{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T19:02:21Z","timestamp":1725476541732},"reference-count":8,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,9]]},"DOI":"10.1109\/idaacs.2013.6663007","type":"proceedings-article","created":{"date-parts":[[2013,11,27]],"date-time":"2013-11-27T16:53:59Z","timestamp":1385571239000},"page":"661-664","source":"Crossref","is-referenced-by-count":0,"title":["Methods of generic attacks infeasibility increasing for hash functions"],"prefix":"10.1109","author":[{"given":"Volodymyr","family":"Luzhetsky","sequence":"first","affiliation":[]},{"given":"Yurii","family":"Baryshev","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"3","first-page":"18","author":"kelsey","year":"2005","journal-title":"Herding Hash Functions and the Nostradamus Attack"},{"key":"2","first-page":"30","article-title":"Cryptanalysis of a class of cryptographic hash functions","author":"gauravaram","year":"2007","journal-title":"Cryptology ePrint Archive"},{"key":"1","first-page":"448","author":"petrov","year":"2000","journal-title":"The Computer Security Cryptographic Proctection Methods"},{"key":"7","first-page":"22","article-title":"Design principles for iterated hash functions","author":"lucks","year":"2004","journal-title":"Cryptology ePrint Archive"},{"key":"6","first-page":"13","author":"hirose","year":"2006","journal-title":"Some Plausible Constructions of Double-block-length Hash Functions"},{"key":"5","first-page":"9","author":"biham","year":"2007","journal-title":"A Framework for Iterative Hash Functions"},{"key":"4","first-page":"13","author":"hoch","year":"2006","journal-title":"Breaking the ICE-finding Multicollisions in Iterative Concatenated and Expanded (ICE) Hash Functions"},{"key":"8","first-page":"22","author":"bertoni","year":"2007","journal-title":"Sponge Functions"}],"event":{"name":"2013 IEEE 7th International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS)","start":{"date-parts":[[2013,9,12]]},"location":"Berlin, Germany","end":{"date-parts":[[2013,9,14]]}},"container-title":["2013 IEEE 7th International Conference on Intelligent Data Acquisition and Advanced Computing Systems (IDAACS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6653329\/6662970\/06663007.pdf?arnumber=6663007","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,22]],"date-time":"2017-03-22T21:17:19Z","timestamp":1490217439000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6663007\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,9]]},"references-count":8,"URL":"https:\/\/doi.org\/10.1109\/idaacs.2013.6663007","relation":{},"subject":[],"published":{"date-parts":[[2013,9]]}}}