{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,25]],"date-time":"2025-04-25T10:06:12Z","timestamp":1745575572697},"publisher-location":"Berlin, Heidelberg","reference-count":28,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540006220"},{"type":"electronic","value":"9783540364924"}],"license":[{"start":{"date-parts":[[2003,1,1]],"date-time":"2003-01-01T00:00:00Z","timestamp":1041379200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2003]]},"DOI":"10.1007\/3-540-36492-7_7","type":"book-chapter","created":{"date-parts":[[2007,10,23]],"date-time":"2007-10-23T23:36:10Z","timestamp":1193182570000},"page":"76-93","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":46,"title":["On the Security of CTR + CBC-MAC"],"prefix":"10.1007","author":[{"given":"Jakob","family":"Jonsson","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2003,2,17]]},"reference":[{"key":"7_CR1","doi-asserted-by":"crossref","unstructured":"J. H. An and M. Bellare. Does Encryption with Redundancy Provide Authenticity? Advances in Cryptology \u2014 EUROCRYPT 2001, pp. 512\u2013528, Springer Verlag, 2001.","DOI":"10.1007\/3-540-44987-6_31"},{"key":"7_CR2","unstructured":"M. Bellare, A. Desai, E. Jokipii, and P. Rogaway. A Concrete Security Treatment of Symmetric Encryption: Analysis of the DES Modes of Operation. Proceedings of 38th Annual Symposium on Foundations of Computer Science (FOCS 97), IEEE, 1997."},{"issue":"3","key":"7_CR3","doi-asserted-by":"publisher","first-page":"362","DOI":"10.1006\/jcss.1999.1694","volume":"61","author":"M. Bellare","year":"2000","unstructured":"M. Bellare, J. Kilian, P. Rogaway. The Security of the Cipher Block Chaining Message Authentication Code. Journal of Computer and System Sciences, 61 (3), 362\u2013399, 2000.","journal-title":"Journal of Computer and System Sciences"},{"key":"7_CR4","doi-asserted-by":"crossref","unstructured":"M. Bellare and C. Namprempre. Authenticated Encryption: Relations Among Notions and Analysis of the Generic Composition Paradigm. Advances in Cryptology \u2014 ASIACRYPT 2000, pp. 531\u2013545, Springer-Verlag, 2000.","DOI":"10.1007\/3-540-44448-3_41"},{"key":"7_CR5","doi-asserted-by":"crossref","unstructured":"M. Bellare and P. Rogaway. Optimal Asymmetric Encryption-How to Encrypt with RSA. Advances in Cryptology \u2014 Eurocrypt\u2019 94, pp. 92\u2013111, Springer Verlag, 1994.","DOI":"10.1007\/BFb0053428"},{"key":"7_CR6","doi-asserted-by":"crossref","unstructured":"M. Bellare and P. Rogaway. Encode-Then-Encipher Encryption: How to Exploit Nonces or Redundancy in Plaintexts for Efficient Encryption. Advances in Cryptology \u2014 ASIACRYPT 2000, pp. 317\u2013330, Springer-Verlag, 2000.","DOI":"10.1007\/3-540-44448-3_24"},{"key":"7_CR7","unstructured":"J. Daemen and V. Rijmen. AES Proposal: Rijndael. Contribution to NIST, September 1999. Available from \nhttp:\/\/csrc.nist.gov\/encryption\/aes\/rijndael\/\n\n."},{"issue":"3","key":"7_CR8","doi-asserted-by":"publisher","first-page":"397","DOI":"10.1109\/PROC.1979.11256","volume":"67","author":"W. Diffie","year":"1979","unstructured":"W. Diffie and M. Hellman. Privacy and Authentication: An Introduction to Cryptography. Proceedings of the IEEE, 67, pp. 397\u2013427, 1979.","journal-title":"Proceedings of the IEEE"},{"key":"7_CR9","unstructured":"N. Ferguson. Collision Attacks on OCB. Preprint, February 2002."},{"key":"7_CR10","unstructured":"V. Gligor, P. Donescu. Infinite Garble Extension. Contribution to NIST, 2000. Available from \nhttp:\/\/csrc.nist.gov\/encryption\/modes\/proposedmodes\/\n\n."},{"key":"7_CR11","unstructured":"H. Handschuh and D. Naccache. SHACAL. Contribution to the NESSIE project, 2000."},{"key":"7_CR12","doi-asserted-by":"crossref","unstructured":"IEEE Std 1363-2000. Standard Specifications for Public Key Cryptography. IEEE, 2000.","DOI":"10.1016\/S1353-4858(00)03013-0"},{"key":"7_CR13","unstructured":"ISO\/IEC 9797: Information Technology-Security Techniques-Data Integrity Mechanism Using a Cryptographic Check Function Employing a Block Cipher Algorithm. Second edition, 1994."},{"key":"7_CR14","doi-asserted-by":"crossref","unstructured":"\u00c9. Jaulmes, A Joux and F. Valette. On the Security of Randomized CBC-MAC Beyond the Birthday Paradox Limit-A New Construction. Fast Software Encryption, 9th International Workshop, FSE 2002, to appear.","DOI":"10.1007\/3-540-45661-9_19"},{"key":"7_CR15","doi-asserted-by":"crossref","unstructured":"C. S. Jutla. Encryption Modes with Almost Free Message Integrity. Contribution to NIST, 2000. Available from \nhttp:\/\/csrc.nist.gov\/encryption\/modes\/proposedmodes\/\n\n.","DOI":"10.1007\/3-540-44987-6_32"},{"key":"7_CR16","doi-asserted-by":"crossref","unstructured":"C. S. Jutla. Parallelizable Encryption Mode with Almost Free Message Integrity. Contribution to NIST, 2000. Available from \nhttp:\/\/csrc.nist.gov\/encryption\/modes\/proposedmodes\/\n\n.","DOI":"10.1007\/3-540-44987-6_32"},{"key":"7_CR17","doi-asserted-by":"publisher","first-page":"284","DOI":"10.1007\/3-540-44706-7_20","volume-title":"Fast Software Encryption","author":"Jonathan Katz","year":"2001","unstructured":"J. Katz and M. Yung. Unforgeable Encryption and Chosen-Ciphertext-Secure Modes of Operation. Fast Software Encryption 2000, pp. 284\u2013299, 2000."},{"key":"7_CR18","doi-asserted-by":"crossref","unstructured":"H. Krawczyk. The Order of Encryption and Authentication for Protecting Communications (or: How Secure Is SSL?). Advances in Cryptology \u2014 CRYPTO 2001, pp. 310\u2013331, Springer Verlag, 2001.","DOI":"10.1007\/3-540-44647-8_19"},{"key":"7_CR19","doi-asserted-by":"crossref","unstructured":"M. Liskov, R. L. Rivest and D. Wagner. Tweakable Block Ciphers. Advances in Cryptology \u2014 CRYPTO 2002, Springer Verlag, 2002.","DOI":"10.1007\/3-540-45708-9_3"},{"key":"7_CR20","unstructured":"A. Menezes, P. van Oorschot and S. Vanstone. Handbook of Applied Cryptography. CRC Press, 1996."},{"key":"7_CR21","unstructured":"21. National Institute of Standards and Technology (NIST). FIPS Publication 81: DES Modes of Operation. December 1980."},{"key":"7_CR22","unstructured":"National Institute of Standards and Technology (NIST). FIPS Publication 180-1: Secure Hash Standard (SHS). April 1995."},{"key":"7_CR23","unstructured":"National Institute of Standards and Technology (NIST). FIPS Publication 197: Advanced Encryption Standard (AES). November 2001."},{"issue":"3","key":"7_CR24","doi-asserted-by":"publisher","first-page":"315","DOI":"10.1007\/s001450010009","volume":"13","author":"E. Petrank","year":"2000","unstructured":"E. Petrank, C. Racko.. CBC MAC for Real-Time Data Sources. Journal of Cryptology, 13 (3), pp. 315\u2013338, 2000.","journal-title":"Journal of Cryptology"},{"key":"7_CR25","unstructured":"P. Rogaway. IEEE 802.11-01\/156r0: Some Comments on WHF Mode. March 2002. Available from \nhttp:\/\/www.cs.ucdavis.edu\/~rogaway\/ocb\/ocb-doc.htm\n\n."},{"key":"7_CR26","doi-asserted-by":"crossref","unstructured":"P. Rogaway, M. Bellare, J. Black and T. Krovetz. OCB: A Block-Cipher Mode of Operation for Efficient Authenticated Encryption. 8th ACM Conference on Computer and Communications Security (CCS-8), pp. 196\u2013205. ACM Press, 2001.","DOI":"10.1145\/501983.502011"},{"key":"7_CR27","unstructured":"D. Whiting, R. Housley and N. Ferguson. IEEE 802.11-02\/001r2: AES Encryption & Authentication Using CTR Mode & CBC-MAC. March 2002."},{"key":"7_CR28","doi-asserted-by":"crossref","unstructured":"D. Whiting, R. Housley and N. Ferguson. Counter with CBC-MAC (CCM), AES Mode of Operation Contribution to NIST, May 2002. Available from \nhttp:\/\/csrc.nist.gov\/encryption\/modes\/proposedmodes\/","DOI":"10.17487\/rfc3610"}],"container-title":["Lecture Notes in Computer Science","Selected Areas in Cryptography"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-36492-7_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,1,16]],"date-time":"2020-01-16T08:03:38Z","timestamp":1579161818000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-36492-7_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2003]]},"ISBN":["9783540006220","9783540364924"],"references-count":28,"URL":"https:\/\/doi.org\/10.1007\/3-540-36492-7_7","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2003]]},"assertion":[{"value":"17 February 2003","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}