{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,6,19]],"date-time":"2022-06-19T06:40:32Z","timestamp":1655620832863},"reference-count":27,"publisher":"Informa UK Limited","issue":"6","content-domain":{"domain":["www.tandfonline.com"],"crossmark-restriction":true},"short-container-title":["Cryptologia"],"published-print":{"date-parts":[[2016,11]]},"DOI":"10.1080\/01611194.2015.1135486","type":"journal-article","created":{"date-parts":[[2016,4,27]],"date-time":"2016-04-27T20:37:20Z","timestamp":1461789440000},"page":"522-540","update-policy":"http:\/\/dx.doi.org\/10.1080\/tandf_crossmark_01","source":"Crossref","is-referenced-by-count":0,"title":["A new and fast cryptographic hash function based on RC4"],"prefix":"10.1080","volume":"40","author":[{"given":"Qian","family":"Yu","sequence":"first","affiliation":[]},{"given":"Chang N.","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"301","published-online":{"date-parts":[[2016,4,27]]},"reference":[{"key":"CIT0001","author":"AlFardan N.","year":"2013","journal-title":"Proc. USENIX Security Symposium 2013"},{"key":"CIT0002","doi-asserted-by":"publisher","DOI":"10.1515\/jmc.2008.012."},{"key":"CIT0003","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-24676-3_24"},{"key":"CIT0004","doi-asserted-by":"publisher","DOI":"10.1007\/bfb0055720"},{"key":"CIT0005","doi-asserted-by":"publisher","DOI":"10.1007\/11941378_7"},{"key":"CIT0006","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-15317-4_6"},{"key":"CIT0010","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-44706-7_2"},{"key":"CIT0011","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45537-x_1"},{"key":"CIT0012","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-69053-0_16"},{"key":"CIT0015","unstructured":"IEEE 802.11\u20131999. 1999. Wireless LAN medium access control (MAC) and physical layer (PHY) specifications."},{"key":"CIT0016","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-85886-7_25"},{"key":"CIT0017","doi-asserted-by":"publisher","DOI":"10.1145\/1031495.1031515"},{"key":"CIT0018","doi-asserted-by":"publisher","DOI":"10.1007\/11426639_28"},{"key":"CIT0019","doi-asserted-by":"publisher","DOI":"10.1007\/11593447_26"},{"key":"CIT0021","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45473-x_13"},{"key":"CIT0022","author":"Mathy V.","year":"2015","journal-title":"Proc. USENIX Security Symposium 2015"},{"key":"CIT0023","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-03317-9_3"},{"key":"CIT0024","doi-asserted-by":"publisher","DOI":"10.1007\/BF00193563"},{"key":"CIT0025","doi-asserted-by":"publisher","DOI":"10.1145\/1023756.1023777"},{"key":"CIT0027","doi-asserted-by":"publisher","DOI":"10.1007\/s10623-008-9177-7"},{"key":"CIT0026","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-25937-4_16"},{"key":"CIT0029","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-19574-7_5"},{"key":"CIT0030","volume-title":"Cryptography and network security, principles and practice","author":"Stallings W.","year":"2011","edition":"5"},{"key":"CIT0031","doi-asserted-by":"crossref","DOI":"10.1201\/9781420057133","volume-title":"Cryptography: Theory and practice","author":"Stinson D. R.","year":"2005","edition":"3"},{"key":"CIT0035","doi-asserted-by":"publisher","DOI":"10.1007\/11535218_1"},{"key":"CIT0034","doi-asserted-by":"publisher","DOI":"10.1007\/11535218_2"},{"key":"CIT0036","doi-asserted-by":"publisher","DOI":"10.1002\/sec.140"}],"container-title":["Cryptologia"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/www.tandfonline.com\/doi\/pdf\/10.1080\/01611194.2015.1135486","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,18]],"date-time":"2022-06-18T22:37:11Z","timestamp":1655591831000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.tandfonline.com\/doi\/full\/10.1080\/01611194.2015.1135486"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,4,27]]},"references-count":27,"journal-issue":{"issue":"6","published-online":{"date-parts":[[2016,11,8]]},"published-print":{"date-parts":[[2016,11]]}},"alternative-id":["10.1080\/01611194.2015.1135486"],"URL":"https:\/\/doi.org\/10.1080\/01611194.2015.1135486","relation":{},"ISSN":["0161-1194","1558-1586"],"issn-type":[{"value":"0161-1194","type":"print"},{"value":"1558-1586","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,4,27]]},"assertion":[{"value":"The publishing and review policy for this title is described in its Aims & Scope.","order":1,"name":"peerreview_statement","label":"Peer Review Statement"},{"value":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=ucry20","URL":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=ucry20","order":2,"name":"aims_and_scope_url","label":"Aim & Scope"}]}}