{"id":"https://openalex.org/W2293640807","doi":"https://doi.org/10.1007/978-3-319-21398-9_52","title":"A New Non-Merkle-Damg\u00e5rd Structural Hash Function with Provable Security","display_name":"A New Non-Merkle-Damg\u00e5rd Structural Hash Function with Provable Security","publication_year":2015,"publication_date":"2015-01-01","ids":{"openalex":"https://openalex.org/W2293640807","doi":"https://doi.org/10.1007/978-3-319-21398-9_52","mag":"2293640807"},"language":"en","primary_location":{"id":"doi:10.1007/978-3-319-21398-9_52","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-319-21398-9_52","pdf_url":null,"source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},"type":"book-chapter","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5084716692","display_name":"Shenghui Su","orcid":"https://orcid.org/0000-0001-7736-2884"},"institutions":[{"id":"https://openalex.org/I37796252","display_name":"Beijing University of Technology","ror":"https://ror.org/037b1pp87","country_code":"CN","type":"education","lineage":["https://openalex.org/I37796252"]},{"id":"https://openalex.org/I78978612","display_name":"Yangzhou University","ror":"https://ror.org/03tqb8s11","country_code":"CN","type":"education","lineage":["https://openalex.org/I78978612"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Shenghui Su","raw_affiliation_strings":["College of Information Engineering, Yangzhou University, Yangzhou, 225009, People\u2019s Republic of China","Laboratory of Trusted Computing, Beijing University of Technology, Beijing, 100124, People\u2019s Republic of China","Laboratory of Trusted Computing, Beijing University of Technology, Beijing, 100124, People's Republic of China"],"affiliations":[{"raw_affiliation_string":"College of Information Engineering, Yangzhou University, Yangzhou, 225009, People\u2019s Republic of China","institution_ids":["https://openalex.org/I78978612"]},{"raw_affiliation_string":"Laboratory of Trusted Computing, Beijing University of Technology, Beijing, 100124, People\u2019s Republic of China","institution_ids":["https://openalex.org/I37796252"]},{"raw_affiliation_string":"Laboratory of Trusted Computing, Beijing University of Technology, Beijing, 100124, People's Republic of China","institution_ids":["https://openalex.org/I37796252"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101404073","display_name":"Tao Xie","orcid":"https://orcid.org/0000-0002-7842-5063"},"institutions":[{"id":"https://openalex.org/I170215575","display_name":"National University of Defense Technology","ror":"https://ror.org/05d2yfz11","country_code":"CN","type":"education","lineage":["https://openalex.org/I170215575"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Tao Xie","raw_affiliation_strings":["School of Computers, National University of Defense Technology, Changsha, 410073, People\u2019s Republic of China","School of Computers, National University of Defense Technology, Changsha, 410073, People's Republic of China"],"affiliations":[{"raw_affiliation_string":"School of Computers, National University of Defense Technology, Changsha, 410073, People\u2019s Republic of China","institution_ids":["https://openalex.org/I170215575"]},{"raw_affiliation_string":"School of Computers, National University of Defense Technology, Changsha, 410073, People's Republic of China","institution_ids":["https://openalex.org/I170215575"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5073267928","display_name":"Shuwang L\u00fc","orcid":null},"institutions":[{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Shuwang L\u00fc","raw_affiliation_strings":["School of Computers, University of Chinese Academy of Sciences, Beijing, 100039, People\u2019s Republic of China","School of Computers, University of Chinese Academy of Sciences, Beijing, 100039, People's Republic of China"],"affiliations":[{"raw_affiliation_string":"School of Computers, University of Chinese Academy of Sciences, Beijing, 100039, People\u2019s Republic of China","institution_ids":["https://openalex.org/I4210165038"]},{"raw_affiliation_string":"School of Computers, University of Chinese Academy of Sciences, Beijing, 100039, People's Republic of China","institution_ids":["https://openalex.org/I4210165038"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5084716692"],"corresponding_institution_ids":["https://openalex.org/I37796252","https://openalex.org/I78978612"],"apc_list":{"value":5000,"currency":"EUR","value_usd":5392},"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.1143651,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"661","last_page":"673"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11130","display_name":"Coding theory and cryptography","score":0.9987999796867371,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12029","display_name":"DNA and Biological Computing","score":0.9980000257492065,"subfield":{"id":"https://openalex.org/subfields/1312","display_name":"Molecular Biology"},"field":{"id":"https://openalex.org/fields/13","display_name":"Biochemistry, Genetics and Molecular Biology"},"domain":{"id":"https://openalex.org/domains/1","display_name":"Life Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/hash-function","display_name":"Hash function","score":0.880543053150177},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7680425643920898},{"id":"https://openalex.org/keywords/collision-attack","display_name":"Collision attack","score":0.7183090448379517},{"id":"https://openalex.org/keywords/sha-2","display_name":"SHA-2","score":0.6782280802726746},{"id":"https://openalex.org/keywords/cryptographic-hash-function","display_name":"Cryptographic hash function","score":0.6637564301490784},{"id":"https://openalex.org/keywords/mdc-2","display_name":"MDC-2","score":0.6454617381095886},{"id":"https://openalex.org/keywords/merkle-tree","display_name":"Merkle tree","score":0.5714172124862671},{"id":"https://openalex.org/keywords/discrete-logarithm","display_name":"Discrete logarithm","score":0.5632803440093994},{"id":"https://openalex.org/keywords/hash-chain","display_name":"Hash chain","score":0.5324588418006897},{"id":"https://openalex.org/keywords/permutation","display_name":"Permutation (music)","score":0.47758200764656067},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.44281744956970215},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.4137043058872223},{"id":"https://openalex.org/keywords/double-hashing","display_name":"Double hashing","score":0.31245851516723633},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.2143929898738861},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.12974637746810913},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.10951796174049377}],"concepts":[{"id":"https://openalex.org/C99138194","wikidata":"https://www.wikidata.org/wiki/Q183427","display_name":"Hash function","level":2,"score":0.880543053150177},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7680425643920898},{"id":"https://openalex.org/C87538441","wikidata":"https://www.wikidata.org/wiki/Q389463","display_name":"Collision attack","level":5,"score":0.7183090448379517},{"id":"https://openalex.org/C190157925","wikidata":"https://www.wikidata.org/wiki/Q1968605","display_name":"SHA-2","level":4,"score":0.6782280802726746},{"id":"https://openalex.org/C7608002","wikidata":"https://www.wikidata.org/wiki/Q477202","display_name":"Cryptographic hash function","level":3,"score":0.6637564301490784},{"id":"https://openalex.org/C200086178","wikidata":"https://www.wikidata.org/wiki/Q3841252","display_name":"MDC-2","level":5,"score":0.6454617381095886},{"id":"https://openalex.org/C205383636","wikidata":"https://www.wikidata.org/wiki/Q14746","display_name":"Merkle tree","level":4,"score":0.5714172124862671},{"id":"https://openalex.org/C173259116","wikidata":"https://www.wikidata.org/wiki/Q864003","display_name":"Discrete logarithm","level":4,"score":0.5632803440093994},{"id":"https://openalex.org/C135783594","wikidata":"https://www.wikidata.org/wiki/Q5678864","display_name":"Hash chain","level":3,"score":0.5324588418006897},{"id":"https://openalex.org/C21308566","wikidata":"https://www.wikidata.org/wiki/Q7169365","display_name":"Permutation (music)","level":2,"score":0.47758200764656067},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.44281744956970215},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.4137043058872223},{"id":"https://openalex.org/C138111711","wikidata":"https://www.wikidata.org/wiki/Q478351","display_name":"Double hashing","level":4,"score":0.31245851516723633},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.2143929898738861},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.12974637746810913},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.10951796174049377},{"id":"https://openalex.org/C24890656","wikidata":"https://www.wikidata.org/wiki/Q82811","display_name":"Acoustics","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1007/978-3-319-21398-9_52","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-319-21398-9_52","pdf_url":null,"source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":22,"referenced_works":["https://openalex.org/W1490590996","https://openalex.org/W1548880861","https://openalex.org/W1549228503","https://openalex.org/W1576694326","https://openalex.org/W1595153681","https://openalex.org/W1600432225","https://openalex.org/W1660562555","https://openalex.org/W1799884017","https://openalex.org/W1967061303","https://openalex.org/W1968182591","https://openalex.org/W1977715386","https://openalex.org/W1991374982","https://openalex.org/W2039811877","https://openalex.org/W2071376024","https://openalex.org/W2106287110","https://openalex.org/W2108475361","https://openalex.org/W2150010995","https://openalex.org/W2166780626","https://openalex.org/W3143396468","https://openalex.org/W3144959161","https://openalex.org/W4205992420","https://openalex.org/W4383988640"],"related_works":["https://openalex.org/W1493566387","https://openalex.org/W2112192902","https://openalex.org/W2356887643","https://openalex.org/W2037181904","https://openalex.org/W2982222368","https://openalex.org/W1913860316","https://openalex.org/W2407671386","https://openalex.org/W2937807672","https://openalex.org/W2007585625","https://openalex.org/W141986170"],"abstract_inverted_index":null,"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
