{"id":"https://openalex.org/W1913860316","doi":"https://doi.org/10.1007/978-3-540-85174-5_10","title":"Cryptanalysis of the GOST Hash Function","display_name":"Cryptanalysis of the GOST Hash Function","publication_year":2008,"publication_date":"2008-08-20","ids":{"openalex":"https://openalex.org/W1913860316","doi":"https://doi.org/10.1007/978-3-540-85174-5_10","mag":"1913860316"},"language":"en","primary_location":{"id":"doi:10.1007/978-3-540-85174-5_10","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-540-85174-5_10","pdf_url":null,"source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},"type":"book-chapter","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5014022185","display_name":"Florian Mendel","orcid":"https://orcid.org/0000-0002-8352-9799"},"institutions":[{"id":"https://openalex.org/I4092182","display_name":"Graz University of Technology","ror":"https://ror.org/00d7xrm67","country_code":"AT","type":"education","lineage":["https://openalex.org/I4092182"]}],"countries":["AT"],"is_corresponding":true,"raw_author_name":"Florian Mendel","raw_affiliation_strings":["Institute for Applied Information Processing and Communications (IAIK), Graz University of Technology, Inffeldgasse 16a, 8010, Graz, Austria","Institute for Applied Information Processing and Communications (IAIK), Graz University of Technology, Graz, Austria 8010#TAB#"],"affiliations":[{"raw_affiliation_string":"Institute for Applied Information Processing and Communications (IAIK), Graz University of Technology, Inffeldgasse 16a, 8010, Graz, Austria","institution_ids":["https://openalex.org/I4092182"]},{"raw_affiliation_string":"Institute for Applied Information Processing and Communications (IAIK), Graz University of Technology, Graz, Austria 8010#TAB#","institution_ids":["https://openalex.org/I4092182"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5019111326","display_name":"Norbert Pramstaller","orcid":null},"institutions":[{"id":"https://openalex.org/I4092182","display_name":"Graz University of Technology","ror":"https://ror.org/00d7xrm67","country_code":"AT","type":"education","lineage":["https://openalex.org/I4092182"]}],"countries":["AT"],"is_corresponding":false,"raw_author_name":"Norbert Pramstaller","raw_affiliation_strings":["Institute for Applied Information Processing and Communications (IAIK), Graz University of Technology, Inffeldgasse 16a, 8010, Graz, Austria","Institute for Applied Information Processing and Communications (IAIK), Graz University of Technology, Graz, Austria 8010#TAB#"],"affiliations":[{"raw_affiliation_string":"Institute for Applied Information Processing and Communications (IAIK), Graz University of Technology, Inffeldgasse 16a, 8010, Graz, Austria","institution_ids":["https://openalex.org/I4092182"]},{"raw_affiliation_string":"Institute for Applied Information Processing and Communications (IAIK), Graz University of Technology, Graz, Austria 8010#TAB#","institution_ids":["https://openalex.org/I4092182"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5068575128","display_name":"Christian Rechberger","orcid":"https://orcid.org/0000-0003-1280-6020"},"institutions":[{"id":"https://openalex.org/I4092182","display_name":"Graz University of Technology","ror":"https://ror.org/00d7xrm67","country_code":"AT","type":"education","lineage":["https://openalex.org/I4092182"]}],"countries":["AT"],"is_corresponding":false,"raw_author_name":"Christian Rechberger","raw_affiliation_strings":["Institute for Applied Information Processing and Communications (IAIK), Graz University of Technology, Inffeldgasse 16a, 8010, Graz, Austria","Institute for Applied Information Processing and Communications (IAIK), Graz University of Technology, Graz, Austria 8010#TAB#"],"affiliations":[{"raw_affiliation_string":"Institute for Applied Information Processing and Communications (IAIK), Graz University of Technology, Inffeldgasse 16a, 8010, Graz, Austria","institution_ids":["https://openalex.org/I4092182"]},{"raw_affiliation_string":"Institute for Applied Information Processing and Communications (IAIK), Graz University of Technology, Graz, Austria 8010#TAB#","institution_ids":["https://openalex.org/I4092182"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5058942156","display_name":"Marcin Kontak","orcid":null},"institutions":[{"id":"https://openalex.org/I4210137370","display_name":"Institute of Mathematics","ror":"https://ror.org/04hrrh248","country_code":"PL","type":"facility","lineage":["https://openalex.org/I4210137370","https://openalex.org/I99542240"]},{"id":"https://openalex.org/I2800249161","display_name":"Military University of Technology in Warsaw","ror":"https://ror.org/05fct5h31","country_code":"PL","type":"education","lineage":["https://openalex.org/I2800249161"]}],"countries":["PL"],"is_corresponding":false,"raw_author_name":"Marcin Kontak","raw_affiliation_strings":["Institute of Mathematics and Cryptology, Faculty of Cybernetics, Military University of Technology, ul. Kaliskiego 2, 00-908, Warsaw, Poland","Institute of Mathematics and Cryptology, Faculty of Cybernetics, Military University of Technology, Warsaw, Poland 00-908"],"affiliations":[{"raw_affiliation_string":"Institute of Mathematics and Cryptology, Faculty of Cybernetics, Military University of Technology, ul. Kaliskiego 2, 00-908, Warsaw, Poland","institution_ids":["https://openalex.org/I2800249161","https://openalex.org/I4210137370"]},{"raw_affiliation_string":"Institute of Mathematics and Cryptology, Faculty of Cybernetics, Military University of Technology, Warsaw, Poland 00-908","institution_ids":["https://openalex.org/I2800249161","https://openalex.org/I4210137370"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5017129648","display_name":"Janusz Szmidt","orcid":"https://orcid.org/0000-0001-7482-2339"},"institutions":[{"id":"https://openalex.org/I4210137370","display_name":"Institute of Mathematics","ror":"https://ror.org/04hrrh248","country_code":"PL","type":"facility","lineage":["https://openalex.org/I4210137370","https://openalex.org/I99542240"]},{"id":"https://openalex.org/I2800249161","display_name":"Military University of Technology in Warsaw","ror":"https://ror.org/05fct5h31","country_code":"PL","type":"education","lineage":["https://openalex.org/I2800249161"]}],"countries":["PL"],"is_corresponding":false,"raw_author_name":"Janusz Szmidt","raw_affiliation_strings":["Institute of Mathematics and Cryptology, Faculty of Cybernetics, Military University of Technology, ul. Kaliskiego 2, 00-908, Warsaw, Poland","Institute of Mathematics and Cryptology, Faculty of Cybernetics, Military University of Technology, Warsaw, Poland 00-908"],"affiliations":[{"raw_affiliation_string":"Institute of Mathematics and Cryptology, Faculty of Cybernetics, Military University of Technology, ul. Kaliskiego 2, 00-908, Warsaw, Poland","institution_ids":["https://openalex.org/I2800249161","https://openalex.org/I4210137370"]},{"raw_affiliation_string":"Institute of Mathematics and Cryptology, Faculty of Cybernetics, Military University of Technology, Warsaw, Poland 00-908","institution_ids":["https://openalex.org/I2800249161","https://openalex.org/I4210137370"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5014022185"],"corresponding_institution_ids":["https://openalex.org/I4092182"],"apc_list":{"value":5000,"currency":"EUR","value_usd":5392},"apc_paid":null,"fwci":5.2815,"has_fulltext":false,"cited_by_count":62,"citation_normalized_percentile":{"value":0.96219282,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"162","last_page":"178"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9986000061035156,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9955000281333923,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/gost","display_name":"GOST (hash function)","score":0.914971113204956},{"id":"https://openalex.org/keywords/sha-2","display_name":"SHA-2","score":0.862484335899353},{"id":"https://openalex.org/keywords/hash-function","display_name":"Hash function","score":0.8399970531463623},{"id":"https://openalex.org/keywords/checksum","display_name":"Checksum","score":0.8099420070648193},{"id":"https://openalex.org/keywords/mdc-2","display_name":"MDC-2","score":0.7470654249191284},{"id":"https://openalex.org/keywords/double-hashing","display_name":"Double hashing","score":0.7384464144706726},{"id":"https://openalex.org/keywords/cryptographic-hash-function","display_name":"Cryptographic hash function","score":0.7260570526123047},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6902598142623901},{"id":"https://openalex.org/keywords/collision-attack","display_name":"Collision attack","score":0.6883788108825684},{"id":"https://openalex.org/keywords/hash-chain","display_name":"Hash chain","score":0.576307475566864},{"id":"https://openalex.org/keywords/rolling-hash","display_name":"Rolling hash","score":0.475078284740448},{"id":"https://openalex.org/keywords/collision-resistance","display_name":"Collision resistance","score":0.4258069097995758},{"id":"https://openalex.org/keywords/swifft","display_name":"SWIFFT","score":0.4246380031108856},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.4045625925064087},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.08936133980751038}],"concepts":[{"id":"https://openalex.org/C2780233296","wikidata":"https://www.wikidata.org/wiki/Q3756229","display_name":"GOST (hash function)","level":2,"score":0.914971113204956},{"id":"https://openalex.org/C190157925","wikidata":"https://www.wikidata.org/wiki/Q1968605","display_name":"SHA-2","level":4,"score":0.862484335899353},{"id":"https://openalex.org/C99138194","wikidata":"https://www.wikidata.org/wiki/Q183427","display_name":"Hash function","level":2,"score":0.8399970531463623},{"id":"https://openalex.org/C162372511","wikidata":"https://www.wikidata.org/wiki/Q218341","display_name":"Checksum","level":2,"score":0.8099420070648193},{"id":"https://openalex.org/C200086178","wikidata":"https://www.wikidata.org/wiki/Q3841252","display_name":"MDC-2","level":5,"score":0.7470654249191284},{"id":"https://openalex.org/C138111711","wikidata":"https://www.wikidata.org/wiki/Q478351","display_name":"Double hashing","level":4,"score":0.7384464144706726},{"id":"https://openalex.org/C7608002","wikidata":"https://www.wikidata.org/wiki/Q477202","display_name":"Cryptographic hash function","level":3,"score":0.7260570526123047},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6902598142623901},{"id":"https://openalex.org/C87538441","wikidata":"https://www.wikidata.org/wiki/Q389463","display_name":"Collision attack","level":5,"score":0.6883788108825684},{"id":"https://openalex.org/C135783594","wikidata":"https://www.wikidata.org/wiki/Q5678864","display_name":"Hash chain","level":3,"score":0.576307475566864},{"id":"https://openalex.org/C108546238","wikidata":"https://www.wikidata.org/wiki/Q4228982","display_name":"Rolling hash","level":5,"score":0.475078284740448},{"id":"https://openalex.org/C150909736","wikidata":"https://www.wikidata.org/wiki/Q1779448","display_name":"Collision resistance","level":5,"score":0.4258069097995758},{"id":"https://openalex.org/C133358856","wikidata":"https://www.wikidata.org/wiki/Q7395188","display_name":"SWIFFT","level":5,"score":0.4246380031108856},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.4045625925064087},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.08936133980751038},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":4,"locations":[{"id":"doi:10.1007/978-3-540-85174-5_10","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-540-85174-5_10","pdf_url":null,"source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},{"id":"pmh:oai:CiteSeerX.psu:10.1.1.887.2863","is_oa":false,"landing_page_url":"http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.887.2863","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"https://www.researchgate.net/profile/Florian_Mendel/publication/221355445_Cryptanalysis_of_the_GOST_Hash_Function/links/00b4952247449c4293000000.pdf","raw_type":"text"},{"id":"pmh:oai:CiteSeerX.psu:10.1.1.897.3801","is_oa":false,"landing_page_url":"http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.897.3801","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"https://securewww.esat.kuleuven.be/cosic/publications/article-2091.pdf","raw_type":"text"},{"id":"pmh:oai:CiteSeerX.psu:10.1.1.903.426","is_oa":false,"landing_page_url":"http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.903.426","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"http://www.iacr.org/archive/crypto2008/51570163/51570163.pdf","raw_type":"text"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":27,"referenced_works":["https://openalex.org/W81015123","https://openalex.org/W124034723","https://openalex.org/W1502924772","https://openalex.org/W1544996610","https://openalex.org/W1546907539","https://openalex.org/W1548701190","https://openalex.org/W1551374506","https://openalex.org/W1569874887","https://openalex.org/W1570084506","https://openalex.org/W1590269592","https://openalex.org/W1656731780","https://openalex.org/W1797949276","https://openalex.org/W1826962815","https://openalex.org/W1865207131","https://openalex.org/W1984365546","https://openalex.org/W2103239853","https://openalex.org/W2121895731","https://openalex.org/W2154759077","https://openalex.org/W2155690458","https://openalex.org/W2163466490","https://openalex.org/W2394910287","https://openalex.org/W2400486660","https://openalex.org/W2522644133","https://openalex.org/W2561675875","https://openalex.org/W2592265699","https://openalex.org/W2592683203","https://openalex.org/W4285719527"],"related_works":["https://openalex.org/W2356417812","https://openalex.org/W2068448121","https://openalex.org/W2382157040","https://openalex.org/W2153399911","https://openalex.org/W1797949276","https://openalex.org/W2951344700","https://openalex.org/W3019245231","https://openalex.org/W2069568684","https://openalex.org/W2380122294","https://openalex.org/W2184961953"],"abstract_inverted_index":null,"counts_by_year":[{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":2},{"year":2022,"cited_by_count":4},{"year":2021,"cited_by_count":2},{"year":2020,"cited_by_count":1},{"year":2019,"cited_by_count":2},{"year":2018,"cited_by_count":1},{"year":2017,"cited_by_count":1},{"year":2016,"cited_by_count":2},{"year":2015,"cited_by_count":8},{"year":2014,"cited_by_count":8},{"year":2013,"cited_by_count":3},{"year":2012,"cited_by_count":7}],"updated_date":"2026-04-04T16:13:02.066488","created_date":"2025-10-10T00:00:00"}
