{"id":"https://openalex.org/W1483799543","doi":"https://doi.org/10.1007/978-3-642-14423-3_23","title":"Distinguishing Attack on Secret Prefix MAC Instantiated with Reduced SHA-1","display_name":"Distinguishing Attack on Secret Prefix MAC Instantiated with Reduced SHA-1","publication_year":2010,"publication_date":"2010-01-01","ids":{"openalex":"https://openalex.org/W1483799543","doi":"https://doi.org/10.1007/978-3-642-14423-3_23","mag":"1483799543"},"language":"en","primary_location":{"id":"doi:10.1007/978-3-642-14423-3_23","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-642-14423-3_23","pdf_url":null,"source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},"type":"book-chapter","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5067478162","display_name":"Siyuan Qiao","orcid":null},"institutions":[{"id":"https://openalex.org/I4210132990","display_name":"State Key Laboratory of Cryptology","ror":"https://ror.org/02pn5rj08","country_code":"CN","type":"government","lineage":["https://openalex.org/I4210132990"]},{"id":"https://openalex.org/I154099455","display_name":"Shandong University","ror":"https://ror.org/0207yh398","country_code":"CN","type":"education","lineage":["https://openalex.org/I154099455"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Siyuan Qiao","raw_affiliation_strings":["Key Laboratory of Cryptologic Technology and Information Security, Ministry of Education, Shandong University, Jinan, 250100, China","Key Laboratory of Cryptologic Technology and Information Security, Ministry of Education, Shandong University, Jinan, China"],"affiliations":[{"raw_affiliation_string":"Key Laboratory of Cryptologic Technology and Information Security, Ministry of Education, Shandong University, Jinan, 250100, China","institution_ids":["https://openalex.org/I154099455"]},{"raw_affiliation_string":"Key Laboratory of Cryptologic Technology and Information Security, Ministry of Education, Shandong University, Jinan, China","institution_ids":["https://openalex.org/I4210132990","https://openalex.org/I154099455"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100635906","display_name":"Wei Wang","orcid":"https://orcid.org/0000-0001-5793-2130"},"institutions":[{"id":"https://openalex.org/I154099455","display_name":"Shandong University","ror":"https://ror.org/0207yh398","country_code":"CN","type":"education","lineage":["https://openalex.org/I154099455"]},{"id":"https://openalex.org/I80143920","display_name":"Shandong University of Science and Technology","ror":"https://ror.org/04gtjhw98","country_code":"CN","type":"education","lineage":["https://openalex.org/I80143920"]},{"id":"https://openalex.org/I4210132990","display_name":"State Key Laboratory of Cryptology","ror":"https://ror.org/02pn5rj08","country_code":"CN","type":"government","lineage":["https://openalex.org/I4210132990"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Wei Wang","raw_affiliation_strings":["Key Laboratory of Cryptologic Technology and Information Security, Ministry of Education, Shandong University, Jinan, 250100, China","School of Computer Science and Technology, Shandong University, Jinan, 250100, China","Key Laboratory of Cryptologic Technology and Information Security, Ministry of Education, Shandong University, Jinan, China","School of Computer Science and Technology, Shandong University, Jinan, China"],"affiliations":[{"raw_affiliation_string":"Key Laboratory of Cryptologic Technology and Information Security, Ministry of Education, Shandong University, Jinan, 250100, China","institution_ids":["https://openalex.org/I154099455"]},{"raw_affiliation_string":"School of Computer Science and Technology, Shandong University, Jinan, 250100, China","institution_ids":["https://openalex.org/I154099455"]},{"raw_affiliation_string":"Key Laboratory of Cryptologic Technology and Information Security, Ministry of Education, Shandong University, Jinan, China","institution_ids":["https://openalex.org/I4210132990","https://openalex.org/I154099455"]},{"raw_affiliation_string":"School of Computer Science and Technology, Shandong University, Jinan, China","institution_ids":["https://openalex.org/I80143920"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5017743452","display_name":"Keting Jia","orcid":"https://orcid.org/0000-0002-6396-8882"},"institutions":[{"id":"https://openalex.org/I154099455","display_name":"Shandong University","ror":"https://ror.org/0207yh398","country_code":"CN","type":"education","lineage":["https://openalex.org/I154099455"]},{"id":"https://openalex.org/I4210132990","display_name":"State Key Laboratory of Cryptology","ror":"https://ror.org/02pn5rj08","country_code":"CN","type":"government","lineage":["https://openalex.org/I4210132990"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Keting Jia","raw_affiliation_strings":["Key Laboratory of Cryptologic Technology and Information Security, Ministry of Education, Shandong University, Jinan, 250100, China","Key Laboratory of Cryptologic Technology and Information Security, Ministry of Education, Shandong University, Jinan, China"],"affiliations":[{"raw_affiliation_string":"Key Laboratory of Cryptologic Technology and Information Security, Ministry of Education, Shandong University, Jinan, 250100, China","institution_ids":["https://openalex.org/I154099455"]},{"raw_affiliation_string":"Key Laboratory of Cryptologic Technology and Information Security, Ministry of Education, Shandong University, Jinan, China","institution_ids":["https://openalex.org/I4210132990","https://openalex.org/I154099455"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5067478162"],"corresponding_institution_ids":["https://openalex.org/I154099455","https://openalex.org/I4210132990"],"apc_list":{"value":5000,"currency":"EUR","value_usd":5392},"apc_paid":null,"fwci":0.5664,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.64272038,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"349","last_page":"361"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11130","display_name":"Coding theory and cryptography","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.998199999332428,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/prefix","display_name":"Prefix","score":0.8647348880767822},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7525416612625122},{"id":"https://openalex.org/keywords/collision-attack","display_name":"Collision attack","score":0.5635773539543152},{"id":"https://openalex.org/keywords/collision","display_name":"Collision","score":0.5352098941802979},{"id":"https://openalex.org/keywords/path","display_name":"Path (computing)","score":0.5208252668380737},{"id":"https://openalex.org/keywords/block","display_name":"Block (permutation group theory)","score":0.48569998145103455},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.41639265418052673},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.39782029390335083},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3266734480857849},{"id":"https://openalex.org/keywords/arithmetic","display_name":"Arithmetic","score":0.3250197172164917},{"id":"https://openalex.org/keywords/hash-function","display_name":"Hash function","score":0.324945867061615},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.2701440751552582},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.2001517415046692},{"id":"https://openalex.org/keywords/cryptographic-hash-function","display_name":"Cryptographic hash function","score":0.13778412342071533},{"id":"https://openalex.org/keywords/combinatorics","display_name":"Combinatorics","score":0.09345933794975281}],"concepts":[{"id":"https://openalex.org/C141603448","wikidata":"https://www.wikidata.org/wiki/Q134830","display_name":"Prefix","level":2,"score":0.8647348880767822},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7525416612625122},{"id":"https://openalex.org/C87538441","wikidata":"https://www.wikidata.org/wiki/Q389463","display_name":"Collision attack","level":5,"score":0.5635773539543152},{"id":"https://openalex.org/C121704057","wikidata":"https://www.wikidata.org/wiki/Q352070","display_name":"Collision","level":2,"score":0.5352098941802979},{"id":"https://openalex.org/C2777735758","wikidata":"https://www.wikidata.org/wiki/Q817765","display_name":"Path (computing)","level":2,"score":0.5208252668380737},{"id":"https://openalex.org/C2777210771","wikidata":"https://www.wikidata.org/wiki/Q4927124","display_name":"Block (permutation group theory)","level":2,"score":0.48569998145103455},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.41639265418052673},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.39782029390335083},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3266734480857849},{"id":"https://openalex.org/C94375191","wikidata":"https://www.wikidata.org/wiki/Q11205","display_name":"Arithmetic","level":1,"score":0.3250197172164917},{"id":"https://openalex.org/C99138194","wikidata":"https://www.wikidata.org/wiki/Q183427","display_name":"Hash function","level":2,"score":0.324945867061615},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.2701440751552582},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.2001517415046692},{"id":"https://openalex.org/C7608002","wikidata":"https://www.wikidata.org/wiki/Q477202","display_name":"Cryptographic hash function","level":3,"score":0.13778412342071533},{"id":"https://openalex.org/C114614502","wikidata":"https://www.wikidata.org/wiki/Q76592","display_name":"Combinatorics","level":1,"score":0.09345933794975281},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0},{"id":"https://openalex.org/C138111711","wikidata":"https://www.wikidata.org/wiki/Q478351","display_name":"Double hashing","level":4,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1007/978-3-642-14423-3_23","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-642-14423-3_23","pdf_url":null,"source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":37,"referenced_works":["https://openalex.org/W9162323","https://openalex.org/W137900245","https://openalex.org/W203964163","https://openalex.org/W1513113529","https://openalex.org/W1513711610","https://openalex.org/W1546844943","https://openalex.org/W1550771246","https://openalex.org/W1560798398","https://openalex.org/W1563149761","https://openalex.org/W1566273181","https://openalex.org/W1590269592","https://openalex.org/W1656731780","https://openalex.org/W1866609797","https://openalex.org/W2011095011","https://openalex.org/W2103239853","https://openalex.org/W2107165730","https://openalex.org/W2130238828","https://openalex.org/W2131212920","https://openalex.org/W2131300413","https://openalex.org/W2135759164","https://openalex.org/W2172433705","https://openalex.org/W2399310879","https://openalex.org/W2477011922","https://openalex.org/W2477242951","https://openalex.org/W2479511954","https://openalex.org/W2482045774","https://openalex.org/W2484860292","https://openalex.org/W2490195800","https://openalex.org/W2490262601","https://openalex.org/W2493993829","https://openalex.org/W2495889793","https://openalex.org/W2497291046","https://openalex.org/W2505860479","https://openalex.org/W2561675875","https://openalex.org/W2726264233","https://openalex.org/W4285719527","https://openalex.org/W4292003697"],"related_works":["https://openalex.org/W2523169838","https://openalex.org/W1660058531","https://openalex.org/W2168552221","https://openalex.org/W2949594640","https://openalex.org/W1656731780","https://openalex.org/W3161956247","https://openalex.org/W1516535836","https://openalex.org/W3029735976","https://openalex.org/W2141664386","https://openalex.org/W195844219"],"abstract_inverted_index":null,"counts_by_year":[{"year":2012,"cited_by_count":1}],"updated_date":"2026-01-15T23:16:33.117629","created_date":"2025-10-10T00:00:00"}
