{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T23:41:22Z","timestamp":1725493282257},"publisher-location":"Berlin, Heidelberg","reference-count":7,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540006220"},{"type":"electronic","value":"9783540364924"}],"license":[{"start":{"date-parts":[[2003,1,1]],"date-time":"2003-01-01T00:00:00Z","timestamp":1041379200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2003]]},"DOI":"10.1007\/3-540-36492-7_23","type":"book-chapter","created":{"date-parts":[[2007,10,23]],"date-time":"2007-10-23T23:36:10Z","timestamp":1193182570000},"page":"353-368","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["An Efficient MAC for Short Messages"],"prefix":"10.1007","author":[{"given":"Sarvar","family":"Patel","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2003,2,17]]},"reference":[{"key":"23_CR1","unstructured":"M. Bellare, R. Canetti, and H. Krawczyk. Keying hash functions for message authentication. CRYPTO 96."},{"key":"23_CR2","doi-asserted-by":"crossref","unstructured":"H. Krawczyk, M. Bellare, and R. Canetti. HMAC: Keyed-hash functions for message authentication, IETF RFC-2104, Feb 1997.","DOI":"10.17487\/rfc2104"},{"key":"23_CR3","unstructured":"M. Bellare, J. Kilian and P. Rogaway. The security of cipher block chaining. CRYPTO 94"},{"issue":"2","key":"23_CR4","doi-asserted-by":"publisher","first-page":"281","DOI":"10.1137\/0217017","volume":"17","author":"Shafi Goldwasser","year":"1988","unstructured":"O. Goldwasser, S. Micali, and R. Rivest. A digital Signature Scheme Secure Against Adaptive Chosen-Message Attacks. Siam Journal of Computing, 1988, pg 281\u2013308.","journal-title":"SIAM Journal on Computing"},{"key":"23_CR5","unstructured":"B. Preneel and P.C. van Oorschot. MD-x MAC and building fast MACs from hash functions, CRYPTO 95."},{"key":"23_CR6","doi-asserted-by":"crossref","unstructured":"R. Rivest. The MD5 message digest algorithm. IETF RFC-1321, 1992.","DOI":"10.17487\/rfc1321"},{"key":"23_CR7","doi-asserted-by":"publisher","first-page":"265","DOI":"10.1016\/0022-0000(81)90033-7","volume":"22","author":"M. Wegman","year":"1981","unstructured":"M. Wegman and L. Carter. New hash funcitons and their use in authentication and set equality. Journal of Computer and System Sciences, 22:265\u2013279, 1981.","journal-title":"Journal of Computer and System Sciences"}],"container-title":["Lecture Notes in Computer Science","Selected Areas in Cryptography"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-36492-7_23","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,1,16]],"date-time":"2020-01-16T08:04:29Z","timestamp":1579161869000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-36492-7_23"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2003]]},"ISBN":["9783540006220","9783540364924"],"references-count":7,"URL":"https:\/\/doi.org\/10.1007\/3-540-36492-7_23","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2003]]},"assertion":[{"value":"17 February 2003","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}