{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T20:51:54Z","timestamp":1725483114721},"publisher-location":"Berlin, Heidelberg","reference-count":23,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540679073"},{"type":"electronic","value":"9783540445982"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2000]]},"DOI":"10.1007\/3-540-44598-6_25","type":"book-chapter","created":{"date-parts":[[2007,5,1]],"date-time":"2007-05-01T10:15:21Z","timestamp":1178014521000},"page":"394-412","source":"Crossref","is-referenced-by-count":17,"title":["New Paradigms for Constructing Symmetric Encryption Schemes Secure against Chosen-Ciphertext Attack"],"prefix":"10.1007","author":[{"given":"Anand","family":"Desai","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2000,8,11]]},"reference":[{"key":"25_CR1","unstructured":"M. Bellare, R. Canetti AND H. Krawczyk, \u201cPseudorandom functions revisited: The cascade construction and its concrete security,\u201d Proceedings of the 37th Symposium on Foundations of Computer Science, IEEE, 1996."},{"key":"25_CR2","unstructured":"M. Bellare, A. Desai, E. Jokipii AND P. Rogaway, \u201cA concrete security treatment of symmetric encryption,\u201d Proceedings of the 38th Symposium on Foundations of Computer Science, IEEE, 1997."},{"key":"25_CR3","series-title":"Lect Notes Comput Sci","volume-title":"Advances in Cryptology-Crypto\u2019 98","author":"M. Bellare","year":"1998","unstructured":"M. Bellare, A. Desai, D. Pointcheval and P. Rogaway, \u201cRelations among notions of security for public-key encryption schemes,\u201d Advances in Cryptology-Crypto\u2019 98, LNCS Vol. 1462, H. Krawczyk ed., Springer-Verlag, 1998."},{"key":"25_CR4","series-title":"Lect Notes Comput Sci","volume-title":"Advances in Cryptology-Crypto\u2019 94","author":"M. Bellare","year":"1994","unstructured":"M. Bellare, J. Kilian AND P. Rogaway, \u201cThe security of the cipher block chaining message authentication code,\u201d Advances in Cryptology-Crypto\u2019 94, LNCS Vol. 839, Y. Desmedt ed., Springer-Verlag, 1994."},{"key":"25_CR5","doi-asserted-by":"crossref","unstructured":"M. Bellare AND C. Namprempre, \u201cAuthenticated encryption: Relations among notions and analysis of the generic composition paradigm,\u201d Report 2000\/025, Cryptology ePrint Archive, http:\/\/eprint.iacr.org\/ , May 2000.","DOI":"10.1007\/3-540-44448-3_41"},{"key":"25_CR6","series-title":"Lect Notes Comput Sci","volume-title":"Advances in Cryptology-Crypto\u2019 93","author":"M. Bellare","year":"1993","unstructured":"M. Bellare AND P. Rogaway, \u201cEntity authentication and key distribution,\u201d Advances in Cryptology-Crypto\u2019 93, LNCS Vol. 773, D. Stinson ed., Springer-Verlag, 1993."},{"key":"25_CR7","series-title":"Lect Notes Comput Sci","volume-title":"Advances in Cryptology-Eurocrypt\u2019 95","author":"M. Bellare","year":"1995","unstructured":"M. Bellare AND P. Rogaway, \u201cOptimal asymmetric encryption: How to encrypt with RSA,\u201d Advances in Cryptology-Eurocrypt\u2019 95, LNCS Vol. 921, L. Guillou and J. Quisquater ed., Springer-Verlag, 1995."},{"key":"25_CR8","unstructured":"M. Bellare AND P. Rogaway, \u201cEncode-then-encipher encryption: How to exploit nonces or redundancy in plaintexts for efficient cryptography,\u201d Manuscript, December 1998, available from authors."},{"key":"25_CR9","doi-asserted-by":"crossref","unstructured":"D. Bernstein, \u201cHow to stretch random functions: The security of protected counter sums,\u201d J. of Cryptology, Vol. 12, No. 3, 1999.","DOI":"10.1007\/s001459900051"},{"key":"25_CR10","series-title":"Lect Notes Comput Sci","volume-title":"Advances in Cryptology-Crypto\u2019 00","author":"J. Black","year":"2000","unstructured":"J. Black AND P. Rogaway, \u201cCBC MACs for Arbitrary Length Messages: The Three-Key Constructions,\u201d Advances in Cryptology-Crypto\u2019 00, LNCS Vol. ??, M. Bellare ed., Springer-Verlag, 2000."},{"key":"25_CR11","unstructured":"D. Bleichenbacher AND A. Desai, \u201cA construction of a super-pseudorandom cipher,\u201d Manuscript, May 1999, available from authors."},{"key":"25_CR12","unstructured":"A. Desai, \u201cNew paradigms for constructing symmetric encryption schemes secure against chosen-ciphertext attack,\u201d Full version of this paper, available via: http:\/\/www-cse.ucsd.edu\/users\/adesai\/ ."},{"key":"25_CR13","doi-asserted-by":"crossref","unstructured":"D. Dolev, C. Dwork AND M. Naor, \u201cNon-malleable cryptography,\u201d SIAM J. of Computing, to appear. Preliminary version in Proceedings of the 23rd Annual Symposium on the Theory of Computing, ACM, 1991.","DOI":"10.1145\/103418.103474"},{"issue":"4","key":"25_CR14","doi-asserted-by":"publisher","first-page":"210","DOI":"10.1145\/6490.6503","volume":"33","author":"O. Goldreich","year":"1986","unstructured":"O. Goldreich, S. Goldwasser AND S. Micali, How to construct random functions. Journal of the ACM, Vol. 33, No. 4, 1986, pp. 210\u2013217.","journal-title":"Journal of the ACM"},{"key":"25_CR15","doi-asserted-by":"publisher","first-page":"270","DOI":"10.1016\/0022-0000(84)90070-9","volume":"28","author":"S. Goldwasser","year":"1984","unstructured":"S. Goldwasser AND S. Micali, \u201cProbabilistic encryption,\u201d Journal of Computer and System Science, Vol. 28, 1984, pp. 270\u2013299.","journal-title":"Journal of Computer and System Science"},{"key":"25_CR16","doi-asserted-by":"crossref","unstructured":"J. Katz AND M. Yung, \u201cComplete characterization of security notions for probabilistic private-key encryption,\u201d Proceedings of the 32nd Annual Symposium on the Theory of Computing, ACM, 2000.","DOI":"10.1145\/335305.335335"},{"key":"25_CR17","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","DOI":"10.1007\/b75241","volume-title":"Software Encryption\u2019 00","author":"J. Katz","year":"2000","unstructured":"J. Katz AND M. Yung, \u201cUnforgeable Encryption and Adaptively Secure Modes of Operation,\u201d Fast Software Encryption\u2019 00, LNCS Vol. ??, B. Schneier ed., Springer-Verlag, 2000."},{"key":"25_CR18","doi-asserted-by":"crossref","unstructured":"M. Luby AND C. Rackoff, \u201cHow to construct pseudorandom permutations from pseudorandom functions,\u201d SIAM J. Computing, Vol. 17, No. 2, April 1988.","DOI":"10.1137\/0217022"},{"key":"25_CR19","doi-asserted-by":"crossref","unstructured":"M. Naor AND O. Reingold, \u201cOn the construction of pseudorandom permutations: Luby-Rackoff revisited,\u201d J. of Cryptology, Vol. 12, No. 1, 1999.","DOI":"10.1007\/PL00003817"},{"key":"25_CR20","doi-asserted-by":"crossref","unstructured":"M. Naor AND M. Yung, \u201cPublic-key cryptosystems provably secure against chosen-ciphertext attackss,\u201d Proceedings of the 22nd Annual Symposium on the Theory of Computing, ACM, 1990.","DOI":"10.1145\/100216.100273"},{"key":"25_CR21","unstructured":"S. Patel, Z. Ramzan, AND G. Sundaram, \u201cEfficient Variable-Input-Length Cryptographic Primitives,\u201d Manuscript, 2000."},{"key":"25_CR22","unstructured":"E. Petrank AND C. Rackoff, \u201cCBC MAC for Real-Time Data Sources,\u201d Dimacs Technical Report, 97\u201326, 1997."},{"key":"25_CR23","series-title":"Lect Notes Comput Sci","volume-title":"Advances in Cryptology-Crypto\u2019 91","author":"C. Rackoff","year":"1991","unstructured":"C. Rackoff AND D. Simon, \u201cNon-interactive zero-knowledge proof of knowledge and chosen-ciphertext attack,\u201d Advances in Cryptology-Crypto\u2019 91, LNCS Vol. 576, J. Feigenbaum ed., Springer-Verlag, 1991."}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2014 CRYPTO 2000"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-44598-6_25","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,4,27]],"date-time":"2019-04-27T16:34:10Z","timestamp":1556382850000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-44598-6_25"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2000]]},"ISBN":["9783540679073","9783540445982"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/3-540-44598-6_25","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[2000]]}}}