{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T20:51:59Z","timestamp":1725483119065},"publisher-location":"Berlin, Heidelberg","reference-count":8,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540679073"},{"type":"electronic","value":"9783540445982"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2000]]},"DOI":"10.1007\/3-540-44598-6_13","type":"book-chapter","created":{"date-parts":[[2007,5,1]],"date-time":"2007-05-01T10:15:21Z","timestamp":1178014521000},"page":"216-228","source":"Crossref","is-referenced-by-count":3,"title":["L-collision Attacks against Randomized MACs"],"prefix":"10.1007","author":[{"given":"Michael","family":"Semanko","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2000,8,11]]},"reference":[{"key":"13_CR1","unstructured":"ANSI X9.9. American National Standard for Financial Institution Message Authentication (Wholesale), American Bankers Association, 1981. Revised 1986."},{"key":"13_CR2","series-title":"Lect Notes Comput Sci","volume-title":"Advances in Cryptology-Crypto 96 Proceedings","author":"M. Bellare","year":"1996","unstructured":"M. Bellare, R. Canetti, and H. Krawczyk. Keying Hash Functions for Message Authentication. Advances in Cryptology-Crypto 96 Proceedings, Lecture Notes in Computer Science Vol. 1109, N. Koblitz ed., Springer-Verlag, 1996."},{"key":"13_CR3","series-title":"Lect Notes Comput Sci","volume-title":"Advances in Cryptology-Crypto 99 Proceedings","author":"M. Bellare","year":"1999","unstructured":"M. Bellare, O. Goldreich, and H. Krawczyk. Stateless Evaluation of Pseudorandom Functions: Security beyond the Birthday Barrier. Advances in Cryptology-Crypto 99 Proceedings, Lecture Notes in Computer Science Vol. 1666, M. Wiener ed., Springer-Verlag, 1999."},{"key":"13_CR4","series-title":"Lect Notes Comput Sci","volume-title":"Advances in Cryptology-Crypto 95 Proceedings","author":"M. Bellare","year":"1995","unstructured":"M. Bellare, R. Guerin, and P. Rogaway. XOR MACs: New Methods for Message Authentication Using Finite Pseduorandom Functions. Advances in Cryptology-Crypto 95 Proceedings, Lecture Notes in Computer Science Vol. 963, D. Copper-smith ed., Springer-Verlag, 1995."},{"key":"13_CR5","series-title":"Lect Notes Comput Sci","volume-title":"Advances in Cryptology-Crypto 94 Proceedings","author":"M. Bellare","year":"1994","unstructured":"M. Bellare, J. Killian, and P. Rogaway. The security of cipher block chaining. Advances in Cryptology-Crypto 94 Proceedings, Lecture Notes in Computer Science Vol. 839, Y. Desmedt ed., Springer-Verlag, 1994."},{"key":"13_CR6","doi-asserted-by":"crossref","unstructured":"A. Menezes, P. van Oorschot, and S. Vanstone. Handbook of Applied Cryptography. CRC Press. 1996.","DOI":"10.1201\/9781439821916"},{"key":"13_CR7","unstructured":"E. Petrank and C. Rackoff. CBC-MAC for Real-Time Data Sources. Dimacs Technical Report, 97\u201326, 1997."},{"key":"13_CR8","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","DOI":"10.1007\/3-540-60590-8","volume-title":"Advances in Cryptology-Crypto 95 Proceedings","author":"B. Preneel","year":"1995","unstructured":"B. Preneel and P. van Oorschot. MDx-MAC and Building Fast MACs from Hash Functions. Advances in Cryptology-Crypto 95 Proceedings, Lecture Notes in Computer Science Vol. 963, D. Coppersmith ed., Springer-Verlag, 1995."}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2014 CRYPTO 2000"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-44598-6_13","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,2,16]],"date-time":"2019-02-16T12:33:41Z","timestamp":1550320421000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-44598-6_13"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2000]]},"ISBN":["9783540679073","9783540445982"],"references-count":8,"URL":"https:\/\/doi.org\/10.1007\/3-540-44598-6_13","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[2000]]}}}