{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,25]],"date-time":"2026-01-25T03:55:26Z","timestamp":1769313326367,"version":"3.49.0"},"publisher-location":"Berlin, Heidelberg","reference-count":12,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540679073","type":"print"},{"value":"9783540445982","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2000]]},"DOI":"10.1007\/3-540-44598-6_12","type":"book-chapter","created":{"date-parts":[[2007,5,1]],"date-time":"2007-05-01T10:15:21Z","timestamp":1178014521000},"page":"197-215","source":"Crossref","is-referenced-by-count":103,"title":["CBC MACs for Arbitrary-Length Messages: The Three-Key Constructions"],"prefix":"10.1007","author":[{"given":"John","family":"Black","sequence":"first","affiliation":[]},{"given":"Phillip","family":"Rogaway","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2000,8,11]]},"reference":[{"key":"12_CR1","unstructured":"ANSI X9.19. American national standard \u2014 Financial institution retail message authentication. ASC X9 Secretariat-American Bankers Association, 1986."},{"key":"12_CR2","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"341","DOI":"10.1007\/3-540-48658-5_32","volume-title":"Advances in Cryptology-CRYPTO\u2019 94","author":"M. Bellare","year":"1994","unstructured":"Bellare, M., Kilian, J., AND Rogaway, P. The security of the cipher block chaining message authentication code. See \n                    http:\/\/www.cs.ucdavis.edu\/rogaway\n                    \n                  . Older version appears in Advances in Cryptology-CRYPTO\u2019 94 (1994), vol. 839 of Lecture Notes in Computer Science, Springer-Verlag, pp. 341\u2013358."},{"key":"12_CR3","series-title":"Lect Notes Comput Sci","volume-title":"Final Report of Race Integrity Primitives","author":"A. Berendschot","year":"1995","unstructured":"Berendschot, A., Den Boer, B., Boly, J., Bosselaers, A., Brandt, J., Chaum, D., Damg\u00e5rd, I., Dichtl, M., Fumy, W., Van der Ham, M., Jansen, C, Landrock, P., Preneel, B., Roelofsen, G., De Rooij, P., AND Vandewalle, J. Final Report of Race Integrity Primitives, vol. 1007 of Lecture Notes in Computer Science. Springer-Verlag, 1995."},{"key":"12_CR4","series-title":"Lect Notes Comput Sci","volume-title":"Advances in Cryptology-CRYPTO\u2019 99","author":"J. Black","year":"1999","unstructured":"Black, J., Halevi, S., Krawczyk, H., Krovetz, T., AND Rogaway, P. UMAC: Fast and secure message authentication. In Advances in Cryptology-CRYPTO\u2019 99 (1999), Lecture Notes in Computer Science, Springer-Verlag."},{"key":"12_CR5","doi-asserted-by":"publisher","first-page":"143","DOI":"10.1016\/0022-0000(79)90044-8","volume":"18","author":"L. Carter","year":"1979","unstructured":"Carter, L., AND Wegman, M. Universal hash functions. J. of Computer and System Sciences, 18 (1979), 143\u2013154.","journal-title":"J. of Computer and System Sciences"},{"key":"12_CR6","volume-title":"Federal Information Processing Standards Publication 113","author":"FIPS 113","year":"1994","unstructured":"FIPS 113. Computer data authentication. Federal Information Processing Standards Publication 113, U.S. Department of Commerce\/National Bureau of Standards, National Technical Information Service, Springfield, Virginia, 1994."},{"key":"12_CR7","first-page":"210","volume":"4","author":"O. Goldreich","year":"1986","unstructured":"Goldreich, O., Goldwasser, S., AND Micali, S. How to construct random functions. Journal of the ACM 33, 4 (1986), 210\u2013217.","journal-title":"Journal of the ACM 33"},{"key":"12_CR8","volume-title":"Information technology-security techniques-data integrity mechanism using a cryptographic check function employing a block cipher algorithm","author":"Iso\/Iec 9797-1","year":"1999","unstructured":"Iso\/Iec 9797-1. Information technology-security techniques-data integrity mechanism using a cryptographic check function employing a block cipher algorithm. International Organization for Standards, Geneva, Switzerland, 1999. Second edition.","edition":"Second edition"},{"key":"12_CR9","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"252","DOI":"10.1007\/3-540-68697-5_20","volume-title":"Advances in Cryptology-CRYPTO\u2019 96","author":"J. Kilian","year":"1996","unstructured":"Kilian, J., AND Rogaway, P. How to protect DES against exhaustive key search. In Advances in Cryptology-CRYPTO\u2019 96 (1996), vol. 1109 of Lecture Notes in Computer Science, Springer-Verlag, pp. 252\u2013267."},{"key":"12_CR10","unstructured":"Petrank, E., AND Rackoff, C. CBC MAC for real-time data sources. Manuscript 97-10 in \n                    http:\/\/philby.ucsd.edu\/cryptolib.html\n                    \n                  , 1997."},{"key":"12_CR11","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"19","DOI":"10.1007\/3-540-68339-9_3","volume-title":"Advances in Cryptology \u2014 EUROCRYPT\u2019 96","author":"B. Preneel","year":"1996","unstructured":"Preneel, B., AND Van Oorschot, P. On the security of two MAC algorithms. In Advances in Cryptology \u2014 EUROCRYPT\u2019 96 (1996), vol. 1070 of Lecture Notes in Computer Science, Springer-Verlag, pp. 19\u201332."},{"key":"12_CR12","doi-asserted-by":"publisher","first-page":"265","DOI":"10.1016\/0022-0000(81)90033-7","volume":"22","author":"M. Wegman","year":"1981","unstructured":"Wegman, M., AND Carter, L. New hash functions and their use in authentication and set equality. In J. of Comp. and System Sciences (1981), vol. 22, pp. 265\u2013279.","journal-title":"J. of Comp. and System Sciences"}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2014 CRYPTO 2000"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-44598-6_12","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,2,16]],"date-time":"2019-02-16T11:58:17Z","timestamp":1550318297000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-44598-6_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2000]]},"ISBN":["9783540679073","9783540445982"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/3-540-44598-6_12","relation":{},"ISSN":["0302-9743"],"issn-type":[{"value":"0302-9743","type":"print"}],"subject":[],"published":{"date-parts":[[2000]]}}}