{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,7]],"date-time":"2026-03-07T18:11:48Z","timestamp":1772907108096,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":15,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540602217","type":"print"},{"value":"9783540447504","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1995]]},"DOI":"10.1007\/3-540-44750-4_2","type":"book-chapter","created":{"date-parts":[[2007,8,16]],"date-time":"2007-08-16T08:39:53Z","timestamp":1187253593000},"page":"15-28","source":"Crossref","is-referenced-by-count":120,"title":["XOR MACs: New Methods for Message Authentication Using Finite Pseudorandom Functions"],"prefix":"10.1007","author":[{"given":"Mihir","family":"Bellare","sequence":"first","affiliation":[]},{"given":"Roch","family":"Gu\u00e9rin","sequence":"additional","affiliation":[]},{"given":"Phillip","family":"Rogaway","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2001,7,13]]},"reference":[{"key":"2_CR1","doi-asserted-by":"publisher","first-page":"567","DOI":"10.1016\/0196-6774(86)90019-2","volume":"7","author":"N. Alon","year":"1986","unstructured":"N. Alon, L. Babai and A. Itai. A fast and simple randomized parallel algorithm for the maximal independent set problem. J. of Algorithms, Vol.7, 567\u2013583, 1986.","journal-title":"J. of Algorithms"},{"key":"2_CR2","unstructured":"M. Bellare, R. Gu\u00e9rin and P. Rogaway. XOR MACs: New methods for message authentication using finite pseudorandom functions. Available from the authors or out of http:\/\/www.cs.ucdavis.edu\/~rogaway\/"},{"key":"2_CR3","unstructured":"M. Bellare, J. Kilian and P. Rogaway. On the security of cipher block chaining. Advances in Cryptology \u2014 Crypto 94 Proceedings."},{"key":"2_CR4","unstructured":"M. Bellare, O. Goldreich and S. Goldwasser. Incremental cryptography: The case of hashing and signing. Advances in Cryptology \u2014 Crypto 94 Proceedings."},{"key":"2_CR5","doi-asserted-by":"crossref","unstructured":"M. Bellare, O. Goldreich and S. Goldwasser. Incremental cryptography and application to virus protection. Proceedings of the Twenty Seventh Annual Symposium on the Theory of Computing, ACM, 1995.","DOI":"10.1145\/225058.225080"},{"key":"2_CR6","doi-asserted-by":"crossref","unstructured":"B. Berger and J. Rompel, \u201cSimulating (logcn)-wise independence in NC,\u201d Proceedings of the Thirtieth Annual Symposium on the Foundations of Computer Science, IEEE, 1989.","DOI":"10.1109\/SFCS.1989.63447"},{"issue":"4","key":"2_CR7","doi-asserted-by":"publisher","first-page":"210","DOI":"10.1145\/6490.6503","volume":"33","author":"O. Goldreich","year":"1986","unstructured":"O. Goldreich, S. Goldwasser, and S. Micali. How to construct random functions. Journal of the ACM, Vol. 33, No. 4, 210\u2013217, 1986.","journal-title":"Journal of the ACM"},{"issue":"2","key":"2_CR8","doi-asserted-by":"publisher","first-page":"281","DOI":"10.1137\/0217017","volume":"17","author":"S. Goldwasser","year":"1988","unstructured":"S. Goldwasser, S. Micali, and R. Rivest. A digital signature scheme secure against adaptive chosen-message attacks. SIAM Journal of Computing, 17(2):281\u2013308, April 1988.","journal-title":"SIAM Journal of Computing"},{"key":"2_CR9","unstructured":"ISO\/IEC 9797. Data cryptographic techniques-Data integrity mechanism using a cryptographic check function employing a block cipher algorithm, 1989."},{"key":"2_CR10","unstructured":"H. Krawczyk. Personal communication, September 1994."},{"key":"2_CR11","doi-asserted-by":"crossref","unstructured":"M. Luby and C. Rackoff, \u201cHow to construct pseudorandom permutations from pseudorandom functions,\u201d SIAM J. Comput, Vol. 17, No. 2, April 1988.","DOI":"10.1137\/0217022"},{"key":"2_CR12","unstructured":"B. Preneel and P. van Oorschot. A new generic attack on message authentication codes. Advances in Cryptology \u2014 Crypto 95 Proceedings."},{"key":"2_CR13","doi-asserted-by":"crossref","unstructured":"R. Rivest, \u201cThe MD5 message digest algorithm.\u201d IETF RFC-1321, 1992.","DOI":"10.17487\/rfc1321"},{"key":"2_CR14","doi-asserted-by":"crossref","unstructured":"G. Tsudik, \u201cMessage authentication with one-way hash functions.\u201d Proceedings of Infocom 92, IEEE Press, 1992.","DOI":"10.1109\/INFCOM.1992.263477"},{"key":"2_CR15","unstructured":"ANSI X9.9, American National Standard for Financial Institution Message Authentication (Wholesale), American Bankers Association, 1981. Revised 1986."}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2014 CRYPT0\u2019 95"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-44750-4_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,2]],"date-time":"2019-05-02T04:18:39Z","timestamp":1556770719000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-44750-4_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1995]]},"ISBN":["9783540602217","9783540447504"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/3-540-44750-4_2","relation":{},"ISSN":["0302-9743"],"issn-type":[{"value":"0302-9743","type":"print"}],"subject":[],"published":{"date-parts":[[1995]]}}}