{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,29]],"date-time":"2026-01-29T21:16:32Z","timestamp":1769721392756,"version":"3.49.0"},"publisher-location":"Berlin, Heidelberg","reference-count":12,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540424567","type":"print"},{"value":"9783540446477","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2001]]},"DOI":"10.1007\/3-540-44647-8_18","type":"book-chapter","created":{"date-parts":[[2007,11,13]],"date-time":"2007-11-13T14:28:14Z","timestamp":1194964094000},"page":"292-309","source":"Crossref","is-referenced-by-count":46,"title":["Online Ciphers and the Hash-CBC Construction"],"prefix":"10.1007","author":[{"given":"Mihir","family":"Bellare","sequence":"first","affiliation":[]},{"given":"Alexandra","family":"Boldyreva","sequence":"additional","affiliation":[]},{"given":"Lars","family":"Knudsen","sequence":"additional","affiliation":[]},{"given":"Chanathip","family":"Namprempre","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2001,8,2]]},"reference":[{"key":"18_CR1","unstructured":"M. Bellare, A. Boldyreva, L. Knudsen, C. Namprempre. On-line ciphers and the Hash-CBC construction. Full version of this paper, available via http:\/\/www-cse.ucsd.edu\/users\/mihir ."},{"issue":"3","key":"18_CR2","doi-asserted-by":"publisher","first-page":"362","DOI":"10.1006\/jcss.1999.1694","volume":"61","author":"M. Bellare","year":"2000","unstructured":"M. Bellare, J. Kilian, and P. Rogaway. The security of the cipher block chaining message authentication code. In Journal of Computer and System Sciences, volume 61, No. 3, pages 362\u2013399, Dec 2000. Academic Press.","journal-title":"Journal of Computer and System Sciences"},{"key":"18_CR3","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"531","DOI":"10.1007\/3-540-44448-3_41","volume-title":"Advances in Cryptology\u2014 ASIACRYPT\u2019 00","author":"M. Bellare","year":"2000","unstructured":"M. Bellare and C. Namprempre. Authenticated encryption: Relations among notions and analysis of the generic composition paradigm. In T. Okamoto, editor, Advances in Cryptology\u2014 ASIACRYPT\u2019 00, volume 1976 of Lecture Notes in Computer Science, pages 531\u2013545, Berlin, Germany, Dec. 2000. Springer-Verlag."},{"key":"18_CR4","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"317","DOI":"10.1007\/3-540-44448-3_24","volume-title":"Advances in Cryptology \u2014 ASIACRYPT\u2019 00","author":"M. Bellare","year":"2000","unstructured":"M. Bellare and P. Rogaway. Encode-then-encipher encryption: How to exploit nonces or redundancy in plaintexts for efficient cryptography. In T. Okamoto, editor, Advances in Cryptology \u2014 ASIACRYPT\u2019 00, volume 1976 of Lecture Notes in Computer Science, pages 317\u2013330, Berlin, Germany, Dec. 2000. Springer-Verlag."},{"key":"18_CR5","doi-asserted-by":"crossref","unstructured":"C. Campbell. Design and specification of cryptographic capabilities. In D. Brandstad, editor, Computer Security and the Data Encryption Standard, National Bureau of Standards Special Publications 500-27, U.S. Department of Commerce, pages 54\u201366, February 1978.","DOI":"10.1109\/MCOM.1978.1089775"},{"issue":"4","key":"18_CR6","doi-asserted-by":"publisher","first-page":"210","DOI":"10.1145\/6490.6503","volume":"33","author":"O. Goldreich","year":"1986","unstructured":"O. Goldreich, S. Goldwasser, and S. Micali. How to construct random functions, Journal of the ACM, Vol. 33, No. 4, 1986, pp. 210\u2013217.","journal-title":"Journal of the ACM"},{"key":"18_CR7","unstructured":"L. Knudsen. Block chaining modes of operation. Reports in Informatics, Report 207, Dept. of Informatics, University of Bergen, October 2000."},{"key":"18_CR8","doi-asserted-by":"crossref","unstructured":"H. Krawczyk. LFSR-based hashing and authenticating. In Y. Desmedt, editor, Advances in Cryptology \u2014 CRYPTO\u2019 94, volume 839 of Lecture Notes in Computer Science, pages 129\u2013139, Berlin, Germany, 1994. Springer-Verlag.","DOI":"10.1007\/3-540-48658-5_15"},{"key":"18_CR9","doi-asserted-by":"publisher","first-page":"373","DOI":"10.1137\/0217022","volume":"17","author":"M. Luby","year":"1988","unstructured":"M. Luby and C. Rackoff. How to construct pseudo-random permutations from pseudo-random functions. SIAM Journal of Computing, Vol. 17, No. 2, pp. 373\u2013386, April 1988.","journal-title":"SIAM Journal of Computing"},{"key":"18_CR10","unstructured":"C. Meyer and Matyas. A new direction in Computer Data Security. John Wiley & Sons, 1982."},{"key":"18_CR11","doi-asserted-by":"crossref","unstructured":"M. Naor and O. Reingold. On the construction of pseudorandom permutations: Luby-Rackoff Revisited. In J. Feigenbaum, editor, Journal of Cryptology, Volume 12, Number 1, Winter 1999. Springer-Verlag.","DOI":"10.1007\/PL00003817"},{"key":"18_CR12","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"24","DOI":"10.1007\/3-540-48910-X_3","volume-title":"Advances in Cryptology \u2014 EUROCRYPT\u2019 99","author":"W. Nevelsteen","year":"1999","unstructured":"W. Nevelsteen and B. Preneel. Software performance of universal hash functions. In J. Stern, editor, Advances in Cryptology \u2014 EUROCRYPT\u2019 99, volume 1592 of Lecture Notes in Computer Science, pages 24\u201341, Berlin, Germany, 1999. Springer-Verlag."}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2014 CRYPTO 2001"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-44647-8_18","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,4]],"date-time":"2019-05-04T06:21:46Z","timestamp":1556950906000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-44647-8_18"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2001]]},"ISBN":["9783540424567","9783540446477"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/3-540-44647-8_18","relation":{},"ISSN":["0302-9743"],"issn-type":[{"value":"0302-9743","type":"print"}],"subject":[],"published":{"date-parts":[[2001]]}}}