{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,17]],"date-time":"2026-04-17T04:36:41Z","timestamp":1776400601215,"version":"3.51.2"},"publisher-location":"Berlin, Heidelberg","reference-count":18,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540414049","type":"print"},{"value":"9783540444480","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2000]]},"DOI":"10.1007\/3-540-44448-3_41","type":"book-chapter","created":{"date-parts":[[2007,6,9]],"date-time":"2007-06-09T00:22:44Z","timestamp":1181348564000},"page":"531-545","source":"Crossref","is-referenced-by-count":500,"title":["Authenticated Encryption: Relations among Notions and Analysis of the Generic Composition Paradigm"],"prefix":"10.1007","author":[{"given":"Mihir","family":"Bellare","sequence":"first","affiliation":[]},{"given":"Chanathip","family":"Namprempre","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2000,10,27]]},"reference":[{"key":"41_CR1","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-68697-5_1","volume-title":"Advances in Cryptology-Crypto\u2019 96","author":"M. Bellare","year":"1996","unstructured":"M. Bellare, R. Canetti AND H. Krawczyk, \u201cKeying hash functions for message authentication,\u201d Advances in Cryptology-Crypto\u2019 96, LNCS Vol. 1109, N. Koblitz ed., Springer-Verlag, 1996."},{"key":"41_CR2","unstructured":"M. Bellare, A. Desai, E. Jokipii AND P. Rogaway, \u201cA concrete security treatment of symmetric encryption: Analysis of the DES modes of operation,\u201d Proc. of the 38th IEEE FOCS, IEEE, 1997."},{"key":"41_CR3","series-title":"Lect Notes Comput Sci","volume-title":"Advances in Cryptology-Crypto\u2019 98","author":"M. Bellare","year":"1998","unstructured":"M. Bellare, A. Desai, D. Pointcheval AND P. Rogaway, \u201cRelations among notions of security for public-key encryption schemes,\u201d Advances in Cryptology-Crypto\u2019 98, LNCS Vol. 1462, H. Krawczyk ed., Springer-Verlag, 1998."},{"key":"41_CR4","series-title":"Lect Notes Comput Sci","volume-title":"Advances in Cryptology-Crypto\u2019 94","author":"M. Bellare","year":"1994","unstructured":"M. Bellare, J. Kilian, P. Rogaway, \u201cThe security of the cipher block chaining message authentication code,\u201d Advances in Cryptology-Crypto\u2019 94, LNCS Vol. 839, Y. Desmedt ed., Springer-Verlag, 1994."},{"key":"41_CR5","unstructured":"M. Bellare, C. Namprempre, \u201cAuthenticated Encryption: Relations among notions and analysis of the generic composition paradigm,\u201d Full version of this paper, available via http:\/\/www-cse.ucsd.edu\/users\/mihir ."},{"key":"41_CR6","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","DOI":"10.1007\/3-540-44598-6","volume-title":"Advances in Cryptology-ASIACRYPT\u2019 00","author":"M. Bellare","year":"2000","unstructured":"M. Bellare AND P. Rogaway, \u201cEncode-then-encipher encryption: How to exploit nonces or redundancy in plaintexts for efficient cryptography,\u201d Advances in Cryptology-ASIACRYPT\u2019 00, LNCS Vol. ??, T. Okamoto ed., Springer-Verlag, 2000."},{"key":"41_CR7","series-title":"Lect Notes Comput Sci","volume-title":"Advances in Cryptology-Crypto\u2019 99","author":"M. Bellare","year":"1999","unstructured":"M. Bellare AND A. Sahai, \u201cNon-Malleable Encryption: Equivalence between Two Notions, and an Indistinguishability-Based Characterization,\u201d Advances in Cryptology-Crypto\u2019 99, LNCS Vol. 1666, M. Wiener ed., Springer-Verlag, 1999."},{"key":"41_CR8","series-title":"Lect Notes Comput Sci","volume-title":"Advances in Cryptology-Crypto\u2019 99","author":"J. Black","year":"1999","unstructured":"J. Black, S. Halevi, H. Krawczyk, T. Krovetz AND P. Rogaway, \u201cUMAC: Fast and secure message authentication,\u201d Advances in Cryptology-Crypto\u2019 99, LNCS Vol. 1666, M. Wiener ed., Springer-Verlag, 1999."},{"key":"41_CR9","series-title":"Lect Notes Comput Sci","volume-title":"Advances in Cryptology-Crypto\u2019 00","author":"A. Desai","year":"2000","unstructured":"A. Desai, \u201cNew paradigms for constructing symmetric encryption schemes secure against chosen ciphertext attack,\u201d Advances in Cryptology-Crypto\u2019 00, LNCS Vol. 1880, M. Bellare ed., Springer-Verlag, 2000."},{"key":"41_CR10","doi-asserted-by":"crossref","unstructured":"D. Dolev, C. Dwork, AND M. Naor, \u201cNon-malleable cryptography,\u201d Proc. of the 23rd ACM STOC, ACM, 1991.","DOI":"10.1145\/103418.103474"},{"key":"41_CR11","unstructured":"D. Dolev, C. Dwork, AND M. Naor, \u201cNon-malleable cryptography,\u201d to appear in SIAM J. Comput."},{"key":"41_CR12","doi-asserted-by":"publisher","first-page":"270","DOI":"10.1016\/0022-0000(84)90070-9","volume":"28","author":"S. Goldwasser","year":"1984","unstructured":"S. Goldwasser AND S. Micali, \u201cProbabilistic encryption,\u201d Journal of Computer and System Science,Vol. 28, 1984, pp. 270\u2013299.","journal-title":"Journal of Computer and System Science"},{"key":"41_CR13","unstructured":"C. Jutla, \u201cEncryption modes with almost free message integrity,\u201d Report 2000\/039, Cryptology ePrint Archive, http:\/\/eprint.iacr.org\/ , August 2000."},{"key":"41_CR14","doi-asserted-by":"crossref","unstructured":"J. Katz AND M. Yung, \u201cComplete characterization of security notions for probabilistic private-key encryption,\u201d Proc. of the 32ndACM STOC, ACM, 2000.","DOI":"10.1145\/335305.335335"},{"key":"41_CR15","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","DOI":"10.1007\/b75241","volume-title":"Fast Software Encryption\u2019 00","author":"J. Katz","year":"2000","unstructured":"J. Katz AND M. Yung, \u201cUnforgeable Encryption and Adaptively Secure Modes of Operation,\u201d Fast Software Encryption\u2019 00, LNCS Vol. ??, B. Schneier ed., Springer-Verlag, 2000."},{"key":"41_CR16","doi-asserted-by":"crossref","unstructured":"S. Kent AND R. Atkinson, \u201cIP Encapsulating Security Payload (ESP),\u201d Request for Comments 2406, November 1998.","DOI":"10.17487\/rfc2406"},{"key":"41_CR17","doi-asserted-by":"crossref","unstructured":"M. Naor AND M. Yung, \u201cPublic-key cryptosystems provably secure against chosen ciphertext attacks,\u201d Proc. of the 22nd ACM STOC, ACM, 1990.","DOI":"10.1145\/100216.100273"},{"key":"41_CR18","series-title":"Lect Notes Comput Sci","volume-title":"Advances in Cryptology-Crypto\u2019 91","author":"C. Rackoff","year":"1991","unstructured":"C. Rackoff AND D. Simon, \u201cNon-Interactive zero-knowledge proof of knowledge and chosen ciphertext attack,\u201d Advances in Cryptology-Crypto\u2019 91, LNCS Vol. 576, J. Feigenbaum ed., Springer-Verlag, 1991."}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2014 ASIACRYPT 2000"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-44448-3_41","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,4,28]],"date-time":"2019-04-28T19:13:32Z","timestamp":1556478812000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-44448-3_41"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2000]]},"ISBN":["9783540414049","9783540444480"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/3-540-44448-3_41","relation":{},"ISSN":["0302-9743"],"issn-type":[{"value":"0302-9743","type":"print"}],"subject":[],"published":{"date-parts":[[2000]]}}}