{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,24]],"date-time":"2026-01-24T23:26:14Z","timestamp":1769297174908,"version":"3.49.0"},"publisher-location":"Berlin, Heidelberg","reference-count":18,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540006220","type":"print"},{"value":"9783540364924","type":"electronic"}],"license":[{"start":{"date-parts":[[2003,1,1]],"date-time":"2003-01-01T00:00:00Z","timestamp":1041379200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2003]]},"DOI":"10.1007\/3-540-36492-7_6","type":"book-chapter","created":{"date-parts":[[2007,10,23]],"date-time":"2007-10-23T19:36:10Z","timestamp":1193168170000},"page":"62-75","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":154,"title":["Encryption-Scheme Security in the Presence of Key-Dependent Messages"],"prefix":"10.1007","author":[{"given":"John","family":"Black","sequence":"first","affiliation":[]},{"given":"Phillip","family":"Rogaway","sequence":"additional","affiliation":[]},{"given":"Thomas","family":"Shrimpton","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2003,2,17]]},"reference":[{"issue":"1","key":"6_CR1","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1006\/inco.1998.2740","volume":"148","author":"M. Abadi","year":"1999","unstructured":"M. Abadi and A. Gordon. A calculus for cryptographic protocols: The spi calculus. Information and Computation, 148(1):1\u201370, January 1999. An extended version appeared as Digital Equipment Corporation Systems Research Center report No. 149, January 1998.","journal-title":"Information and Computation"},{"key":"6_CR2","doi-asserted-by":"crossref","unstructured":"M. Abadi and P. Rogaway. Reconciling two views of cryptography: The computational soundness of formal encryption. In IFIP International Conference on Theoretical Computer Science, August 2000.","DOI":"10.1007\/3-540-44929-9_1"},{"key":"6_CR3","unstructured":"M. Bellare, A. Desai, E. Jokipii, and P. Rogaway. A concrete security treatment of symmetric encryption: analysis of the DES modes of operation. In Proceedings of 38th Annual Symposium on Foundations of Computer Science (FOCS 97), 1997."},{"key":"6_CR4","series-title":"Lect Notes Comput Sci","first-page":"232","volume-title":"Advances in Cryptology-CRYPTO\u2019 98","author":"M. Bellare","year":"1998","unstructured":"M. Bellare, A. Desai, D. Pointcheval, and P. Rogaway. Relations among notions of security for public-key encryption schemes. In H. Krawczyk, editor, Advances in Cryptology-CRYPTO\u2019 98, volume 1462 of Lecture Notes in Computer Science, pages 232\u2013249. Springer-Verlag, 1998."},{"key":"6_CR5","doi-asserted-by":"crossref","unstructured":"M. Bellare and P. Rogaway. Random oracles are practical: A paradigm for designing efficient protocols. In Proceedings of the 1st ACM Conference on Computer and Communications Security, pages 62\u201373, 1993.","DOI":"10.1145\/168588.168596"},{"key":"6_CR6","doi-asserted-by":"crossref","unstructured":"M. Burrows, M. Abadi, and R. Needham. A logic of authentication. Proceedings of the Royal Society of London A, 426:233\u2013271, 1989. A preliminary version appeared as Digital Equipment Corporation Systems Research Center report No. 39, February 1989.","DOI":"10.1098\/rspa.1989.0125"},{"key":"6_CR7","series-title":"Lect Notes Comput Sci","volume-title":"Advances in Cryptology-EUROCRYPT\u2019 01","author":"J. Camenisch","year":"2001","unstructured":"J. Camenisch and A. Lysyanskaya. \u201cEfficient non-transferable anonymous multishow credential system with optional anonymity revocation\u201d. In Advances in Cryptology-EUROCRYPT\u2019 01, Lecture Notes in Computer Science. Springer-Verlag, 2001."},{"key":"6_CR8","unstructured":"D. Dolev, C. Dwork, and M. Naor. Non-malleable cryptography. To appear in SIAM J. on Computing. Earlier version in STOC 91, 1998."},{"issue":"12","key":"6_CR9","doi-asserted-by":"publisher","first-page":"198","DOI":"10.1109\/TIT.1983.1056650","volume":"IT-29","author":"D. Dolev","year":"1983","unstructured":"D. Dolev and A. Yao. On the security of public key protocols. IEEE Transactions on Information Theory, IT-29(12):198\u2013208, March 1983.","journal-title":"IEEE Transactions on Information Theory"},{"key":"6_CR10","series-title":"Lect Notes Comput Sci","volume-title":"Advances in Cryptology-EUROCRYPT\u2019 99","author":"M. Fischlin","year":"1999","unstructured":"M. Fischlin. \u201cPseudorandom function tribe ensembles based on one-way permutations: Improvements and applications\u201d. In Advances in Cryptology-EUROCRYPT\u2019 99, Lecture Notes in Computer Science. Springer-Verlag, 1999."},{"key":"6_CR11","doi-asserted-by":"publisher","first-page":"270","DOI":"10.1016\/0022-0000(84)90070-9","volume":"28","author":"S. Goldwasser","year":"1984","unstructured":"S. Goldwasser and S. Micali. Probabilistic encryption. Journal of Computer and System Sciences, 28:270\u2013299, April 1984.","journal-title":"Journal of Computer and System Sciences"},{"issue":"1","key":"6_CR12","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1007\/s001450010015","volume":"14","author":"J. Kilian","year":"2001","unstructured":"J. Kilian and P. Rogaway. How to protect DES against exhaustive key search. Journal of Cryptology, 14(1):17\u201335, 2001. Earlier version in CRYPTO\u2019 96.","journal-title":"Journal of Cryptology"},{"key":"6_CR13","doi-asserted-by":"crossref","unstructured":"P. Lincoln, J. Mitchell, M. Mitchell, and A. Scedrov. A probabilistic poly-time framework for protocol analysis. In Proceedings of the Fifth ACM Conference on Computer and Communications Security, pages 112\u2013121, 1998.","DOI":"10.1145\/288090.288117"},{"key":"6_CR14","unstructured":"S. Micali. Personal communication, circa 1985."},{"issue":"1\u20132","key":"6_CR15","doi-asserted-by":"publisher","first-page":"85","DOI":"10.3233\/JCS-1998-61-205","volume":"6","author":"L. Paulson","year":"1998","unstructured":"L. Paulson. The inductive approach to verifying cryptographic protocols. Journal of Computer Security, 6(1\u20132):85\u2013128, 1998.","journal-title":"Journal of Computer Security"},{"key":"6_CR16","doi-asserted-by":"publisher","first-page":"59","DOI":"10.1016\/S1571-0661(04)00095-7","volume":"32","author":"Birgit Pfitzmann","year":"2000","unstructured":"B. Pfitzmann, M. Schunter, and M. Waidner. Cryptographic security of reactive systems (extended abstract). Electronic Notes in Theoretical Computer Science, 32, April 2000.","journal-title":"Electronic Notes in Theoretical Computer Science"},{"key":"6_CR17","doi-asserted-by":"crossref","unstructured":"B. Pfitzmann and M. Waidner. \u201cComposition and integrity preservation of secure reactive systems\u201d. IBM Research Report RZ 3234, #93280, June 2000.","DOI":"10.1145\/352600.352639"},{"key":"6_CR18","series-title":"Lect Notes Comput Sci","volume-title":"Advances in Cryptology-CRYPTO\u2019 94","author":"C. Rackoff","year":"1994","unstructured":"C. Rackoff and D. Simon. Non-interactive zero-knowledge proof of knowledge and chosen ciphertext attack. In Advances in Cryptology-CRYPTO\u2019 94, Lecture Notes in Computer Science. Springer-Verlag, 1994."}],"container-title":["Lecture Notes in Computer Science","Selected Areas in Cryptography"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-36492-7_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,5,14]],"date-time":"2023-05-14T09:42:36Z","timestamp":1684057356000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-36492-7_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2003]]},"ISBN":["9783540006220","9783540364924"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/3-540-36492-7_6","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2003]]},"assertion":[{"value":"17 February 2003","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}