{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,1]],"date-time":"2025-10-01T16:29:32Z","timestamp":1759336172552},"publisher-location":"Berlin, Heidelberg","reference-count":27,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540265412"},{"type":"electronic","value":"9783540316695"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005]]},"DOI":"10.1007\/11502760_1","type":"book-chapter","created":{"date-parts":[[2010,7,14]],"date-time":"2010-07-14T21:36:47Z","timestamp":1279143407000},"page":"1-17","source":"Crossref","is-referenced-by-count":31,"title":["A New MAC Construction ALRED and a Specific Instance ALPHA-MAC"],"prefix":"10.1007","author":[{"given":"Joan","family":"Daemen","sequence":"first","affiliation":[]},{"given":"Vincent","family":"Rijmen","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"1_CR1","unstructured":"ANSI X9.19, Financial institution retail message authentication. American Bankers Association (1986)"},{"key":"1_CR2","unstructured":"Federal Information Processing Standard 180-2, Secure Hash Standard, National Institute of Standards and Technology, U.S. Department of Commerce (August 2002)"},{"key":"1_CR3","unstructured":"Federal Information Processing Standard 197, Advanced Encryption Standard (AES), National Institute of Standards and Technology, U.S. Department of Commerce (November 2001)"},{"key":"1_CR4","unstructured":"Federal Information Processing Standard 198, The Keyed-Hash Message Authentication Code (HMAC), National Institute of Standards and Technology, U.S. Department of Commerce (March 2002)"},{"key":"1_CR5","unstructured":"ISO\/IEC 9797-1, Information technology - Security Techniques - Message Authentication Codes (MACs) - Part 1: Mechanisms using a block cipher, ISO (1999)"},{"key":"1_CR6","unstructured":"Performance of optimized implementations of the NESSIE primitives, version 2.0, The NESSIE Consortium (2003), https:\/\/www.cosic.esat.kuleuven.ac.be\/nessie\/deliverables\/D21-v2.pdf"},{"key":"1_CR7","series-title":"Lecture Notes in Computer Science","first-page":"1","volume-title":"Advances in Cryptology - CRYPTO \u201996","author":"M. Bellare","year":"1996","unstructured":"Bellare, M., Canetti, R., Krawczyk, H.: Keying hash functions for message authentication. In: Koblitz, N. (ed.) CRYPTO 1996. LNCS, vol.\u00a01109, pp. 1\u201315. Springer, Heidelberg (1996)"},{"key":"1_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"216","DOI":"10.1007\/3-540-48405-1_14","volume-title":"Advances in Cryptology - CRYPTO \u201999","author":"J. Black","year":"1999","unstructured":"Black, J., Halevi, S., Krawczyk, H., Krovetz, T., Rogaway, P.: UMAC: Fast and secure message authentication. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol.\u00a01666, pp. 216\u2013233. Springer, Heidelberg (1999)"},{"key":"1_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"197","DOI":"10.1007\/3-540-44598-6_12","volume-title":"Advances in Cryptology - CRYPTO 2000","author":"J.A. Black","year":"2000","unstructured":"Black, J.A., Rogaway, P.: CBC mACs for arbitrary-length messages:The three-key constructions. In: Bellare, M. (ed.) CRYPTO 2000. LNCS, vol.\u00a01880, pp. 197\u2013215. Springer, Heidelberg (2000)"},{"key":"1_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"314","DOI":"10.1007\/3-540-45537-X_25","volume-title":"Selected Areas in Cryptography","author":"B. Boer den","year":"2001","unstructured":"den Boer, B., Van Rompay, B., Preneel, B., Vandewalle, J.: New (Two-track-)MAC based on the two trails of RIPEMD. In: Vaudenay, S., Youssef, A.M. (eds.) SAC 2001. LNCS, vol.\u00a02259, pp. 314\u2013324. Springer, Heidelberg (2001)"},{"key":"1_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/3-540-47719-5_2","volume-title":"Information Security and Privacy","author":"K. Brincat","year":"2001","unstructured":"Brincat, K., Mitchell, C.J.: New CBC-MAC forgery attacks. In: Varadharajan, V., Mu, Y. (eds.) ACISP 2001. LNCS, vol.\u00a02119, pp. 3\u201314. Springer, Heidelberg (2001)"},{"key":"1_CR12","doi-asserted-by":"publisher","first-page":"1626","DOI":"10.1049\/el:19991119","volume":"35","author":"D. Coppersmith","year":"1999","unstructured":"Coppersmith, D., Mitchell, C.J.: Attacks on MacDES MAC Algorithm. Electronics Letters\u00a035, 1626\u20131627 (1999)","journal-title":"Electronics Letters"},{"key":"1_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"184","DOI":"10.1007\/3-540-44598-6_11","volume-title":"Advances in Cryptology - CRYPTO 2000","author":"D. Coppersmith","year":"2000","unstructured":"Coppersmith, D., Knudsen, L.R., Mitchell, C.J.: Key recovery and forgery attacks on the macDES MAC algorithm. In: Bellare, M. (ed.) CRYPTO 2000. LNCS, vol.\u00a01880, pp. 184\u2013196. Springer, Heidelberg (2000)"},{"key":"1_CR14","unstructured":"Daemen, J., Rijmen, V.: AES Proposal: Rijndael. AES Round 1 Technical Evaluation CD-1: Documentation, National Institute of Standards and Technology (August 1998)"},{"key":"1_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"393","DOI":"10.1007\/3-540-39568-7_30","volume-title":"Advances in Cryptology","author":"D.W. Davies","year":"1985","unstructured":"Davies, D.W.: A message authenticator algorithm suitable for a mainframe computer. In: Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol.\u00a0196, pp. 393\u2013400. Springer, Heidelberg (1985)"},{"key":"1_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"129","DOI":"10.1007\/978-3-540-39887-5_11","volume-title":"Fast Software Encryption","author":"T. Iwata","year":"2003","unstructured":"Iwata, T., Kurosawa, K.: OMAC: One-key CBC MAC. In: Johansson, T. (ed.) FSE 2003. LNCS, vol.\u00a02887, pp. 129\u2013153. Springer, Heidelberg (2003)"},{"key":"1_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"237","DOI":"10.1007\/3-540-45661-9_19","volume-title":"Fast Software Encryption","author":"\u00c9. Jaulmes","year":"2002","unstructured":"Jaulmes, \u00c9., Joux, A., Valette, F.: On the security of randomized CBC-MAC beyond the birthday paradox limit: A new construction. In: Daemen, J., Rijmen, V. (eds.) FSE 2002. LNCS, vol.\u00a02365, pp. 237\u2013251. Springer, Heidelberg (2002)"},{"key":"1_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"170","DOI":"10.1007\/978-3-540-39887-5_13","volume-title":"Fast Software Encryption","author":"A. Joux","year":"2003","unstructured":"Joux, A., Poupard, G., Stern, J.: New attacks against standardized mACs. In: Johansson, T. (ed.) FSE 2003. LNCS, vol.\u00a02887, pp. 170\u2013181. Springer, Heidelberg (2003)"},{"issue":"9","key":"1_CR19","doi-asserted-by":"publisher","first-page":"871","DOI":"10.1049\/el:19980586","volume":"34","author":"L.R. Knudsen","year":"1998","unstructured":"Knudsen, L.R., Preneel, B.: MacDES: a new MAC algorithm based on DES. Electronics Letters\u00a034(9), 871\u2013873 (1998)","journal-title":"Electronics Letters"},{"key":"1_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"196","DOI":"10.1007\/3-540-60590-8_16","volume-title":"Fast Software Encryption","author":"L.R. Knudsen","year":"1995","unstructured":"Knudsen, L.R.: Truncated and higher order differentials. In: Preneel, B. (ed.) FSE 1994. LNCS, vol.\u00a01008, pp. 196\u2013211. Springer, Heidelberg (1995)"},{"key":"1_CR21","doi-asserted-by":"crossref","unstructured":"Knudsen, L.R., Mitchell, C.J.: Partial key recovery attack against RMAC. Journal of Cryptology (to appear)","DOI":"10.1007\/s00145-004-0324-7"},{"key":"1_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"265","DOI":"10.1007\/3-540-36563-X_3","volume-title":"Topics in Cryptology - CT-RSA 2003","author":"K. Kurosawa","year":"2003","unstructured":"Kurosawa, K., Iwata, T.: TMAC: Two-key CBC MAC. In: Joye, M. (ed.) CT-RSA 2003. LNCS, vol.\u00a02612, pp. 265\u2013273. Springer, Heidelberg (2003)"},{"key":"1_CR23","volume-title":"Handbook of Applied Cryptography","author":"A.J. Menezes","year":"1997","unstructured":"Menezes, A.J., van Oorschot, P.C., Vanstone, S.A.: Handbook of Applied Cryptography. CRC Press, Boca Raton (1997)"},{"key":"1_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/3-540-60590-8","volume-title":"Advances in Cryptology - CRYPTO \u201995","author":"B. Preneel","year":"1995","unstructured":"Preneel, B., van Oorschot, P.C.: MDx-MAC and building fast mACs from hash functions. In: Coppersmith, D. (ed.) CRYPTO 1995. LNCS, vol.\u00a0963, pp. 1\u201314. Springer, Heidelberg (1995)"},{"key":"1_CR25","doi-asserted-by":"publisher","first-page":"1568","DOI":"10.1049\/el:19961045","volume":"32","author":"B. Preneel","year":"1996","unstructured":"Preneel, B., van Oorschot, P.C.: A key recovery attack on the ANSI X9.19 retail MAC. Electronics Letters\u00a032, 1568\u20131569 (1996)","journal-title":"Electronics Letters"},{"issue":"1","key":"1_CR26","doi-asserted-by":"publisher","first-page":"188","DOI":"10.1109\/18.746787","volume":"IT-45","author":"B. Preneel","year":"1999","unstructured":"Preneel, B., van Oorschot, P.C.: On the security of iterated Message Authentication Codes. IEEE Trans. on Information Theory\u00a0IT-45(1), 188\u2013199 (1999)","journal-title":"IEEE Trans. on Information Theory"},{"key":"1_CR27","doi-asserted-by":"crossref","unstructured":"Rivest, R.: The MD4 message digest algorithm, Network Working Group Request for Comments:1186 (1990)","DOI":"10.17487\/rfc1186"}],"container-title":["Lecture Notes in Computer Science","Fast Software Encryption"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11502760_1.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,17]],"date-time":"2020-11-17T20:02:22Z","timestamp":1605643342000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11502760_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005]]},"ISBN":["9783540265412","9783540316695"],"references-count":27,"URL":"https:\/\/doi.org\/10.1007\/11502760_1","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2005]]}}}