{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T19:58:16Z","timestamp":1771703896569,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":18,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540259107","type":"print"},{"value":"9783540320555","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005]]},"DOI":"10.1007\/11426639_1","type":"book-chapter","created":{"date-parts":[[2010,7,14]],"date-time":"2010-07-14T15:02:36Z","timestamp":1279119756000},"page":"1-18","source":"Crossref","is-referenced-by-count":220,"title":["Cryptanalysis of the Hash Functions MD4 and RIPEMD"],"prefix":"10.1007","author":[{"given":"Xiaoyun","family":"Wang","sequence":"first","affiliation":[]},{"given":"Xuejia","family":"Lai","sequence":"additional","affiliation":[]},{"given":"Dengguo","family":"Feng","sequence":"additional","affiliation":[]},{"given":"Hui","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Xiuyuan","family":"Yu","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"1_CR1","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4613-9314-6","volume-title":"Differential Cryptanalysis of the Data Encryption Standard","author":"E. Biham","year":"1993","unstructured":"Biham, E., Shamir, A.: Differential Cryptanalysis of the Data Encryption Standard. Springer, Heidelberg (1993)"},{"key":"1_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"290","DOI":"10.1007\/978-3-540-28628-8_18","volume-title":"Advances in Cryptology \u2013 CRYPTO 2004","author":"E. Biham","year":"2004","unstructured":"Biham, E., Chen, R.: Near collision for SHA-0. In: Franklin, M. (ed.) CRYPTO 2004. LNCS, vol.\u00a03152, pp. 290\u2013305. Springer, Heidelberg (2004)"},{"key":"1_CR3","series-title":"Lecture Notes in Computer Science","first-page":"293","volume-title":"Advances in Cryptology - EUROCRYPT \u201993","author":"B. Boer den","year":"1993","unstructured":"den Boer, B., Bosselaers, A.: Collisions for the compression function of MD5. In: Helleseth, T. (ed.) EUROCRYPT 1993. LNCS, vol.\u00a0765, pp. 293\u2013304. Springer, Heidelberg (1993)"},{"key":"1_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"56","DOI":"10.1007\/BFb0055720","volume-title":"Advances in Cryptology - CRYPTO \u201998","author":"F. Chabaud","year":"1998","unstructured":"Chabaud, F., Joux, A.: Differential Collisions in SHA-0. In: Krawczyk, H. (ed.) CRYPTO 1998. LNCS, vol.\u00a01462, p. 56. Springer, Heidelberg (1998)"},{"key":"1_CR5","series-title":"Lecture Notes in Computer Science","volume-title":"Fast Software Encryption","author":"H. Dobbertin","year":"1996","unstructured":"Dobbertin, H.: Cryptanalysis of MD4. In: Gollmann, D. (ed.) FSE 1996. LNCS, vol.\u00a01039. Springer, Heidelberg (1996)"},{"key":"1_CR6","unstructured":"Dobbertin, H.: Cryptanaltysis of MD5 Compress. Presented at the Rump Session of Eurocrypt 1996"},{"key":"1_CR7","doi-asserted-by":"publisher","first-page":"51","DOI":"10.1007\/s001459900019","volume":"10","author":"H. Dobbertin","year":"1997","unstructured":"Dobbertin, H.: RIPEMD with Two Round Compress Function Is Not Collision-Free. Journal of Cryptology\u00a010, 51\u201369 (1997)","journal-title":"Journal of Cryptology"},{"key":"1_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"284","DOI":"10.1007\/3-540-69710-1_19","volume-title":"Fast Software Encryption","author":"H. Dobbertin","year":"1998","unstructured":"Dobbertin, H.: The First Two Rounds of MD4 are Not One-Way. In: Vaudenay, S. (ed.) FSE 1998. LNCS, vol.\u00a01372, p. 284. Springer, Heidelberg (1998)"},{"key":"1_CR9","series-title":"Lecture Notes in Computer Science","volume-title":"Fast Software Encryption","author":"H. Dobbertin","year":"1996","unstructured":"Dobbertin, H., Bosselaers, A., Preneel, B.: RIPMEMD-160:A Strengthened Version of RIPMMD. In: Gollmann, D. (ed.) FSE 1996. LNCS, vol.\u00a01039, Springer, Heidelberg (1996)"},{"key":"1_CR10","unstructured":"FIPS 180-1, Secure hash standard, NIST, Washington D.C, April 1995. US Department of Commerce. Springer, Heidelberg (1996)"},{"key":"1_CR11","unstructured":"FIPS 180-2, Secure Hash Standard (2002), http:\/\/csrc.nist.gov\/publications\/"},{"key":"1_CR12","unstructured":"Joux, A.: Collisions for SHA-0. Rump Session of CRYPTO 2004 (2004)"},{"key":"1_CR13","series-title":"Lecture Notes in Computer Science","volume-title":"Integrity Primitives for Secure Information Systems","year":"1995","unstructured":"Bosselaers, A., Preneel, B. (eds.): RIPE 1992. LNCS, vol.\u00a01007. Springer, Heidelberg (1995)"},{"key":"1_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"303","DOI":"10.1007\/3-540-38424-3_22","volume-title":"Advances in Cryptology - CRYPTO \u201990","author":"R.L. Rivest","year":"1991","unstructured":"Rivest, R.L.: The MD4 message digest algorithm. In: Menezes, A., Vanstone, S.A. (eds.) CRYPTO 1990. LNCS, vol.\u00a0537, pp. 303\u2013311. Springer, Heidelberg (1991)"},{"key":"1_CR15","doi-asserted-by":"crossref","unstructured":"Rivest, R.L.: The MD5 Message-Digest Algorithm, Request for Comments (RFC 1320), Internet Activities Board, Internet Privacy Task Force (April 1992)","DOI":"10.17487\/rfc1321"},{"key":"1_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"228","DOI":"10.1007\/978-3-540-40061-5_14","volume-title":"Advances in Cryptology - ASIACRYPT 2003","author":"B. Rompay Van","year":"2003","unstructured":"Van Rompay, B., Biryukov, A., Preneel, B., Vandewalle, J.: Cryptanalysis of 3-pass HAVAL. In: Laih, C.-S. (ed.) ASIACRYPT 2003. LNCS, vol.\u00a02894, pp. 228\u2013245. Springer, Heidelberg (2003)"},{"key":"1_CR17","unstructured":"Wang, X.Y., Guo, F.D., Lai, X.J., Yu, H.B.: Collisions for Hash Functions MD4, MD5, HAVAL-128 and RIPEMD. Rump Session of Crypto 2004, E-print (2004)"},{"key":"1_CR18","series-title":"Lecture Notes in Computer Science","first-page":"83","volume-title":"Advances in Cryptology - AUSCRYPT \u201992","author":"Y. Zheng","year":"1992","unstructured":"Zheng, Y., Pieprzyk, J., Seberry, J.: HAVAL\u2013A One-way Hashing Algorithm with Variable Length of Output. In: Zheng, Y., Seberry, J. (eds.) AUSCRYPT 1992. LNCS, vol.\u00a0718, pp. 83\u2013104. Springer, Heidelberg (1992)"}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2013 EUROCRYPT 2005"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11426639_1.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,17]],"date-time":"2020-11-17T19:55:30Z","timestamp":1605642930000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11426639_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005]]},"ISBN":["9783540259107","9783540320555"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/11426639_1","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2005]]}}}