{"id":"https://openalex.org/W2953402323","doi":"https://doi.org/10.1007/978-3-030-34618-8_2","title":"Decisional Second-Preimage Resistance: When Does SPR Imply PRE?","display_name":"Decisional Second-Preimage Resistance: When Does SPR Imply PRE?","publication_year":2019,"publication_date":"2019-01-01","ids":{"openalex":"https://openalex.org/W2953402323","doi":"https://doi.org/10.1007/978-3-030-34618-8_2","mag":"2953402323"},"language":"en","primary_location":{"id":"doi:10.1007/978-3-030-34618-8_2","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-030-34618-8_2","pdf_url":null,"source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},"type":"book-chapter","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://eprint.iacr.org/2019/492","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5108114375","display_name":"Daniel J. Bernstein","orcid":null},"institutions":[{"id":"https://openalex.org/I39422238","display_name":"University of Illinois Chicago","ror":"https://ror.org/02mpq6x41","country_code":"US","type":"education","lineage":["https://openalex.org/I39422238"]},{"id":"https://openalex.org/I904495901","display_name":"Ruhr University Bochum","ror":"https://ror.org/04tsk2644","country_code":"DE","type":"education","lineage":["https://openalex.org/I904495901"]}],"countries":["DE","US"],"is_corresponding":true,"raw_author_name":"Daniel J. Bernstein","raw_affiliation_strings":["Department of Computer Science, University of Illinois at Chicago, Chicago, IL, 60607-7045, USA","Horst G\u00f6rtz Institute for IT Security, Ruhr University Bochum, Bochum, Germany"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, University of Illinois at Chicago, Chicago, IL, 60607-7045, USA","institution_ids":["https://openalex.org/I39422238"]},{"raw_affiliation_string":"Horst G\u00f6rtz Institute for IT Security, Ruhr University Bochum, Bochum, Germany","institution_ids":["https://openalex.org/I904495901"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5065527777","display_name":"Andreas H\u00fclsing","orcid":"https://orcid.org/0000-0003-2215-4134"},"institutions":[{"id":"https://openalex.org/I83019370","display_name":"Eindhoven University of Technology","ror":"https://ror.org/02c2kyt77","country_code":"NL","type":"education","lineage":["https://openalex.org/I83019370"]}],"countries":["NL"],"is_corresponding":true,"raw_author_name":"Andreas H\u00fclsing","raw_affiliation_strings":["Department of Mathematics and Computer Science, Technische Universiteit Eindhoven, P.O. Box 513, 5600 MB, Eindhoven, The Netherlands"],"affiliations":[{"raw_affiliation_string":"Department of Mathematics and Computer Science, Technische Universiteit Eindhoven, P.O. Box 513, 5600 MB, Eindhoven, The Netherlands","institution_ids":["https://openalex.org/I83019370"]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5065527777","https://openalex.org/A5108114375"],"corresponding_institution_ids":["https://openalex.org/I39422238","https://openalex.org/I83019370","https://openalex.org/I904495901"],"apc_list":{"value":5000,"currency":"EUR","value_usd":5392},"apc_paid":null,"fwci":2.2034,"has_fulltext":false,"cited_by_count":17,"citation_normalized_percentile":{"value":0.90119517,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"33","last_page":"62"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11269","display_name":"Algorithms and Data Compression","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/hash-function","display_name":"Hash function","score":0.8987564444541931},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7007274627685547},{"id":"https://openalex.org/keywords/reduction","display_name":"Reduction (mathematics)","score":0.5291016101837158},{"id":"https://openalex.org/keywords/simple","display_name":"Simple (philosophy)","score":0.49886631965637207},{"id":"https://openalex.org/keywords/interactivity","display_name":"Interactivity","score":0.4355955123901367},{"id":"https://openalex.org/keywords/fraction","display_name":"Fraction (chemistry)","score":0.4355270564556122},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.4254686236381531},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.3614264130592346},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.24069178104400635},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.10998988151550293},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.06627446413040161}],"concepts":[{"id":"https://openalex.org/C99138194","wikidata":"https://www.wikidata.org/wiki/Q183427","display_name":"Hash function","level":2,"score":0.8987564444541931},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7007274627685547},{"id":"https://openalex.org/C111335779","wikidata":"https://www.wikidata.org/wiki/Q3454686","display_name":"Reduction (mathematics)","level":2,"score":0.5291016101837158},{"id":"https://openalex.org/C2780586882","wikidata":"https://www.wikidata.org/wiki/Q7520643","display_name":"Simple (philosophy)","level":2,"score":0.49886631965637207},{"id":"https://openalex.org/C144430266","wikidata":"https://www.wikidata.org/wiki/Q839721","display_name":"Interactivity","level":2,"score":0.4355955123901367},{"id":"https://openalex.org/C149629883","wikidata":"https://www.wikidata.org/wiki/Q660926","display_name":"Fraction (chemistry)","level":2,"score":0.4355270564556122},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.4254686236381531},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.3614264130592346},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.24069178104400635},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.10998988151550293},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.06627446413040161},{"id":"https://openalex.org/C185592680","wikidata":"https://www.wikidata.org/wiki/Q2329","display_name":"Chemistry","level":0,"score":0.0},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0},{"id":"https://openalex.org/C178790620","wikidata":"https://www.wikidata.org/wiki/Q11351","display_name":"Organic chemistry","level":1,"score":0.0},{"id":"https://openalex.org/C111472728","wikidata":"https://www.wikidata.org/wiki/Q9471","display_name":"Epistemology","level":1,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0}],"mesh":[],"locations_count":5,"locations":[{"id":"doi:10.1007/978-3-030-34618-8_2","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-030-34618-8_2","pdf_url":null,"source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},{"id":"pmh:oai:pure.tue.nl:openaire_cris_publications/ccf061ca-df69-4cfd-a6d6-4e15c7be3cd0","is_oa":false,"landing_page_url":"https://research.tue.nl/en/publications/ccf061ca-df69-4cfd-a6d6-4e15c7be3cd0","pdf_url":null,"source":{"id":"https://openalex.org/S4406922641","display_name":"TU/e Research Portal","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Bernstein, D J & H\u00fclsing, A 2019, Decisional second-preimage resistance: when does SPR imply PRE? in S D Galbraith & S Moriai (eds), Advances in Cryptology \u2013 ASIACRYPT 2019 - 25th International Conference on the Theory and Application of Cryptology and Information Security, Proceedings. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 11923 LNCS, Springer, Berlin, pp. 33-62, 25th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2019, Kobe, Japan, 8/12/19. https://doi.org/10.1007/978-3-030-34618-8_2","raw_type":"info:eu-repo/semantics/publishedVersion"},{"id":"pmh:oai:pure.tue.nl:publications/ccf061ca-df69-4cfd-a6d6-4e15c7be3cd0","is_oa":false,"landing_page_url":"http://www.scopus.com/inward/record.url?scp=85077002538&partnerID=8YFLogxK","pdf_url":null,"source":{"id":"https://openalex.org/S4406922641","display_name":"TU/e Research Portal","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Bernstein, D J & H\u00fclsing, A 2019, Decisional second-preimage resistance: when does SPR imply PRE? in S D Galbraith & S Moriai (eds), Advances in Cryptology \u2013 ASIACRYPT 2019 - 25th International Conference on the Theory and Application of Cryptology and Information Security, Proceedings. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 11923 LNCS, Springer, Berlin, pp. 33-62, 25th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2019, Kobe, Japan, 8/12/19. https://doi.org/10.1007/978-3-030-34618-8_2","raw_type":"info:eu-repo/semantics/publishedVersion"},{"id":"pmh:oai:pure.tue.nl:publications/d3a6d8ce-4659-4a03-a64e-1544460c536a","is_oa":true,"landing_page_url":"https://eprint.iacr.org/2019/492","pdf_url":null,"source":{"id":"https://openalex.org/S4406922641","display_name":"TU/e Research Portal","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":""},{"id":"pmh:tue:oai:pure.tue.nl:publications/ccf061ca-df69-4cfd-a6d6-4e15c7be3cd0","is_oa":false,"landing_page_url":"https://research.tue.nl/nl/publications/ccf061ca-df69-4cfd-a6d6-4e15c7be3cd0","pdf_url":null,"source":{"id":"https://openalex.org/S4306401843","display_name":"Data Archiving and Networked Services (DANS)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I1322597698","host_organization_name":"Royal Netherlands Academy of Arts and Sciences","host_organization_lineage":["https://openalex.org/I1322597698"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Advances in Cryptology \u2013 ASIACRYPT 2019 - 25th International Conference on the Theory and Application of Cryptology and Information Security, Proceedings, 33 - 62","raw_type":"info:eu-repo/semantics/conferencepaper"}],"best_oa_location":{"id":"pmh:oai:pure.tue.nl:publications/d3a6d8ce-4659-4a03-a64e-1544460c536a","is_oa":true,"landing_page_url":"https://eprint.iacr.org/2019/492","pdf_url":null,"source":{"id":"https://openalex.org/S4406922641","display_name":"TU/e Research Portal","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":""},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":18,"referenced_works":["https://openalex.org/W115629558","https://openalex.org/W186403072","https://openalex.org/W833451749","https://openalex.org/W1533007301","https://openalex.org/W1566345534","https://openalex.org/W1588301088","https://openalex.org/W1850704191","https://openalex.org/W2005108333","https://openalex.org/W2034681107","https://openalex.org/W2131489800","https://openalex.org/W2139566678","https://openalex.org/W2155690458","https://openalex.org/W2283511499","https://openalex.org/W2294833833","https://openalex.org/W2340541605","https://openalex.org/W2806487405","https://openalex.org/W2890439620","https://openalex.org/W2949176902"],"related_works":["https://openalex.org/W2319020389","https://openalex.org/W2747851897","https://openalex.org/W1975913006","https://openalex.org/W4240086805","https://openalex.org/W1513662110","https://openalex.org/W2063506784","https://openalex.org/W2013411520","https://openalex.org/W2521348551","https://openalex.org/W2162688250","https://openalex.org/W3004636680"],"abstract_inverted_index":null,"counts_by_year":[{"year":2025,"cited_by_count":4},{"year":2024,"cited_by_count":4},{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":3},{"year":2021,"cited_by_count":4},{"year":2019,"cited_by_count":1}],"updated_date":"2026-04-16T08:26:57.006410","created_date":"2025-10-10T00:00:00"}
