{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T12:59:59Z","timestamp":1742993999971,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":23,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540006220"},{"type":"electronic","value":"9783540364924"}],"license":[{"start":{"date-parts":[[2003,1,1]],"date-time":"2003-01-01T00:00:00Z","timestamp":1041379200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2003]]},"DOI":"10.1007\/3-540-36492-7_8","type":"book-chapter","created":{"date-parts":[[2007,10,23]],"date-time":"2007-10-23T19:36:10Z","timestamp":1193168170000},"page":"94-109","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Single-Path Authenticated-Encryption Scheme Based on Universal Hashing"],"prefix":"10.1007","author":[{"given":"Soichi","family":"Furuya","sequence":"first","affiliation":[]},{"given":"Kouichi","family":"Sakurai","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2003,2,17]]},"reference":[{"key":"8_CR1","unstructured":"M. Bellare, A. Desai, E. Jokipii, and P. Rogaway, \u201cA Concrete Security Treatment of Symmetric Encryption: Analysis of the DES Modes of Operation,\u201d Proceedings of the 38th Symposium on Foundations of Computer Science, IEEE, 1997, full paper is available at \nhttp:\/\/www-cse.ucsd.edu\/users\/mihir\/\n\n."},{"key":"8_CR2","series-title":"Lect Notes Comput Sci","volume-title":"Advances in Cryptology, \u2014CRYPTO\u201996","author":"A. Bosselaers","year":"1996","unstructured":"A. Bosselaers, R. Govaerts, and J. Vandewalle, \u201cFast Hashing on the Pentium,\u201d Advances in Cryptology, \u2014CRYPTO\u201996, LNCSVol. 1109, Springer-Verlag, 1996."},{"key":"8_CR3","series-title":"Lect Notes Comput Sci","volume-title":"Advances in Cryptology, \u2014CRYPTO\u201994","author":"M. Bellare","year":"1994","unstructured":"M. Bellare, J. Kilian, and P. Rogaway, \u201cThe Security of Cipher Block Chaining,\u201d Advances in Cryptology, \u2014CRYPTO\u201994, LNCS Vol. 839, Springer-Verlag, 1994."},{"key":"8_CR4","series-title":"Lect Notes Comput Sci","volume-title":"Advances in Cryptology, \u2014 CRYPTO\u201999","author":"J. Black","year":"1999","unstructured":"J. Black and S. Halevi, H. Krawczyk, T. Krovets, P. Rogaway, \u201cUMAC: Fast and Secure Message Authentication,\u201d Advances in Cryptology, \u2014 CRYPTO\u201999, LNCS Vol. 1666, Springer-Verlag, 1999."},{"key":"8_CR5","doi-asserted-by":"crossref","unstructured":"L. Carter and M. Wegman, \u201cUniversal Hash Functions,\u201d Journal of Computer and System Sciences, Vol. 18, 1979.","DOI":"10.1016\/0022-0000(79)90044-8"},{"key":"8_CR6","series-title":"Lect Notes Comput Sci","volume-title":"Fast Hashing and Stream Encryption with PANAMA","author":"J. Daemen","year":"1998","unstructured":"J. Daemen and C. Clapp, \u201cFast Hashing and Stream Encryption with PANAMA,\u201d Fast Software Encryption, 5th International Workshop, FSE\u201998, Proceedings, LNCS Vol. 1372, Springer-Verlag, 1998."},{"issue":"1","key":"8_CR7","first-page":"58","volume":"E85-A","author":"S. Furuya","year":"2002","unstructured":"S. Furuya, D. Watanabe, Y. Seto, and K. Takaragi, \u201cIntegrity-Aware Mode of Stream Cipher,\u201d IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, Vol. E85-A No.1, pp.58\u201365, 2002.","journal-title":"IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences"},{"key":"8_CR8","series-title":"Lect Notes Comput Sci","volume-title":"MMH: Software Message Authentication in the Gbit\/second Rates","author":"S. Halevi","year":"1997","unstructured":"S. Halevi and H. Krawczyk, \u201cMMH: Software Message Authentication in the Gbit\/second Rates,\u201d Fast Software Encryption, 4th International Workshop, FSE\u201997, LNCS Vol. 1267, Springer-Verlag, 1997."},{"key":"8_CR9","doi-asserted-by":"crossref","unstructured":"V. D. Gligor and P. Donescu, \u201cFast Encryption and Authentication: XCBC Encryption and XECB Authentication Modes,\u201d In Preproceedings of FSE 2001, 8th Fast Software Encryption Workshop, Yokohama Japan, 2001.","DOI":"10.1007\/3-540-45473-X_8"},{"key":"8_CR10","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-44983-3_17","volume-title":"Selected Areas in Cryptography","author":"J. D. Goli\u0107","year":"2001","unstructured":"J. D. Goli\u0107, \u201cModes of Operation of Stream Ciphers,\u201d Selected Areas in Cryptography, 7th Annual International Workshop, SAC 2000 Proceedings, LNCS Vol. 2012, Springer-Verlag, 2001."},{"key":"8_CR11","series-title":"Lect Notes Comput Sci","volume-title":"Advances in Cryptology, \u2014 EUROCRYPT\u201998","author":"M. H. Jakubowski","year":"1998","unstructured":"M. H. Jakubowski and R. Venkatesan, \u201cThe Chain & Sum Primitive and Its Applications to MACs and Stream Ciphers,\u201d Advances in Cryptology, \u2014 EUROCRYPT\u201998, LNCS Vol. 1403, Springer-Verlag, 1998."},{"key":"8_CR12","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","DOI":"10.1007\/BFb0000458","volume-title":"Advances in Cryptology, \u2014EUROCRYPT\u201997","author":"T. Johansson","year":"1997","unstructured":"T. Johansson, \u201cBucket Hashing with Small Key Size,\u201d Advances in Cryptology, \u2014EUROCRYPT\u201997, LNCS Vol. 1233, Springer-Verlag, 1997."},{"key":"8_CR13","series-title":"Lect Notes Comput Sci","volume-title":"Advances in Cryptology, \u2014EUROCRYPT2001","author":"C. S. Jutla","year":"2001","unstructured":"C. S. Jutla, \u201cEncryption Modes with Almost Free Message Integrity,\u201d Advances in Cryptology, \u2014EUROCRYPT2001, LNCS Vol. 2045, Springer-Verlag, 2001."},{"key":"8_CR14","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-44706-7_20","volume-title":"Fast Software Encryption","author":"J. Katz","year":"2001","unstructured":"J. Katz and M. Yung, \u201cUnforgeable Encryption and Chosen Cipher Secure Modes of Operation,\u201d Fast Software Encryption, 7th International Workshop, FSE2000, LNCS Vol. 1978, Springer-Verlag, 2001."},{"key":"8_CR15","series-title":"Lect Notes Comput Sci","volume-title":"Advances in Cryptology, \u2014EUROCRYPT\u201999","author":"W. Nevelsteen","year":"1999","unstructured":"W. Nevelsteen and B. Preneel, \u201cSoftware Performance of Universal Hash Functions,\u201d Advances in Cryptology, \u2014EUROCRYPT\u201999, LNCS Vol. 1592, Springer-Verlag, 1999."},{"key":"8_CR16","series-title":"Lect Notes Comput Sci","volume-title":"Advances in Cryptology, \u2014CRYPTO\u201999","author":"S. Patel","year":"1999","unstructured":"S. Patel and Z. Ramzan, \u201cSquare Hash: Fast Message Authentication via Optimized Universal Hash Functions,\u201d Advances in Cryptology, \u2014CRYPTO\u201999, LNCS Vol. 1666, Springer-Verlag, 1999."},{"key":"8_CR17","series-title":"Lect Notes Comput Sci","volume-title":"Advances in Cryptology, \u2014EUROCRYPT\u201996","author":"B. Preneel","year":"1996","unstructured":"B. Preneel and P. van Oorschot, \u201cOn The Security of Two MAC Algorithms,\u201d Advances in Cryptology, \u2014EUROCRYPT\u201996, LNCS Vol. 1070, Springer-Verlag, 1996."},{"key":"8_CR18","unstructured":"M. Roe, \u201cCryptography and Evidence,\u201d Doctoral Dissertation with the University of Cambridge, 1997. available at \nhttp:\/\/www.ccsr.cam.ac.uk\/techreports\/index.html\n\n."},{"key":"8_CR19","doi-asserted-by":"crossref","unstructured":"P. Rogaway, M. Bellare, J. Black, and T. Krovetz, \u201cOCB: A Block-Cipher Mode of Operation for Efficient Authenticated Encryption,\u201d Eights ACM conference on computer and communications security CCS-8, ACM Press, 2001.","DOI":"10.1145\/501983.502011"},{"key":"8_CR20","doi-asserted-by":"crossref","unstructured":"C. E. Shannon, \u201cA Mathematical Theory of Communication,\u201d Bell Systems Technical Journal, Vol.28, No.4, 1949.","DOI":"10.1002\/j.1538-7305.1949.tb00928.x"},{"key":"8_CR21","series-title":"Lect Notes Comput Sci","volume-title":"Advances in Cryptology, \u2014CRYPTO\u201996","author":"V. Shoup","year":"1996","unstructured":"V. Shoup, \u201cOn Fast And Provably Secure Message Authentication Based on Universal Hashing,\u201d Advances in Cryptology, \u2014CRYPTO\u201996, LNCS Vol. 1109, Springer-Verlag, 1996."},{"key":"8_CR22","series-title":"Lect Notes Comput Sci","volume-title":"Advances in Cryptology, \u2014CRYPTO\u201993","author":"R. Taylor","year":"1993","unstructured":"R. Taylor, \u201cAn Integrity Check Value Algorithm for Stream Ciphers,\u201d Advances in Cryptology, \u2014CRYPTO\u201993, LNCS Vol. 773, Springer-Verlag, 1993."},{"key":"8_CR23","doi-asserted-by":"crossref","unstructured":"M. Wegman and L. Carter, \u201cNew Hash Functions And Their Use in Authentication And Set Equality,\u201d Journal of Computer and System Sciences, Vol. 22, 1981.","DOI":"10.1016\/0022-0000(81)90033-7"}],"container-title":["Lecture Notes in Computer Science","Selected Areas in Cryptography"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-36492-7_8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,1,16]],"date-time":"2020-01-16T15:03:01Z","timestamp":1579186981000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-36492-7_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2003]]},"ISBN":["9783540006220","9783540364924"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/3-540-36492-7_8","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2003]]},"assertion":[{"value":"17 February 2003","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}