{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,1,12]],"date-time":"2025-01-12T19:40:03Z","timestamp":1736710803496,"version":"3.32.0"},"publisher-location":"Berlin, Heidelberg","reference-count":29,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540673811"},{"type":"electronic","value":"9783540455707"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2000]]},"DOI":"10.1007\/10720107_22","type":"book-chapter","created":{"date-parts":[[2006,12,29]],"date-time":"2006-12-29T15:46:59Z","timestamp":1167407219000},"page":"153-168","source":"Crossref","is-referenced-by-count":7,"title":["Integrity-Aware PCBC Encryption Schemes"],"prefix":"10.1007","author":[{"given":"Virgil D.","family":"Gligor","sequence":"first","affiliation":[]},{"given":"Pompiliu","family":"Donescu","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"22_CR1","doi-asserted-by":"crossref","unstructured":"Baldwin, R., Rivest, R.: RFC 2040: The RC5, RC5-CBC, RC-5CBCPad, and RC5-CTS Algorithms (October 30, 1996), available at ftp:\/\/ds.internic.net\/rfc\/rfc2040.txt","DOI":"10.17487\/rfc2040"},{"key":"22_CR2","doi-asserted-by":"crossref","unstructured":"Bellare, M., Desai, A., Jokipii, E., Rogaway, P.: A Concrete Security Treatment of Symmetric Encryption. In: Proceedings of the 38th Symposium on Foundations of Computer Science, pp. 394\u2013403. IEEE, Los Alamitos (1997), A full version of this paper is available at http:\/\/www-cse.ucsd.edu\/users\/mihir","DOI":"10.1109\/SFCS.1997.646128"},{"key":"#cr-split#-22_CR3.1","doi-asserted-by":"crossref","unstructured":"Bellare, M., Guerin, R., Rogaway, P.: XOR MACs: New methods for message authentication using finite pseudo-random functions. In: Coppersmith, D. (ed.) CRYPTO 1995. LNCS, vol.??963, pp. 15???28. Springer, Heidelberg (1995);","DOI":"10.1007\/3-540-44750-4_2"},{"key":"#cr-split#-22_CR3.2","unstructured":"Also U.S. Patent No. 5,757,913 (May 1998), and U.S. Patent No. 5,673,318 (September 1997)"},{"key":"22_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"341","DOI":"10.1007\/3-540-48658-5_32","volume-title":"Advances in Cryptology - CRYPTO \u201994","author":"M. Bellare","year":"1994","unstructured":"Bellare, M., Killian, J., Rogaway, P.: The security of cipher block chaining. In: Desmedt, Y.G. (ed.) CRYPTO 1994. LNCS, vol.\u00a0839, pp. 341\u2013358. Springer, Heidelberg (1994)"},{"key":"22_CR5","unstructured":"Bellare, M., Rogaway, P.: Block Cipher Mode of Operation for Secure, Length- Preserving Encryption. U.S Patent No. 5,673,319 (September 1997)"},{"key":"22_CR6","doi-asserted-by":"crossref","unstructured":"Bellare, M., Rogaway, P.: On the construction of variable-input-length ciphers. In: Knudsen, L. (ed.) Proceedings of the 6th Workshop on Fast Software Encryption. Springer, Heidelberg (1999)","DOI":"10.1007\/3-540-48519-8_17"},{"key":"22_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"46","DOI":"10.1007\/BFb0055719","volume-title":"Advances in Cryptology - CRYPTO \u201998","author":"S.M. Bellovin","year":"1998","unstructured":"Bellovin, S.M.: Cryptography and the Internet. In: Krawczyk, H. (ed.) CRYPTO 1998. LNCS, vol.\u00a01462, pp. 46\u201355. Springer, Heidelberg (1998)"},{"key":"22_CR8","unstructured":"Open Software Foundation, OSF - Distributed Computing Environment (DCE), Remote Procedure Call Mechanisms, Code Snapshot 3, Release, 1.0, March 17 (1991)"},{"key":"22_CR9","unstructured":"FIPS 81, DES modes of operation, FederalI nformation Processing Standards Publication 81, U.S. Department of Commerce\/National Bureau of Standards, NationalTechnical Information Service, Springfield, Virginia (1980)"},{"key":"22_CR10","unstructured":"FIPS 180-1, Secure hash standard, FederalI nformation Processing Standards Publication 180-1, U.S. Department of Commerce\/N.I.S.T., National Technical Information Service, Springfield, Virginia, April 17 (1995) (supersedes FIPS PUB 180)"},{"key":"#cr-split#-22_CR11.1","doi-asserted-by":"crossref","unstructured":"Gligor, V.D., Lindsay, B.G.: Object Migration and Authentication. IEEE Transactions on Software Engineering, SE-5??6 (November 1979);","DOI":"10.1109\/TSE.1979.230196"},{"key":"#cr-split#-22_CR11.2","unstructured":"Also IBM Research Report RJ 2298 (3l04) (August 1978)"},{"key":"22_CR12","unstructured":"Gligor, V.D.: Integrity Conditions for Symmetric Encryption, University of Maryland, Computer Science Technical Report, CS-TR-3958 (December 1998) (revised April 1999)"},{"key":"22_CR13","unstructured":"Gligor, V.D.: Symmetric Encryption with Random Counters. University of Maryland, Computer Science Technical Report, CS-TR-3968 (December 1998)"},{"key":"22_CR14","unstructured":"Gligor, V.D., Stubblebine, S.G., Donescu, P.: New Integrity-Aware CBC Encryption Schemes. University of Maryland, Computer Science Technical Report, CS-TR-3999 (March 1999) (revised October 1999)"},{"key":"22_CR15","doi-asserted-by":"crossref","unstructured":"Juneman, R.R., Matyas, S.M., Meyer, C.H.: Message Authentication with Manipulation Detection Codes. In: Proc. of the IEEE Symp. on Security and Privacy, Oakland, CA, pp. 33\u201354 (April 1983)","DOI":"10.1109\/SP.1983.10005"},{"key":"22_CR16","doi-asserted-by":"crossref","unstructured":"Kohl, J.T.: The use of encryption in Kerberos for network authentication. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol.\u00a0435, pp. 35\u201343. Springer, Heidelberg (1990)","DOI":"10.1007\/0-387-34805-0_5"},{"key":"22_CR17","unstructured":"Meyer, C.H., Matyas, S.M.: Cryptography; A New Dimension in Computer Data Security. John Wiley & Sons, New York (1982) (second and third printings)"},{"key":"22_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"267","DOI":"10.1007\/BFb0055734","volume-title":"Advances in Cryptology - CRYPTO \u201998","author":"M. Naor","year":"1998","unstructured":"Naor, M., Reingold, O.: From Unpredictability to Indistinguishability: A Simple Construction of Pseudo-Random Functions from MACs. In: Krawczyk, H. (ed.) CRYPTO 1998. LNCS, vol.\u00a01462, pp. 267\u2013282. Springer, Heidelberg (1998)"},{"key":"22_CR19","volume-title":"Handbook of Applied Cryptography","author":"A.J. Menezes","year":"1997","unstructured":"Menezes, A.J., van Oorschot, P.C., Vanstone, S.A.: Handbook of Applied Cryptography. CRC Press, Boca Raton (1997)"},{"key":"22_CR20","unstructured":"Petrank, E., Rackoff, C.: CBC MAC for Real-Time Data Sources. Manuscript (1997), available at http:\/\/philby.ucsd.edu\/cryptolib.html"},{"key":"22_CR21","doi-asserted-by":"crossref","unstructured":"Rivest, R.L.: RFC 1321, The MD5 message-digest algorithm, Internet Request for Comments 1321 (April 1992) (presented at Rump Session of Crypto 1991)","DOI":"10.17487\/rfc1321"},{"key":"22_CR22","doi-asserted-by":"crossref","unstructured":"Kohl, J., Neuman, B.C.: RFC 1510, The Kerberos network authentication service (V5), Internet Request for Comments 1510 (September 1993)","DOI":"10.17487\/rfc1510"},{"key":"22_CR23","unstructured":"Rivest, R.L., Robshaw, M.J.B., Sidney, R., Yin, Y.L.: The RC6 TM Block Cipher. Submitted to the US Department of Commerce, NIST, for consideration as the new Advanced Encryption Standard (AES), available at http:\/\/theory.lcs.mit.edu\/ rivest\/publications.html"},{"key":"22_CR24","doi-asserted-by":"crossref","unstructured":"Stubblebine, S.G., Gligor, V.D.: On message integrity in cryptographic protocols. In: Proceedings of the 1992 IEEE Computer Society Symposium on Research in Security and Privacy, pp. 85\u2013104 (1992)","DOI":"10.1109\/RISP.1992.213268"},{"key":"22_CR25","unstructured":"SSLeay, available at ftp:\/\/ftp.psy.uq.oz.au\/pub\/Crypto\/SSL"},{"key":"22_CR26","doi-asserted-by":"crossref","unstructured":"Touch, J.D.: Performance Analysis of MD5. In: Proceedings of ACM, SIGCOMM 1995, pp. 77\u201386 (1996)","DOI":"10.1145\/217391.217414"},{"key":"22_CR27","doi-asserted-by":"publisher","first-page":"135","DOI":"10.1145\/356909.356913","volume":"15","author":"V.L. Voydock","year":"1983","unstructured":"Voydock, V.L., Kent, S.T.: Security Mechanisms in high-level network protocols. Computing Surveys\u00a015, 135\u2013171 (1983)","journal-title":"Computing Surveys"}],"container-title":["Lecture Notes in Computer Science","Security Protocols"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/10720107_22","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,12]],"date-time":"2025-01-12T18:58:49Z","timestamp":1736708329000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/10720107_22"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2000]]},"ISBN":["9783540673811","9783540455707"],"references-count":29,"URL":"https:\/\/doi.org\/10.1007\/10720107_22","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2000]]}}}