{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,3,30]],"date-time":"2022-03-30T12:45:08Z","timestamp":1648644308485},"reference-count":15,"publisher":"Institute of Electronics, Information and Communications Engineers (IEICE)","issue":"5","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEICE Trans. Inf. & Syst."],"published-print":{"date-parts":[[2010]]},"DOI":"10.1587\/transinf.e93.d.1087","type":"journal-article","created":{"date-parts":[[2010,5,6]],"date-time":"2010-05-06T05:56:42Z","timestamp":1273125402000},"page":"1087-1095","source":"Crossref","is-referenced-by-count":1,"title":["Cryptanalysis of Two MD5-Based Authentication Protocols: APOP and NMAC"],"prefix":"10.1587","volume":"E93-D","author":[{"given":"Lei","family":"WANG","sequence":"first","affiliation":[{"name":"University of Electro-Communications"}]},{"given":"Kazuo","family":"OHTA","sequence":"additional","affiliation":[{"name":"University of Electro-Communications"}]},{"given":"Yu","family":"SASAKI","sequence":"additional","affiliation":[{"name":"University of Electro-Communications"},{"name":"NTT Information Sharing Platform Laboratories, NTT Corporation"}]},{"given":"Kazuo","family":"SAKIYAMA","sequence":"additional","affiliation":[{"name":"University of Electro-Communications"}]},{"given":"Noboru","family":"KUNIHIRO","sequence":"additional","affiliation":[{"name":"the University of Tokyo"}]}],"member":"532","reference":[{"key":"1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-68697-5_1"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1007\/11818175_36"},{"key":"3","doi-asserted-by":"crossref","first-page":"293","DOI":"10.1007\/3-540-48285-7_26","volume":"765","year":"1994","ISSN":"http:\/\/id.crossref.org\/issn\/0302-9743","issn-type":"print"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1007\/11935230_3"},{"key":"5","unstructured":"[5] V. Klima, “Tunnels in hash functions: MD5 collisions within a minute, ” Cryptology ePrint Archive, Report 2006\/105. http:\/\/eprint.iacr.org\/2006\/105.pdf"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-74143-5_2"},{"key":"7","unstructured":"[7] G. Leurent, “Message freedom in MD4 and MD5 collisions: application to APOP, ” FSE 2007, LNCS, vol.4593, pp.309-328, Springer-Verlag, 2007."},{"key":"8","doi-asserted-by":"crossref","unstructured":"[8] J. Myers and M. Rose, “Post office protocol-version 3, ” RFC 1939 (Standard), May 1996. Updated by RFCs 1957, 2449. ftp: \/\/ftp.isi.edu\/in-notes\/rfc1939.txt","DOI":"10.17487\/rfc1939"},{"key":"9","doi-asserted-by":"crossref","unstructured":"[9] Ronald L. Rivest, “The MD5 message digest algorithm, ” Request for Comments (RFC 1321), Network Working Group, 1992.","DOI":"10.17487\/rfc1321"},{"key":"10","unstructured":"[10] Y. Sasaki, G. Yamamoto, and K. Aoki, “Practical password recovery on an MD5 challenge and response, ” Cryptology ePrint Archive, Report 2007\/101."},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-79263-5_1"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-78967-3_14"},{"key":"13","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1007\/978-3-642-04846-3_2","volume":"5824","author":"WANG LEI","year":"2009","ISSN":"http:\/\/id.crossref.org\/issn\/0302-9743","issn-type":"print"},{"key":"14","doi-asserted-by":"crossref","first-page":"19","DOI":"10.1007\/11426639_2","volume":"3494","author":"WANG XIAOYUN","year":"2005","ISSN":"http:\/\/id.crossref.org\/issn\/0302-9743","issn-type":"print"},{"key":"15","unstructured":"[15] X. Wang, Y.L. Yin, and H. Yu, “Finding collisions in the full SHA-1, ” CRYPTO 2005, LNCS vol.3621, pp.17-36, 2005."}],"container-title":["IEICE Transactions on Information and Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/www.jstage.jst.go.jp\/article\/transinf\/E93.D\/5\/E93.D_5_1087\/_pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,26]],"date-time":"2021-04-26T06:19:44Z","timestamp":1619417984000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.jstage.jst.go.jp\/article\/transinf\/E93.D\/5\/E93.D_5_1087\/_article"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"references-count":15,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2010]]}},"URL":"https:\/\/doi.org\/10.1587\/transinf.e93.d.1087","relation":{},"ISSN":["0916-8532","1745-1361"],"issn-type":[{"value":"0916-8532","type":"print"},{"value":"1745-1361","type":"electronic"}],"subject":[],"published":{"date-parts":[[2010]]}}}