR17","doi-asserted-by":"crossref","unstructured":"Merkle, R.C.: One way hash functions and DES. In: Advances in Cryptology - CRYPTO\u201989, vol. LNCS 435, pp. 428\u2013446. Springer-Verlag (1989)","DOI":"10.1007\/0-387-34805-0_40"},{"key":"117_CR18","doi-asserted-by":"crossref","unstructured":"Nandi, M.: Towards optimal double-length hash functions. In: INDOCRYPT\u201905, vol. LNCS 3797, pp. 77\u201389. Springer-Verlag (2005)","DOI":"10.1007\/11596219_7"},{"key":"117_CR19","doi-asserted-by":"crossref","unstructured":"Nandi, M., Lee, W., Sakurai, K., Lee, S.: Security analysis of a 2\/3-rate double length compression function in the black-box model, pp. 243\u2013254. Springer-Verlag (2005)","DOI":"10.1007\/11502760_16"},{"key":"117_CR20","unstructured":"NIST: Third (final) round candidates, 2010. http:\/\/csrc.nist.gov\/groups\/ST\/hash\/sha-3\/Round3\/submissions-rnd3.html http:\/\/csrc.nist.gov\/groups\/ST\/hash\/sha-3\/Round3\/submissions-rnd3.html"},{"key":"117_CR21","doi-asserted-by":"crossref","unstructured":"\u00d6zen, O., Stam, M.: Another glance at double-length hashing. In: Cryptography and Coding, 12th IMA International Conference, Cryptography and Coding 2009, vol. LNCS 5921, pp. 176\u2013201. Springer-Verlag, Berlin (2009)","DOI":"10.1007\/978-3-642-10868-6_11"},{"key":"117_CR22","first-page":"315","volume":"468","author":"T Peyrin","year":"2006","unstructured":"Peyrin, T., Gilbert, H., Muller, F., Robshaw, M.: Combining compression functions and block cipher-based hash functions. In: Advances in Cryptology - ASIACRYPT 2006. 4284 468, 315\u2013331 (2006)","journal-title":"4284"},{"key":"117_CR23","doi-asserted-by":"crossref","unstructured":"Rivest, R.L.: The MD5 message digest algorithm. In: Request for Comments (RFC) 1321 Internet Activities Board Internet Privacy Task Force (1992)","DOI":"10.17487\/rfc1321"},{"key":"117_CR24","first-page":"55","volume":"E82-A(1)","author":"Takashi Satoh","year":"1999","unstructured":"Satoh, Takashi, Haga, Mio, Kurosawa, Kaoru: Towards secure and fast hash functions. IEICE Trans. Fund. Elec. Commun. Comput. Sci. E82-A(1), 55\u201362 (1999)","journal-title":"IEICE Trans. Fund. Elec. Commun. Comput. Sci."},{"key":"117_CR25","doi-asserted-by":"crossref","unstructured":"Stam, M.: Block cipher based hashing revisited. In: Fast Software Encryption 2009, vol. LNCS 5665, pp. 67\u201383. Springer, Berlin (2009)","DOI":"10.1007\/978-3-642-03317-9_5"},{"key":"117_CR26","doi-asserted-by":"crossref","unstructured":"Steinberger, J.P.: The collision intractability of MDC-2 in the ideal-cipher model. In: Advances in Cryptology-Proceedings of EUROCRYPT 2007, volume LNCS 4515 of Lecture Notes in Computer Science, pp. 34\u201351. Springer Verlag, Barcelona, Spain (2007)","DOI":"10.1007\/978-3-540-72540-4_3"},{"key":"117_CR27","doi-asserted-by":"crossref","unstructured":"Wagner, D.: A generalized birthday problem. In: Yung, M. (ed.) CRYPTO 2002, vol LNCS 2442, pp. 288\u2013303. Springer (2002)","DOI":"10.1007\/3-540-45708-9_19"},{"key":"117_CR28","doi-asserted-by":"crossref","unstructured":"Xiaoyun W., Yin, Y.L., Yu, H.: Finding collisions in the full SHA-1. In: Victor Shoup, editor, Advances in Cryptology - CRPTO\u201905, vol LNCS 3621, pp. 17\u201336. Springer-Verlag, Santa Barbara, CA, USA (2005)","DOI":"10.1007\/11535218_2"},{"key":"117_CR29","doi-asserted-by":"crossref","unstructured":"Xiaoyun W., Yu, H.: How to break MD5 and other hash functions. In: Cramer, R. (ed.) Advances in Cryptology - EUROCRYPT\u201905, vol LNCS 3494, pp. 19\u201335. Springer-Verlag, Aarhus, Denmark (2005)","DOI":"10.1007\/11426639_2"}],"container-title":["Cryptography and Communications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12095-014-0117-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s12095-014-0117-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12095-014-0117-2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,17]],"date-time":"2019-08-17T11:41:40Z","timestamp":1566042100000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s12095-014-0117-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,11,13]]},"references-count":29,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2015,9]]}},"alternative-id":["117"],"URL":"https:\/\/doi.org\/10.1007\/s12095-014-0117-2","relation":{},"ISSN":["1936-2447","1936-2455"],"issn-type":[{"value":"1936-2447","type":"print"},{"value":"1936-2455","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014,11,13]]}}}