{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T04:55:37Z","timestamp":1725425737704},"reference-count":14,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008,8]]},"DOI":"10.1109\/icecs.2008.4675001","type":"proceedings-article","created":{"date-parts":[[2008,11,25]],"date-time":"2008-11-25T15:45:25Z","timestamp":1227627925000},"page":"906-909","source":"Crossref","is-referenced-by-count":3,"title":["Efficiency and pseudo-randomness of a variant of Z&amp;#x00E9;mor-Tillich hash function"],"prefix":"10.1109","author":[{"given":"Christophe","family":"Petit","sequence":"first","affiliation":[]},{"given":"Nicolas","family":"Veyrat-Charvillon","sequence":"additional","affiliation":[]},{"given":"Jean-Jacques","family":"Quisquater","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"13","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-69710-1_7"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-60865-6_42"},{"key":"11","first-page":"322","article-title":"attacking the sl2 hashing scheme","author":"chames","year":"1995","journal-title":"ASIACRYPT '94 Proceedings of the 4th International Conference on the Theory and Applications of Cryptology"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-44598-6_18"},{"key":"3","article-title":"provably secure fft hashing","author":"lyubashevsky","year":"2006","journal-title":"NIST 2nd Cryptogaphic Hash Workshop"},{"year":"0","key":"2"},{"year":"0","key":"1"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-85855-3_18"},{"year":"0","author":"dieharder","key":"7"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48658-5_5"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-007-9002-x"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1007\/11761679_11"},{"key":"9","article-title":"collisions for the lps expander graph hash function","author":"ze?mor","year":"2008","journal-title":"Advances in Cryptology Proc Of EUROCRYPT"},{"year":"0","key":"8"}],"event":{"name":"2008 15th IEEE International Conference on Electronics, Circuits and Systems - (ICECS 2008)","start":{"date-parts":[[2008,8,31]]},"location":"St. Julien's, Malta","end":{"date-parts":[[2008,9,3]]}},"container-title":["2008 15th IEEE International Conference on Electronics, Circuits and Systems"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4664823\/4674773\/04675001.pdf?arnumber=4675001","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,10,14]],"date-time":"2020-10-14T14:49:12Z","timestamp":1602686952000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/4675001"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,8]]},"references-count":14,"URL":"https:\/\/doi.org\/10.1109\/icecs.2008.4675001","relation":{},"subject":[],"published":{"date-parts":[[2008,8]]}}}