{"id":"https://openalex.org/W2127058207","doi":"https://doi.org/10.1109/eurmic.2000.874532","title":"A novel suite of tests for evaluating one-way hash functions for electronic commerce applications","display_name":"A novel suite of tests for evaluating one-way hash functions for electronic commerce applications","publication_year":2002,"publication_date":"2002-11-07","ids":{"openalex":"https://openalex.org/W2127058207","doi":"https://doi.org/10.1109/eurmic.2000.874532","mag":"2127058207"},"language":"en","primary_location":{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/eurmic.2000.874532","pdf_url":null,"source":{"id":"https://openalex.org/S4306523719","display_name":"Proceedings of the 26th Euromicro Conference. EUROMICRO 2000. Informatics: Inventing the Future","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},"type":"article","type_crossref":"proceedings-article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5002850928","display_name":"D.A. Karras","orcid":"https://orcid.org/0000-0002-2759-8482"},"institutions":[{"id":"https://openalex.org/I143165994","display_name":"Hellenic Aerospace Industry (Greece)","ror":"https://ror.org/04mngjf23","country_code":"GR","type":"company","lineage":["https://openalex.org/I143165994"]}],"countries":["GR"],"is_corresponding":false,"raw_author_name":"D.A. Karras","raw_affiliation_strings":["Hellenic AeroSpace Industry SA, Athens, Greece"],"affiliations":[{"raw_affiliation_string":"Hellenic AeroSpace Industry SA, Athens, Greece","institution_ids":["https://openalex.org/I143165994"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5049201159","display_name":"Vasilios Zorkadis","orcid":null},"institutions":[],"countries":["GR"],"is_corresponding":false,"raw_author_name":"V. Zorkadis","raw_affiliation_strings":["Data Protection Authority, Athens, Greece"],"affiliations":[{"raw_affiliation_string":"Data Protection Authority, Athens, Greece","institution_ids":[]}]}],"institution_assertions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.54,"has_fulltext":true,"fulltext_origin":"ngrams","cited_by_count":10,"citation_normalized_percentile":{"value":0.723155,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":79,"max":80},"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9999,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.999,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/secure-hash-algorithm","display_name":"Secure Hash Algorithm","score":0.47291857}],"concepts":[{"id":"https://openalex.org/C99138194","wikidata":"https://www.wikidata.org/wiki/Q183427","display_name":"Hash function","level":2,"score":0.80971265},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.79274297},{"id":"https://openalex.org/C7608002","wikidata":"https://www.wikidata.org/wiki/Q477202","display_name":"Cryptographic hash function","level":3,"score":0.6831326},{"id":"https://openalex.org/C190157925","wikidata":"https://www.wikidata.org/wiki/Q1968605","display_name":"SHA-2","level":4,"score":0.632534},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.50109005},{"id":"https://openalex.org/C138111711","wikidata":"https://www.wikidata.org/wiki/Q478351","display_name":"Double hashing","level":4,"score":0.48700887},{"id":"https://openalex.org/C9661340","wikidata":"https://www.wikidata.org/wiki/Q257799","display_name":"Secure Hash Algorithm","level":5,"score":0.47291857},{"id":"https://openalex.org/C106301342","wikidata":"https://www.wikidata.org/wiki/Q4117933","display_name":"Entropy (arrow of time)","level":2,"score":0.4715184},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.46100587},{"id":"https://openalex.org/C135783594","wikidata":"https://www.wikidata.org/wiki/Q5678864","display_name":"Hash chain","level":3,"score":0.42817876},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.41212392},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.35727906},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.08654922},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/eurmic.2000.874532","pdf_url":null,"source":{"id":"https://openalex.org/S4306523719","display_name":"Proceedings of the 26th Euromicro Conference. EUROMICRO 2000. Informatics: Inventing the Future","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Partnerships for the goals","score":0.52,"id":"https://metadata.un.org/sdg/17"}],"grants":[],"datasets":[],"versions":[],"referenced_works_count":9,"referenced_works":["https://openalex.org/W1493969756","https://openalex.org/W1606551523","https://openalex.org/W1985623009","https://openalex.org/W2002016471","https://openalex.org/W2014830966","https://openalex.org/W2057746492","https://openalex.org/W2070561595","https://openalex.org/W2261333577","https://openalex.org/W4254472329"],"related_works":["https://openalex.org/W4210289650","https://openalex.org/W4200497776","https://openalex.org/W2976219018","https://openalex.org/W2748978416","https://openalex.org/W2121212096","https://openalex.org/W2113619720","https://openalex.org/W2047181319","https://openalex.org/W2011477251","https://openalex.org/W1663728611","https://openalex.org/W122749164"],"abstract_inverted_index":{"The":[0,23,47,69,86,177,199],"quality":[1,196],"of":[2,30,37,50,59,75,78,89,102,134,179],"one-way":[3,31,137,188],"functions":[4,33,161],"determines,":[5],"among":[6],"other":[7,120,208],"parameters,":[8],"to":[9,105,114,147,174,183,193],"great":[10],"extent":[11],"the":[12,53,56,60,64,73,79,83,90,103,119,122,132,136,145,159,170,180,184,212],"security":[13,35],"grant":[14],"provided":[15],"by":[16,140,162],"cryptographic":[17],"protocols":[18],"which":[19],"rely":[20],"on":[21,127],"them.":[22,176],"authors":[24],"propose":[25],"a":[26,100,115],"novel":[27],"evaluation":[28],"methodology":[29,48,182,201],"hash":[32,91,138,160,194],"for":[34,43],"mechanisms":[36],"electronic":[38],"commerce":[39],"systems,":[40],"such":[41],"as":[42],"instance":[44],"digital":[45],"signatures.":[46],"consists":[49],"three":[51],"parts:":[52],"bit-variance":[54,70],"test,":[55],"entropy":[57,87],"assessment":[58,88],"digests":[61],"produced":[62],"and":[63,98,166],"hash-function":[65],"non":[66,123],"modeling":[67,124,135,158],"test.":[68],"test":[71,125],"shows":[72],"impact":[74],"small":[76],"changes":[77],"input":[80],"message":[81],"in":[82,157,168,205,211],"digest":[84],"output.":[85],"function":[92,139,189,195],"values":[93],"is":[94],"its":[95,191],"information":[96],"measure,":[97],"therefore":[99],"measure":[101],"difficulty":[104],"find":[106],"two":[107],"or":[108],"more":[109],"messages":[110],"that":[111],"lend":[112],"themselves":[113],"given":[116],"digest.":[117],"On":[118],"hand,":[121],"(based":[126],"neural":[128,141],"networks)":[129],"should":[130],"show":[131],"impossibility":[133],"network":[142],"architectures,":[143],"having":[144],"ability":[146],"approximate":[148],"arbitrary":[149],"real":[150],"functions.":[151],"Otherwise,":[152],"it":[153],"would":[154],"indicate":[155],"feasibility":[156],"artificial":[163],"intelligence":[164],"techniques,":[165],"consequently":[167],"reducing":[169],"processing":[171],"effort":[172],"required":[173],"break":[175],"application":[178],"suggested":[181],"well":[185],"known":[186],"MD5":[187],"reveals":[190],"potential":[192],"characteristic":[197],"evaluation.":[198],"proposed":[200],"may":[202],"be":[203],"applied":[204],"conjunction":[206],"with":[207],"methods":[209],"described":[210],"technical":[213],"literature.":[214]},"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W2127058207","counts_by_year":[{"year":2017,"cited_by_count":1},{"year":2016,"cited_by_count":1},{"year":2015,"cited_by_count":1},{"year":2012,"cited_by_count":3}],"updated_date":"2024-12-12T18:03:34.258040","created_date":"2016-06-24"}