{"id":"https://openalex.org/W129220271","doi":"https://doi.org/10.1007/978-3-319-13257-0_6","title":"(Pseudo-) Preimage Attacks on Step-Reduced HAS-160 and RIPEMD-160","display_name":"(Pseudo-) Preimage Attacks on Step-Reduced HAS-160 and RIPEMD-160","publication_year":2014,"publication_date":"2014-01-01","ids":{"openalex":"https://openalex.org/W129220271","doi":"https://doi.org/10.1007/978-3-319-13257-0_6","mag":"129220271"},"language":"en","primary_location":{"id":"doi:10.1007/978-3-319-13257-0_6","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-319-13257-0_6","pdf_url":null,"source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},"type":"book-chapter","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5068633811","display_name":"Gaoli Wang","orcid":"https://orcid.org/0000-0002-2121-9306"},"institutions":[{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]},{"id":"https://openalex.org/I181326427","display_name":"Donghua University","ror":"https://ror.org/035psfh38","country_code":"CN","type":"education","lineage":["https://openalex.org/I181326427"]},{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Gaoli Wang","raw_affiliation_strings":["School of Computer Science and Technology, Donghua University, Shanghai, 201620, China","State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China","School of Computer Science and Technology, Donghua University, Shanghai, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Technology, Donghua University, Shanghai, 201620, China","institution_ids":["https://openalex.org/I181326427"]},{"raw_affiliation_string":"State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]},{"raw_affiliation_string":"School of Computer Science and Technology, Donghua University, Shanghai, China","institution_ids":["https://openalex.org/I181326427"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5052991442","display_name":"Yanzhao Shen","orcid":"https://orcid.org/0000-0003-2657-3723"},"institutions":[{"id":"https://openalex.org/I154099455","display_name":"Shandong University","ror":"https://ror.org/0207yh398","country_code":"CN","type":"education","lineage":["https://openalex.org/I154099455"]},{"id":"https://openalex.org/I4210132990","display_name":"State Key Laboratory of Cryptology","ror":"https://ror.org/02pn5rj08","country_code":"CN","type":"government","lineage":["https://openalex.org/I4210132990"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yanzhao Shen","raw_affiliation_strings":["Key Laboratory of Cryptologic Technology and Information Security, Ministry of Education, Shandong University, Jinan, 250100, China","School of Mathematics, Shandong University, Jinan, 250100, China","School of Mathematics, Shandong University, Jinan, China","Key Laboratory of Cryptologic Technology and Information Security, Ministry of Education, Shandong University, Jinan, China"],"affiliations":[{"raw_affiliation_string":"Key Laboratory of Cryptologic Technology and Information Security, Ministry of Education, Shandong University, Jinan, 250100, China","institution_ids":["https://openalex.org/I154099455"]},{"raw_affiliation_string":"School of Mathematics, Shandong University, Jinan, 250100, China","institution_ids":["https://openalex.org/I154099455"]},{"raw_affiliation_string":"School of Mathematics, Shandong University, Jinan, China","institution_ids":["https://openalex.org/I154099455"]},{"raw_affiliation_string":"Key Laboratory of Cryptologic Technology and Information Security, Ministry of Education, Shandong University, Jinan, China","institution_ids":["https://openalex.org/I4210132990","https://openalex.org/I154099455"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5068633811"],"corresponding_institution_ids":["https://openalex.org/I181326427","https://openalex.org/I19820366","https://openalex.org/I4210156404"],"apc_list":{"value":5000,"currency":"EUR","value_usd":5392},"apc_paid":null,"fwci":0.3624,"has_fulltext":false,"cited_by_count":4,"citation_normalized_percentile":{"value":0.5831194,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"90","last_page":"103"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9972000122070312,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11130","display_name":"Coding theory and cryptography","score":0.9864000082015991,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/hash-function","display_name":"Hash function","score":0.8357284069061279},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8085039258003235},{"id":"https://openalex.org/keywords/collision-attack","display_name":"Collision attack","score":0.7592909336090088},{"id":"https://openalex.org/keywords/padding","display_name":"Padding","score":0.7118983864784241},{"id":"https://openalex.org/keywords/sha-2","display_name":"SHA-2","score":0.5322093367576599},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.4541369080543518},{"id":"https://openalex.org/keywords/cryptographic-hash-function","display_name":"Cryptographic hash function","score":0.4352068305015564},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.37717723846435547},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.18385064601898193},{"id":"https://openalex.org/keywords/double-hashing","display_name":"Double hashing","score":0.11786165833473206}],"concepts":[{"id":"https://openalex.org/C99138194","wikidata":"https://www.wikidata.org/wiki/Q183427","display_name":"Hash function","level":2,"score":0.8357284069061279},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8085039258003235},{"id":"https://openalex.org/C87538441","wikidata":"https://www.wikidata.org/wiki/Q389463","display_name":"Collision attack","level":5,"score":0.7592909336090088},{"id":"https://openalex.org/C165435473","wikidata":"https://www.wikidata.org/wiki/Q1509884","display_name":"Padding","level":2,"score":0.7118983864784241},{"id":"https://openalex.org/C190157925","wikidata":"https://www.wikidata.org/wiki/Q1968605","display_name":"SHA-2","level":4,"score":0.5322093367576599},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.4541369080543518},{"id":"https://openalex.org/C7608002","wikidata":"https://www.wikidata.org/wiki/Q477202","display_name":"Cryptographic hash function","level":3,"score":0.4352068305015564},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.37717723846435547},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.18385064601898193},{"id":"https://openalex.org/C138111711","wikidata":"https://www.wikidata.org/wiki/Q478351","display_name":"Double hashing","level":4,"score":0.11786165833473206}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1007/978-3-319-13257-0_6","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-319-13257-0_6","pdf_url":null,"source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/17","score":0.5299999713897705,"display_name":"Partnerships for the goals"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":39,"referenced_works":["https://openalex.org/W40508436","https://openalex.org/W123028503","https://openalex.org/W156288296","https://openalex.org/W174467016","https://openalex.org/W218666475","https://openalex.org/W1484795761","https://openalex.org/W1493937689","https://openalex.org/W1511374591","https://openalex.org/W1528559652","https://openalex.org/W1530387410","https://openalex.org/W1549518467","https://openalex.org/W1550579237","https://openalex.org/W1551023902","https://openalex.org/W1590269592","https://openalex.org/W1656731780","https://openalex.org/W1660562555","https://openalex.org/W1814882979","https://openalex.org/W1991374982","https://openalex.org/W2103239853","https://openalex.org/W2104633167","https://openalex.org/W2109766996","https://openalex.org/W2118019590","https://openalex.org/W2130238828","https://openalex.org/W2153971105","https://openalex.org/W2168589319","https://openalex.org/W2217700236","https://openalex.org/W2481668047","https://openalex.org/W2484213883","https://openalex.org/W2490195800","https://openalex.org/W2490262601","https://openalex.org/W2493058093","https://openalex.org/W2494159333","https://openalex.org/W2495889793","https://openalex.org/W2497768360","https://openalex.org/W2501159044","https://openalex.org/W2520203288","https://openalex.org/W2520231595","https://openalex.org/W3161634850","https://openalex.org/W4285719527"],"related_works":["https://openalex.org/W2583234487","https://openalex.org/W1536929968","https://openalex.org/W2356887643","https://openalex.org/W3161956247","https://openalex.org/W2189320722","https://openalex.org/W2098792112","https://openalex.org/W2168552221","https://openalex.org/W1487949331","https://openalex.org/W2157568185","https://openalex.org/W2592265699"],"abstract_inverted_index":null,"counts_by_year":[{"year":2023,"cited_by_count":2},{"year":2020,"cited_by_count":1},{"year":2017,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
