{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,28]],"date-time":"2026-02-28T13:01:22Z","timestamp":1772283682441,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":11,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540359074","type":"print"},{"value":"9783540359081","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1007\/11787006_15","type":"book-chapter","created":{"date-parts":[[2006,6,28]],"date-time":"2006-06-28T23:23:09Z","timestamp":1151536989000},"page":"168-179","source":"Crossref","is-referenced-by-count":16,"title":["A Tight Bound for EMAC"],"prefix":"10.1007","author":[{"given":"Krzysztof","family":"Pietrzak","sequence":"first","affiliation":[]}],"member":"297","reference":[{"issue":"3","key":"15_CR1","doi-asserted-by":"publisher","first-page":"362","DOI":"10.1006\/jcss.1999.1694","volume":"61","author":"M. Bellare","year":"2000","unstructured":"Bellare, M., Kilian, J., Rogaway, P.: The security of the cipher block chaining message authentication code. Journal of Computer and System Sciences\u00a061(3), 362\u2013399 (2000) Earlier version in Crypto\u00a0 1994.","journal-title":"Journal of Computer and System Sciences"},{"key":"15_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","DOI":"10.1007\/3-540-60640-8","volume-title":"Integrity Primitives for Secure Information Systems","author":"A. Bosselaers","year":"1995","unstructured":"Bosselaers, A., Preneel, B.: RIPE 1992. LNCS, vol.\u00a01007. Springer, Heidelberg (1995)"},{"key":"15_CR3","unstructured":"Mihir Bellare, Krzysztof Pietrzak, and Phillip Rogaway. Improved security analyses for CBC MACs. In Proc.\u00a0Crypto\u00a0\u201905. Full Version on www.crypto.ethz.ch\/~pietrzak\/publications.html ."},{"key":"15_CR4","doi-asserted-by":"crossref","unstructured":"Black, J., Rogaway, P.: CBC MACs for arbitrary-length messages: The three-key constructions. In: Proc.\u00a0Crypto\u00a0 2000,","DOI":"10.1007\/3-540-44598-6_12"},{"key":"15_CR5","doi-asserted-by":"publisher","first-page":"143","DOI":"10.1016\/0022-0000(79)90044-8","volume":"18","author":"L. Carter","year":"1979","unstructured":"Carter, L., Wegman, M.N.: Universal classes of hash functions. Journal of Computer and System Sciences (JCSS)\u00a018, 143\u2013154 (1979)","journal-title":"Journal of Computer and System Sciences (JCSS)"},{"key":"15_CR6","doi-asserted-by":"crossref","unstructured":"Dodis, Y., Gennaro, R., H\u00e5stad, J., Krawczyk, H., Rabin, T.: Randomness Extraction and Key Derivation Using the CBC, Cascade and HMAC Modes. In: Proc. Crypto\u00a0 (2004)","DOI":"10.1007\/978-3-540-28628-8_30"},{"key":"15_CR7","unstructured":"Dodis, Y.: Personal Communication (2005)"},{"key":"15_CR8","volume-title":"An Introduction to the Theory of Numbers","author":"G. Hardy","year":"1980","unstructured":"Hardy, G., Wright, E.: An Introduction to the Theory of Numbers. Oxford University Press, Oxford (1980)"},{"key":"15_CR9","doi-asserted-by":"crossref","unstructured":"Maurer, U.: Indistinguishability of random systems. In: Proc.\u00a0Eurocrypt (2002)","DOI":"10.1007\/3-540-46035-7_8"},{"key":"15_CR10","unstructured":"NESSIE. European project ist-1999-12324 on new european schemes for signature, integrity and encryption. http:\/\/www.cryptonessie.org"},{"key":"15_CR11","doi-asserted-by":"crossref","unstructured":"Petrank, E., Rackoff, C.: Cbc mac for real-time data sources. Journal of Computer and System Sciences, 315\u2013338 (2000)","DOI":"10.1007\/s001450010009"}],"container-title":["Lecture Notes in Computer Science","Automata, Languages and Programming"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11787006_15.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T07:20:02Z","timestamp":1619508002000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11787006_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"ISBN":["9783540359074","9783540359081"],"references-count":11,"URL":"https:\/\/doi.org\/10.1007\/11787006_15","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2006]]}}}