{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,27]],"date-time":"2025-07-27T07:25:17Z","timestamp":1753601117284},"publisher-location":"Berlin, Heidelberg","reference-count":15,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540140399"},{"type":"electronic","value":"9783540392002"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2003]]},"DOI":"10.1007\/3-540-39200-9_34","type":"book-chapter","created":{"date-parts":[[2007,8,16]],"date-time":"2007-08-16T07:35:32Z","timestamp":1187249732000},"page":"544-561","source":"Crossref","is-referenced-by-count":44,"title":["The Security of Many-Round Luby-Rackoff Pseudo-Random Permutations"],"prefix":"10.1007","author":[{"given":"Ueli","family":"Maurer","sequence":"first","affiliation":[]},{"given":"Krzysztof","family":"Pietrzak","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2003,5,13]]},"reference":[{"key":"34_CR1","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"307","DOI":"10.1007\/3-540-68339-9_27","volume-title":"Advances in Cryptology \u2014 EUROCRYPT\u2019 96","author":"W. Aiello","year":"1996","unstructured":"W. Aiello and R. Venkatesan, Foiling birthday attacks in length-doubling transformations \u2014 Benes: A non-reversible alternative to Feistel, Advances in Cryptology \u2014 EUROCRYPT\u2019 96, Lecture Notes in Computer Science, vol. 1070, pp. 307\u2013320, Springer-Verlag, 1996."},{"issue":"4","key":"34_CR2","doi-asserted-by":"publisher","first-page":"210","DOI":"10.1145\/6490.6503","volume":"33","author":"O. Goldreich","year":"1986","unstructured":"O. Goldreich, S. Goldwasser, and S. Micali, How to construct random functions, Journal of the ACM, vol. 33, no. 4, pp. 210\u2013217, 1986.","journal-title":"Journal of the ACM"},{"issue":"3","key":"34_CR3","doi-asserted-by":"publisher","first-page":"207","DOI":"10.1007\/s00145-002-9839-y","volume":"15","author":"L. R. Knudsen","year":"2002","unstructured":"L. R. Knudsen, The security of Feistel ciphers with six rounds or less, Journal of Cryptology vol. 15, no. 3, pp. 207\u2013222, Springer-Verlag, 2002.","journal-title":"Journal of Cryptology"},{"key":"34_CR4","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"189","DOI":"10.1007\/3-540-60865-6_53","volume-title":"Fast Software Encryption","author":"S. Lucks","year":"1996","unstructured":"S. Lucks, Faster Luby-Rackoff ciphers, Fast Software Encryption, Lecture Notes in Computer Science, vol. 1039, pp. 189\u2013203, Springer-Verlag, 1996."},{"issue":"2","key":"34_CR5","doi-asserted-by":"publisher","first-page":"373","DOI":"10.1137\/0217022","volume":"17","author":"M. Luby","year":"1988","unstructured":"M. Luby and C. Rackoff, How to construct pseudo-random permutations from pseudo-random functions, SIAM J. on Computing, vol. 17, no. 2, pp. 373\u2013386, 1988.","journal-title":"SIAM J. on Computing"},{"key":"34_CR6","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"239","DOI":"10.1007\/3-540-47555-9_21","volume-title":"Advances in Cryptology \u2014 EUROCRYPT\u2019 92","author":"U. M. Maurer","year":"1992","unstructured":"U. M. Maurer, A simplified and generalized treatment of Luby-Rackoff pseudorandom permutation generators, Advances in Cryptology \u2014 EUROCRYPT\u2019 92, Lecture Notes in Computer Science, vol. 658, pp. 239\u2013255, Springer-Verlag, 1992."},{"key":"34_CR7","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"110","DOI":"10.1007\/3-540-46035-7_8","volume-title":"Advances in Cryptology \u2014 EUROCRYPT\u2019 02","author":"U. M. Maurer","year":"2002","unstructured":"\u2014, Indistinguishability of random systems Advances in Cryptology \u2014 EUROCRYPT\u2019 02, Lecture Notes in Computer Science, vol. 2332, pp. 110\u2013132, Springer-Verlag, 2002."},{"issue":"1","key":"34_CR8","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1007\/PL00003817","volume":"12","author":"M. Naor","year":"1999","unstructured":"M. Naor and O. Reingold, On the construction of pseudorandom permutations: Luby-Rackoff revisited, Journal of Cryptology, vol. 12, no. 1, pp. 29\u201366, 1999.","journal-title":"Journal of Cryptology"},{"key":"34_CR9","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"256","DOI":"10.1007\/3-540-47555-9_22","volume-title":"Advances in Cryptology \u2014 EUROCRYPT\u2019 92","author":"J. Patarin","year":"1992","unstructured":"J. Patarin, How to construct pseudorandom permutations from a single pseudorandom function, Advances in Cryptology \u2014 EUROCRYPT\u2019 92, Lecture Notes in Computer Science, vol. 658, pp. 256\u2013266, Springer-Verlag, 1992."},{"key":"34_CR10","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"103","DOI":"10.1007\/3-540-69710-1_8","volume-title":"Fast Software Encryption","author":"J. Patarin","year":"1998","unstructured":"\u2014, About Feistel schemes with six (or more) rounds, Fast Software Encryption, Lecture Notes in Computer Science, vol. 1372, pp. 103\u2013121, Springer-Verlag, 1998."},{"key":"34_CR11","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"171","DOI":"10.1007\/3-540-48519-8_13","volume-title":"Fast Software Encryption","author":"S. Patel","year":"1999","unstructured":"S. Patel, Z. Ramzan, and G. Sundaram, Towards making Luby-Rackoff ciphers optimal and practical, Fast Software Encryption, Lecture Notes in Computer Science, vol. 1636, pp. 171\u2013185, Springer-Verlag, 1999."},{"key":"34_CR12","series-title":"Lect Notes Comput Sci","first-page":"140","volume-title":"Advances in Cryptology \u2014 EUROCRYPT\u2019 90","author":"J. Pieprzyk","year":"1990","unstructured":"J. Pieprzyk, How to construct pseudorandom permutations from single pseudorandom functions, Advances in Cryptology \u2014 EUROCRYPT\u2019 90, Lecture Notes in Computer Science, vol. 473, pp. 140\u2013150, Springer-Verlag, 1990."},{"key":"34_CR13","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"376","DOI":"10.1007\/3-540-44598-6_24","volume-title":"Advances in Cryptology \u2014 CRYPTO\u2019 00","author":"Z. Ramzan","year":"2000","unstructured":"Z. Ramzan and L. Reyzin, On the round security of symmetric-key cryptographic primitives, Advances in Cryptology \u2014 CRYPTO\u2019 00, Lecture Notes in Computer Science, vol. 1880, pp. 376\u2013393, Springer-Verlag, 2000."},{"key":"34_CR14","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"49","DOI":"10.1007\/3-540-46513-8_4","volume-title":"Proc. of SAC\u201999","author":"S. Vaudenay","year":"2000","unstructured":"S. Vaudenay, Adaptive-attack norm for decorrelation and super-pseudorandomness, Proc. of SAC\u201999, Lecture Notes in Computer Science, vol. 1758, pp. 49\u201361, Springer-Verlag, 2000."},{"key":"34_CR15","series-title":"Lect Notes Comput Sci","first-page":"412","volume-title":"Advances in Cryptology \u2014 EUROCRYPT\u2019 89","author":"Y. Zheng","year":"1989","unstructured":"Y. Zheng, T. Matsumoto, and H. Imai, Impossibility and optimality results on constructing pseudorandom permutations, Advances in Cryptology \u2014 EUROCRYPT\u2019 89, Lecture Notes in Computer Science, vol. 434, pp. 412\u2013422, Springer-Verlag, 1989."}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2014 EUROCRYPT 2003"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-39200-9_34","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,2,21]],"date-time":"2019-02-21T22:14:00Z","timestamp":1550787240000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-39200-9_34"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2003]]},"ISBN":["9783540140399","9783540392002"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/3-540-39200-9_34","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[2003]]}}}