{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,8,6]],"date-time":"2024-08-06T03:00:12Z","timestamp":1722913212764},"reference-count":13,"publisher":"IEEE Comput. Soc","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1109\/eurmic.2000.874532","type":"proceedings-article","created":{"date-parts":[[2002,11,7]],"date-time":"2002-11-07T23:28:47Z","timestamp":1036711727000},"page":"464-468","source":"Crossref","is-referenced-by-count":1,"title":["A novel suite of tests for evaluating one-way hash functions for electronic commerce applications"],"prefix":"10.1109","volume":"2","author":[{"given":"D.A.","family":"Karras","sequence":"first","affiliation":[]},{"given":"V.","family":"Zorkadis","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Artificial Neural Networks Theory and Applications","year":"1996","author":"patterson","key":"13"},{"journal-title":"Secure Hash Standard","first-page":"180","year":"1995","key":"11"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1016\/S0167-4048(98)00011-X"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1002\/ett.4460050406"},{"key":"2","first-page":"416","article-title":"A designe principle for hash functions","author":"damgard","year":"1989","journal-title":"Advances in Cryptography Crypto '89 Lecture Notes in Computer Science 435"},{"key":"1","first-page":"203","article-title":"Collision free hash functions and public key signature schemes","author":"damgard","year":"1987","journal-title":"Advances in Cryptography Eurocrypt '87 Lecture Notes in Computer Science 304"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/9780470544327"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1016\/S0022-0000(05)80007-8"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1016\/S0167-4048(97)82016-0"},{"journal-title":"Applied Cryptography","year":"1996","author":"schneier","key":"5"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1016\/0022-0000(81)90033-7"},{"journal-title":"Security in Computing","year":"1997","author":"pfleeger","key":"9"},{"journal-title":"Network and Internetwork Security","year":"1995","author":"stallings","key":"8"}],"event":{"name":"Euromicro Workshop on Multimedia and Telecommunications","acronym":"EURMIC-00","location":"Maastricht, Netherlands"},"container-title":["Proceedings of the 26th Euromicro Conference. EUROMICRO 2000. Informatics: Inventing the Future"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/7018\/18916\/00874532.pdf?arnumber=874532","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,10]],"date-time":"2017-03-10T22:30:01Z","timestamp":1489185001000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/874532\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"references-count":13,"URL":"https:\/\/doi.org\/10.1109\/eurmic.2000.874532","relation":{},"subject":[]}}