{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,18]],"date-time":"2026-03-18T18:29:19Z","timestamp":1773858559133,"version":"3.50.1"},"reference-count":35,"publisher":"Elsevier BV","issue":"5","license":[{"start":{"date-parts":[[1992,9,1]],"date-time":"1992-09-01T00:00:00Z","timestamp":715305600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Computers &amp; Security"],"published-print":{"date-parts":[[1992,9]]},"DOI":"10.1016\/0167-4048(92)90007-e","type":"journal-article","created":{"date-parts":[[2003,10,17]],"date-time":"2003-10-17T13:42:29Z","timestamp":1066398149000},"page":"427-437","source":"Crossref","is-referenced-by-count":8,"title":["Requirements for cryptographic hash functions"],"prefix":"10.1016","volume":"11","author":[{"given":"Fritz","family":"Bauspiess","sequence":"first","affiliation":[]},{"given":"Frank","family":"Damm","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/0167-4048(92)90007-E_BIB1","series-title":"Tagungsband zur Datasafe'91, 2. Internationale Fachmesse and Kongress f\u00fcr Datensicherheit","first-page":"189","article-title":"Hashfunktionen in der Praxis der Datensicherung","author":"B\u00fcrk","year":"1991"},{"key":"10.1016\/0167-4048(92)90007-E_BIB2","series-title":"Advances in Cryptology \u2014 Proceedings of CRYPTO '85","first-page":"14","article-title":"Another Birthday Attack","author":"Coppersmith","year":"1986"},{"key":"10.1016\/0167-4048(92)90007-E_BIB3","unstructured":"D. Coppersmith: Analysis of ISO\/CCITT Document X509 Annex D, ISO\/IEC JTC1\/SC27\/WG20.2 Paper N160."},{"key":"10.1016\/0167-4048(92)90007-E_BIB4","series-title":"Advances in Cryptology \u2014 Proceedings of CRYPTO '89","first-page":"416","article-title":"A design Principle for Hash Functions","author":"Damgard","year":"1989"},{"key":"10.1016\/0167-4048(92)90007-E_BIB5","series-title":"5th International Conference on Computer Communication","first-page":"525","article-title":"The Application of Digital Signatures Based on Public Key Cryptosystems","author":"Davies","year":"1980"},{"key":"10.1016\/0167-4048(92)90007-E_BIB6","doi-asserted-by":"crossref","first-page":"27","DOI":"10.1109\/MC.1983.1654296","article-title":"Protecting Public Keys and Signature Keys","volume":"16","author":"Denning","year":"1983","journal-title":"IEEE Computer"},{"key":"10.1016\/0167-4048(92)90007-E_BIB7","doi-asserted-by":"crossref","first-page":"388","DOI":"10.1145\/358027.358052","article-title":"Digital Signatures with RSA and Other Public-Key Crypto systems","volume":"27","author":"Denning","year":"1984","journal-title":"Communications of the ACM"},{"key":"10.1016\/0167-4048(92)90007-E_BIB8","doi-asserted-by":"crossref","first-page":"644","DOI":"10.1109\/TIT.1976.1055638","article-title":"New Directions in Cryptography","volume":"22","author":"Diffie","year":"1976","journal-title":"Transactions on Information Theory"},{"key":"10.1016\/0167-4048(92)90007-E_BIB9","article-title":"Banking \u2014 Approved Algorithms for Message Authentication \u2014 Part 1","author":"International Organization for Standardization","year":"1987","journal-title":"DEA, International Standard ISO 8731-1"},{"key":"10.1016\/0167-4048(92)90007-E_BIB10","article-title":"Hash Functions for Digital Signatures, Part 1: General","author":"International Organization for Standardization","year":"1990","journal-title":"ISO Draft Proposal CD 10118-1"},{"key":"10.1016\/0167-4048(92)90007-E_BIB11","first-page":"1100","article-title":"The Construction of Collision Messages for Hash Functions","author":"Iwata","year":"1990","journal-title":"The Transactions of the IEICE E73"},{"key":"10.1016\/0167-4048(92)90007-E_BIB12","series-title":"Advances in Cryptology \u2014Proceedings of CRYPTO '86","first-page":"327","article-title":"A High Speed Manipulation Detection Code","author":"Jueneman","year":"1987"},{"key":"10.1016\/0167-4048(92)90007-E_BIB13","doi-asserted-by":"crossref","first-page":"17","DOI":"10.1109\/MNET.1987.6434187","article-title":"Electronic Document Authentication","volume":"1","author":"Jueneman","year":"1987","journal-title":"IEEE Network Magazine"},{"key":"10.1016\/0167-4048(92)90007-E_BIB14","doi-asserted-by":"crossref","unstructured":"R. R. Jueneman, S.M.Matyas, C.H.Meyer: Message Authentication with Manipulation Detection Codes, Proceedings of the IEEE 1983 Symposium on Security and Privacy, 33\u201354.","DOI":"10.1109\/SP.1983.10005"},{"key":"10.1016\/0167-4048(92)90007-E_BIB15","doi-asserted-by":"crossref","first-page":"29","DOI":"10.1109\/MCOM.1985.1092643","article-title":"Message Authentication","volume":"23","author":".Jueneman","year":"1985","journal-title":"IEEE Communications Magazine"},{"key":"10.1016\/0167-4048(92)90007-E_BIB16","article-title":"The Strength of the CCITT\/ISO Hash Function","author":"Jung","year":"1990"},{"key":"10.1016\/0167-4048(92)90007-E_BIB17","author":"Knuth","year":"1973"},{"key":"10.1016\/0167-4048(92)90007-E_BIB18","series-title":"Advances in Cryptology \u2014 Proceedings of CRYPTO '89","first-page":"428","article-title":"One Way Hash Functions and DES","author":"Merkle","year":"1989"},{"key":"10.1016\/0167-4048(92)90007-E_BIB19","doi-asserted-by":"crossref","first-page":"43","DOI":"10.1007\/BF00203968","article-title":"A Fast Software One-Way Hash Function","volume":"3","author":"Merkle","year":"1990","journal-title":"Journal of Cryptology"},{"key":"10.1016\/0167-4048(92)90007-E_BIB20","series-title":"Advances in Cryptology \u2014 Proceedings of EUROCRYPT'90","first-page":"326","article-title":"Confirmation that Some Hash Functions Are Not Collision Free","author":"Miyaguchi","year":"1991"},{"key":"10.1016\/0167-4048(92)90007-E_BIB21","first-page":"128","article-title":"128-bit Hash Function (N-Hash)","volume":"2","author":"Miyaguchi","year":"1990","journal-title":"NTT Review"},{"key":"10.1016\/0167-4048(92)90007-E_BIB22","doi-asserted-by":"crossref","first-page":"257","DOI":"10.1080\/0161-118391857982","article-title":"DES Generated Checksums for Electronic Signatures","volume":"7","author":"M\u00fcller-Schloer","year":"1983","journal-title":"Cryptologia"},{"key":"10.1016\/0167-4048(92)90007-E_BIB23","series-title":"Proceedings 21st ACM Symposium on Theory of Computing (STOC)","first-page":"33","article-title":"Universal One-Way Hash Functions and their Cryptographic Applications","author":"Naor","year":"1989"},{"key":"10.1016\/0167-4048(92)90007-E_BIB24","first-page":"42980","article-title":"Proposed Federal Information Processing Standard \u2014 Digital Signature Standard","volume":"56","author":"National Institute of Standards and Technology","year":"1991","journal-title":"Federal Register"},{"key":"10.1016\/0167-4048(92)90007-E_BIB25","article-title":"Proposed Federal Information Processing Standard \u2014 Secure Hash Standard","author":"National Institute of Standards and Technology","year":"1992","journal-title":"Federal Register"},{"key":"10.1016\/0167-4048(92)90007-E_BIB26","series-title":"Advances in Cryptology \u2014 Proceedings of EUROCRYPT'89","first-page":"102","article-title":"2n-Bit Hash-Functions Using n-bit Symmetric Block Cipher Algorithms","author":"Quisquater","year":"1990"},{"key":"10.1016\/0167-4048(92)90007-E_BIB27","series-title":"presented at CRYPTO'91","article-title":"The MD5 Message Digest Algorithm","author":"Rivest","year":"1991"},{"key":"10.1016\/0167-4048(92)90007-E_BIB28","doi-asserted-by":"crossref","first-page":"120","DOI":"10.1145\/359340.359342","article-title":"A Method for Obtaining Digital Signatures and Public-Key Cryptosystems","volume":"21","author":"Rivest","year":"1978","journal-title":"Communications of the ACM"},{"key":"10.1016\/0167-4048(92)90007-E_BIB29","series-title":"Advances in Cryptology \u2014 Proceedings of CRYPTO '90","first-page":"303","article-title":"The MD4 Message Digest Algorithm","author":"Rivest","year":"1991"},{"key":"10.1016\/0167-4048(92)90007-E_BIB30","unstructured":"C.P. Schnorr: An Efficient Cryptographic Hash Function, presented at CRYPTO'91 (rump session)."},{"key":"10.1016\/0167-4048(92)90007-E_BIB31","series-title":"Advances in Cryptology \u2014 Proceedings of CRYPTO '83","first-page":"203","article-title":"Producing a One-Way Hash Function from DES","author":"Winternitz","year":"1984"},{"key":"10.1016\/0167-4048(92)90007-E_BIB32","doi-asserted-by":"crossref","unstructured":"Wint84 R.S. Winternitz: A Secure One-Way Hash Function Built from DES, Proceedings of the IEEE 1984 Symposium on Security and Privacy, 88\u201390","DOI":"10.1109\/SP.1984.10027"},{"key":"10.1016\/0167-4048(92)90007-E_BIB33","series-title":"Proceedings of the IEEE Symposium on Information Theory","first-page":"177","article-title":"A Fast Signature Scheme Without Secret Key","author":"Zemor","year":"1991"},{"key":"10.1016\/0167-4048(92)90007-E_BIB34","article-title":"Hash Functions and Cayley Graphs","author":"Zemor","year":"1991","journal-title":"Journal of Design, Codes and Cryptography"},{"key":"10.1016\/0167-4048(92)90007-E_BIB35","series-title":"Advances in Cryptology \u2014 Proceedings of CRYPTO '90","first-page":"285","article-title":"Structural Properties of One-Way Hash Functions","author":"Zheng","year":"1991"}],"container-title":["Computers &amp; Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:016740489290007E?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:016740489290007E?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2019,2,19]],"date-time":"2019-02-19T10:20:37Z","timestamp":1550571637000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/016740489290007E"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1992,9]]},"references-count":35,"journal-issue":{"issue":"5","published-print":{"date-parts":[[1992,9]]}},"alternative-id":["016740489290007E"],"URL":"https:\/\/doi.org\/10.1016\/0167-4048(92)90007-e","relation":{},"ISSN":["0167-4048"],"issn-type":[{"value":"0167-4048","type":"print"}],"subject":[],"published":{"date-parts":[[1992,9]]}}}