{"id":"https://openalex.org/W1521761918","doi":"https://doi.org/10.1007/978-3-540-79104-1_28","title":"Analysis of Zipper as a Hash Function","display_name":"Analysis of Zipper as a Hash Function","publication_year":2008,"publication_date":"2008-03-13","ids":{"openalex":"https://openalex.org/W1521761918","doi":"https://doi.org/10.1007/978-3-540-79104-1_28","mag":"1521761918"},"language":"en","primary_location":{"id":"doi:10.1007/978-3-540-79104-1_28","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-540-79104-1_28","pdf_url":null,"source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},"type":"book-chapter","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101775126","display_name":"Pin Ann Lin","orcid":"https://orcid.org/0000-0002-1691-6756"},"institutions":[{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]},{"id":"https://openalex.org/I4210128818","display_name":"Institute of Software","ror":"https://ror.org/033dfsn42","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210128818"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Pin Lin","raw_affiliation_strings":["Graduate School of Chinese Academy of Sciences, \u00a0","The State Key Laboratory of Information Security, Institute of Software, Chinese Academy of Sciences, \u00a0","Graduate School of Chinese Academy of Sciences,","The State Key Laboratory of Information Security, Institute of Software, Chinese Academy of Sciences,"],"affiliations":[{"raw_affiliation_string":"Graduate School of Chinese Academy of Sciences, \u00a0","institution_ids":["https://openalex.org/I4210165038"]},{"raw_affiliation_string":"The State Key Laboratory of Information Security, Institute of Software, Chinese Academy of Sciences, \u00a0","institution_ids":["https://openalex.org/I4210128818"]},{"raw_affiliation_string":"Graduate School of Chinese Academy of Sciences,","institution_ids":["https://openalex.org/I4210165038"]},{"raw_affiliation_string":"The State Key Laboratory of Information Security, Institute of Software, Chinese Academy of Sciences,","institution_ids":["https://openalex.org/I4210128818"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5069642079","display_name":"Wenling Wu","orcid":"https://orcid.org/0000-0001-6244-3489"},"institutions":[{"id":"https://openalex.org/I4210128818","display_name":"Institute of Software","ror":"https://ror.org/033dfsn42","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210128818"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Wenling Wu","raw_affiliation_strings":["The State Key Laboratory of Information Security, Institute of Software, Chinese Academy of Sciences, \u00a0","The State Key Laboratory of Information Security, Institute of Software, Chinese Academy of Sciences,"],"affiliations":[{"raw_affiliation_string":"The State Key Laboratory of Information Security, Institute of Software, Chinese Academy of Sciences, \u00a0","institution_ids":["https://openalex.org/I4210128818"]},{"raw_affiliation_string":"The State Key Laboratory of Information Security, Institute of Software, Chinese Academy of Sciences,","institution_ids":["https://openalex.org/I4210128818"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101611530","display_name":"Chuan-Kun Wu","orcid":"https://orcid.org/0000-0002-5620-8914"},"institutions":[{"id":"https://openalex.org/I4210128818","display_name":"Institute of Software","ror":"https://ror.org/033dfsn42","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210128818"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Chuankun Wu","raw_affiliation_strings":["The State Key Laboratory of Information Security, Institute of Software, Chinese Academy of Sciences, \u00a0","The State Key Laboratory of Information Security, Institute of Software, Chinese Academy of Sciences,"],"affiliations":[{"raw_affiliation_string":"The State Key Laboratory of Information Security, Institute of Software, Chinese Academy of Sciences, \u00a0","institution_ids":["https://openalex.org/I4210128818"]},{"raw_affiliation_string":"The State Key Laboratory of Information Security, Institute of Software, Chinese Academy of Sciences,","institution_ids":["https://openalex.org/I4210128818"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5061131461","display_name":"Tian Qiu","orcid":null},"institutions":[{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]},{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366"]},{"id":"https://openalex.org/I4210128818","display_name":"Institute of Software","ror":"https://ror.org/033dfsn42","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210128818"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Tian Qiu","raw_affiliation_strings":["Graduate School of Chinese Academy of Sciences, \u00a0","National Key Laboratory of Integrated Information System Technology, Institute of Software, Chinese Academy of Sciences, \u00a0","Graduate School of Chinese Academy of Sciences,","National Key Laboratory of Integrated Information System Technology, Institute of Software, Chinese Academy of Sciences,"],"affiliations":[{"raw_affiliation_string":"Graduate School of Chinese Academy of Sciences, \u00a0","institution_ids":["https://openalex.org/I4210165038"]},{"raw_affiliation_string":"National Key Laboratory of Integrated Information System Technology, Institute of Software, Chinese Academy of Sciences, \u00a0","institution_ids":["https://openalex.org/I4210128818"]},{"raw_affiliation_string":"Graduate School of Chinese Academy of Sciences,","institution_ids":["https://openalex.org/I4210165038"]},{"raw_affiliation_string":"National Key Laboratory of Integrated Information System Technology, Institute of Software, Chinese Academy of Sciences,","institution_ids":["https://openalex.org/I4210128818","https://openalex.org/I19820366"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5101775126"],"corresponding_institution_ids":["https://openalex.org/I4210128818","https://openalex.org/I4210165038"],"apc_list":{"value":5000,"currency":"EUR","value_usd":5392},"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.07251029,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"392","last_page":"403"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11693","display_name":"Cryptography and Residue Arithmetic","score":0.9952999949455261,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/zipper","display_name":"Zipper","score":0.858679473400116},{"id":"https://openalex.org/keywords/hash-function","display_name":"Hash function","score":0.8175455927848816},{"id":"https://openalex.org/keywords/random-oracle","display_name":"Random oracle","score":0.8072506189346313},{"id":"https://openalex.org/keywords/compression","display_name":"Compression (physics)","score":0.672976553440094},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5848520398139954},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.5706825256347656},{"id":"https://openalex.org/keywords/function","display_name":"Function (biology)","score":0.5195191502571106},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.4325034022331238},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.42068931460380554},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.3150630295276642},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.1596980094909668},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.13138985633850098},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.12429797649383545},{"id":"https://openalex.org/keywords/physics","display_name":"Physics","score":0.07992208003997803},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.06715676188468933}],"concepts":[{"id":"https://openalex.org/C105782903","wikidata":"https://www.wikidata.org/wiki/Q6577686","display_name":"Zipper","level":2,"score":0.858679473400116},{"id":"https://openalex.org/C99138194","wikidata":"https://www.wikidata.org/wiki/Q183427","display_name":"Hash function","level":2,"score":0.8175455927848816},{"id":"https://openalex.org/C94284585","wikidata":"https://www.wikidata.org/wiki/Q228184","display_name":"Random oracle","level":4,"score":0.8072506189346313},{"id":"https://openalex.org/C180016635","wikidata":"https://www.wikidata.org/wiki/Q2712821","display_name":"Compression (physics)","level":2,"score":0.672976553440094},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5848520398139954},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.5706825256347656},{"id":"https://openalex.org/C14036430","wikidata":"https://www.wikidata.org/wiki/Q3736076","display_name":"Function (biology)","level":2,"score":0.5195191502571106},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.4325034022331238},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.42068931460380554},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.3150630295276642},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.1596980094909668},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.13138985633850098},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.12429797649383545},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.07992208003997803},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.06715676188468933},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C97355855","wikidata":"https://www.wikidata.org/wiki/Q11473","display_name":"Thermodynamics","level":1,"score":0.0},{"id":"https://openalex.org/C78458016","wikidata":"https://www.wikidata.org/wiki/Q840400","display_name":"Evolutionary biology","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1007/978-3-540-79104-1_28","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-540-79104-1_28","pdf_url":null,"source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":33,"referenced_works":["https://openalex.org/W81015123","https://openalex.org/W1483487117","https://openalex.org/W1502433349","https://openalex.org/W1511374591","https://openalex.org/W1525090271","https://openalex.org/W1533007301","https://openalex.org/W1547537489","https://openalex.org/W1548701190","https://openalex.org/W1549228503","https://openalex.org/W1567888865","https://openalex.org/W1600432225","https://openalex.org/W1754628477","https://openalex.org/W1766319578","https://openalex.org/W1863270349","https://openalex.org/W1939171670","https://openalex.org/W2007585625","https://openalex.org/W2020726579","https://openalex.org/W2098801947","https://openalex.org/W2475397807","https://openalex.org/W2477011922","https://openalex.org/W2480498986","https://openalex.org/W2483934186","https://openalex.org/W2484860292","https://openalex.org/W2490195800","https://openalex.org/W2490262601","https://openalex.org/W2493686639","https://openalex.org/W2495889793","https://openalex.org/W2497843319","https://openalex.org/W2561675875","https://openalex.org/W2612691132","https://openalex.org/W2916086000","https://openalex.org/W3145042860","https://openalex.org/W4285719527"],"related_works":["https://openalex.org/W1965266249","https://openalex.org/W2001713314","https://openalex.org/W4250134718","https://openalex.org/W4319590719","https://openalex.org/W16894843","https://openalex.org/W1972982005","https://openalex.org/W2885499386","https://openalex.org/W1591954407","https://openalex.org/W2951515747","https://openalex.org/W1830470462"],"abstract_inverted_index":null,"counts_by_year":[{"year":2014,"cited_by_count":1},{"year":2012,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
