{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,29]],"date-time":"2026-01-29T21:13:37Z","timestamp":1769721217211,"version":"3.49.0"},"publisher-location":"Berlin, Heidelberg","reference-count":29,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540602217","type":"print"},{"value":"9783540447504","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1995]]},"DOI":"10.1007\/3-540-44750-4_1","type":"book-chapter","created":{"date-parts":[[2007,8,16]],"date-time":"2007-08-16T04:39:53Z","timestamp":1187239193000},"page":"1-14","source":"Crossref","is-referenced-by-count":59,"title":["MDx-MAC and Building Fast MACs from Hash Functions"],"prefix":"10.1007","author":[{"given":"Bart","family":"Preneel","sequence":"first","affiliation":[]},{"given":"Paul C.","family":"van Oorschot","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2001,7,13]]},"reference":[{"key":"1_CR1","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"341","DOI":"10.1007\/3-540-48658-5_32","volume-title":"Proc. Crypto\u201994","author":"M. Bellare","year":"1994","unstructured":"M. Bellare, J. Kilian, P. Rogaway, \u201cThe security of cipher block chaining,\u201d Proc. Crypto\u201994, LNCS 839, Springer-Verlag, 1994, pp. 341\u2013358."},{"key":"1_CR2","unstructured":"M. Bellare, R. Gu\u00e9rin, P. Rogaway, \u201cXOR MACs: new methods for message authentication using block ciphers,\u201d Proc. Crypto\u201995 (this volume)."},{"issue":"5","key":"1_CR3","doi-asserted-by":"publisher","first-page":"505","DOI":"10.1016\/0167-4048(87)90031-9","volume":"6","author":"F. Cohen","year":"1987","unstructured":"F. Cohen, \u201cA cryptographic checksum for integrity protection,\u201d Computers & Security, Vol. 6, No. 5, 1987, pp. 505\u2013510.","journal-title":"Computers & Security"},{"key":"1_CR4","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"416","DOI":"10.1007\/0-387-34805-0_39","volume-title":"Proc. Crypto\u201989","author":"I.B. Damg\u00e5rd","year":"1990","unstructured":"I.B. Damg\u00e5rd, \u201cA design principle for hash functions,\u201d Proc. Crypto\u201989, LNCS 435, Springer-Verlag, 1990, pp. 416\u2013427."},{"key":"1_CR5","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"393","DOI":"10.1007\/3-540-39568-7_30","volume-title":"Proc. Crypto\u201984","author":"D. Davies","year":"1985","unstructured":"D. Davies, \u201cA message authenticator algorithm suitable for a mainframe computer,\u201d Proc. Crypto\u201984, LNCS 196, Springer-Verlag, 1985, pp. 393\u2013400."},{"key":"1_CR6","unstructured":"D. Davies, D.O. Clayden, \u201cThe message authenticator algorithm (MAA) and its implementation,\u201d NPL Report DITC 109\/88, Feb. 1988."},{"key":"1_CR7","doi-asserted-by":"crossref","unstructured":"D. Davies, W. Price, Security for Computer Networks, 2nd ed., Wiley, 1989.","DOI":"10.1016\/0267-3649(89)90162-3"},{"key":"1_CR8","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"194","DOI":"10.1007\/3-540-46766-1_14","volume-title":"Proc. Crypto\u201991","author":"B. Boer den","year":"1992","unstructured":"B. den Boer, A. Bosselaers, \u201cAn attack on the last two rounds of MD4,\u201d Proc. Crypto\u201991, LNCS 576, Springer-Verlag, 1992, pp. 194\u2013203."},{"key":"1_CR9","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"293","DOI":"10.1007\/3-540-48285-7_26","volume-title":"Proc. Eurocrypt\u201993","author":"B. Boer den","year":"1994","unstructured":"B. den Boer, A. Bosselaers, \u201cCollisions for the compression function of MD5,\u201d Proc. Eurocrypt\u201993, LNCS 765, Springer-Verlag, 1994, pp. 293\u2013304."},{"key":"1_CR10","unstructured":"FIPS 46, Data encryption standard, NBS, U.S. Department of Commerce, Washington D.C., Jan. 1977."},{"key":"1_CR11","unstructured":"FIPS 81, DES modes of operation, NBS, US Department of Commerce, Washington D.C., Dec. 1980."},{"key":"1_CR12","unstructured":"FIPS 180-1, Secure hash standard, NIST, US Department of Commerce, Washington D.C., April 1995."},{"key":"1_CR13","unstructured":"J.M. Galvin, K. McCloghrie, J.R. Davin, \u201cSecure management of SNMP networks,\u201d Integrated Network Management, II, North Holland, 1991, pp. 703\u2013714."},{"key":"1_CR14","unstructured":"ISO 8731:1987, Banking-approved algorithms for message authentication, Part 1, DEA, IS 8731-1, Part 2, Message Authentication Algorithm (MAA), IS 8731-2."},{"key":"1_CR15","unstructured":"ISO\/IEC 9797:1993, Information technology-Data cryptographic techniques-Data integrity mechanisms using a cryptographic check function employing a block cipher algorithm."},{"key":"1_CR16","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/978-3-540-48654-1","volume-title":"Proc. Eurocrypt\u201993","author":"T. Johansson","year":"1994","unstructured":"T. Johansson, G. Kabatianskii, B. Smeets, \u201cOn the relation between A-codes and codes correcting independent errors,\u201d Proc. Eurocrypt\u201993, LNCS 765, Springer-Verlag, 1994, pp. 1\u201311."},{"key":"1_CR17","doi-asserted-by":"crossref","unstructured":"R.R. Jueneman, S.M. Matyas, C.H. Meyer, \u201cMessage authentication with Manipulation Detection Codes,\u201d Proc. 1983 IEEE Symposium on Security and Privacy, IEEE Computer Society Press, 1983, pp. 33\u201354.","DOI":"10.1109\/SP.1983.10005"},{"issue":"1","key":"1_CR18","first-page":"5","volume":"1","author":"B. Kaliski","year":"1995","unstructured":"B. Kaliski, M. Robshaw, \u201cMessage authentication with MD5,\u201d CryptoBytes (RSA Laboratories Technical Newsletter), Vol. 1, No. 1, Spring 1995, pp. 5\u20138.","journal-title":"CryptoBytes (RSA Laboratories Technical Newsletter)"},{"key":"1_CR19","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"129","DOI":"10.1007\/3-540-48658-5_15","volume-title":"Proc. Crypto\u201994","author":"H. Krawczyk","year":"1994","unstructured":"H. Krawczyk, \u201cLFSR-based hashing and authentication,\u201d Proc. Crypto\u201994, LNCS 839, Springer-Verlag, 1994, pp. 129\u2013139."},{"key":"1_CR20","doi-asserted-by":"crossref","unstructured":"J. Linn, \u201cThe Kerberos Version 5 GSS-API Mechanism,\u201d Internet Draft, Feb. 1995.","DOI":"10.17487\/rfc1964"},{"issue":"5","key":"1_CR21","doi-asserted-by":"publisher","first-page":"483","DOI":"10.1016\/0167-4048(88)90201-5","volume":"7","author":"C. Mitchell","year":"1988","unstructured":"C. Mitchell, M. Walker, \u201cSolutions to the multidestination secure electronic mail problem,\u201d Computers & Security, Vol. 7, No. 5, 1988, pp. 483\u2013488.","journal-title":"Computers & Security"},{"key":"1_CR22","unstructured":"B. Preneel, Cryptographic Hash Functions, Kluwer Academic Publishers, 1995 (to appear)."},{"key":"1_CR23","series-title":"Lect Notes Comput Sci","volume-title":"Race Integrity Primitives Evaluation (RIPE-RACE 1040): Final Report","author":"RIPE","year":"1995","unstructured":"RIPE, Race Integrity Primitives Evaluation (RIPE-RACE 1040): Final Report, LNCS, Springer-Verlag, 1995 (to appear)."},{"key":"1_CR24","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"303","DOI":"10.1007\/3-540-38424-3_22","volume-title":"Proc. Crypto\u201990","author":"R.L. Rivest","year":"1991","unstructured":"R.L. Rivest, \u201cThe MD4 message digest algorithm,\u201d Proc. Crypto\u201990, LNCS 537, Springer-Verlag, 1991, pp. 303\u2013311."},{"key":"1_CR25","doi-asserted-by":"crossref","unstructured":"R.L. Rivest, \u201cThe MD5 message-digest algorithm,\u201d Request for Comments (RFC) 1321, Internet Activities Board, Internet Privacy Task Force, April 1992.","DOI":"10.17487\/rfc1321"},{"issue":"5","key":"1_CR26","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1145\/141809.141812","volume":"22","author":"G. Tsudik","year":"1992","unstructured":"G. Tsudik, \u201cMessage authentication with one-way hash functions,\u201d ACM Computer Communications Review, Vol. 22, No. 5, 1992, pp. 29\u201338.","journal-title":"ACM Computer Communications Review"},{"key":"1_CR27","series-title":"Lect Notes Comput Sci","volume-title":"Fast Software Encryption","author":"S. Vaudenay","year":"1995","unstructured":"S. Vaudenay, \u201cOn the need for multipermutations: cryptanalysis of MD4 and SAFER,\u201d Fast Software Encryption, LNCS, Springer-Verlag, 1995 (to appear)."},{"issue":"3","key":"1_CR28","doi-asserted-by":"publisher","first-page":"265","DOI":"10.1016\/0022-0000(81)90033-7","volume":"22","author":"M.N. Wegman","year":"1981","unstructured":"M.N. Wegman, J.L. Carter, \u201cNew hash functions and their use in authentication and set equality,\u201d J. Computer Sys. Sciences, Vol. 22, No. 3, 1981, pp. 265\u2013279.","journal-title":"J. Computer Sys. Sciences"},{"key":"1_CR29","series-title":"Technical Report","volume-title":"Efficient DES key search","author":"M.J. Wiener","year":"1994","unstructured":"M.J. Wiener, \u201cEfficient DES key search,\u201d Technical Report TR-244, School of Computer Science, Carleton University, Ottawa, Canada, May 1994. Presented at the rump session of Crypto\u201993."}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2014 CRYPT0\u2019 95"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-44750-4_1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,5,13]],"date-time":"2023-05-13T16:21:09Z","timestamp":1683994869000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-44750-4_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1995]]},"ISBN":["9783540602217","9783540447504"],"references-count":29,"URL":"https:\/\/doi.org\/10.1007\/3-540-44750-4_1","relation":{},"ISSN":["0302-9743"],"issn-type":[{"value":"0302-9743","type":"print"}],"subject":[],"published":{"date-parts":[[1995]]}}}