{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,1,20]],"date-time":"2025-01-20T05:11:21Z","timestamp":1737349881456,"version":"3.33.0"},"publisher-location":"Berlin, Heidelberg","reference-count":8,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540546207"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/3-540-46416-6_40","type":"book-chapter","created":{"date-parts":[[2007,8,6]],"date-time":"2007-08-06T18:02:07Z","timestamp":1186423327000},"page":"472-481","source":"Crossref","is-referenced-by-count":1,"title":["Randomized Authentication Systems"],"prefix":"10.1007","author":[{"given":"Josef","family":"Pieprzyk","sequence":"first","affiliation":[]},{"given":"Reihaneh","family":"Safavi-Naini","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"4","key":"40_CR1","doi-asserted-by":"publisher","first-page":"792","DOI":"10.1145\/6490.6503","volume":"33","author":"O. Goldreich","year":"1986","unstructured":"O. Goldreich, S. Goldwasser, and S. Micali. How to construct random functions. Journal of the ACM, 33(4):792\u2013807, October 1986.","journal-title":"Journal of the ACM"},{"issue":"2","key":"40_CR2","doi-asserted-by":"publisher","first-page":"373","DOI":"10.1137\/0217022","volume":"17","author":"M. Luby","year":"1988","unstructured":"M. Luby and Ch. Rackoff. How to construct pseudorandom permutations from pseudorandom functions. SIAM Journal on Computing, 17(2):373\u2013386, April 1988.","journal-title":"SIAM Journal on Computing"},{"key":"40_CR3","unstructured":"J.L. Massey. Cryptography-a selective survey. In Digital Communication. Elsevier Science Publishers, 1986."},{"key":"40_CR4","unstructured":"R. Safavi-Naini and J. Seberry. Error correcting codes for authentication and subliminal channels. to appear in IEEE Transactions on Information Theory."},{"key":"40_CR5","unstructured":"R. Safavi-Naini and J. Seberry. On construction of practically perfect authentication codes. Technical report, Department of Computer Science, The University of New South Wales, ADFA, 1990."},{"key":"40_CR6","doi-asserted-by":"publisher","first-page":"603","DOI":"10.1109\/5.4445","volume":"76","author":"G.V. Simmons","year":"1988","unstructured":"G.V. Simmons. A survey of information authentication. Proceedings of IEEE, 76:603\u2013620, 1988.","journal-title":"Proceedings of IEEE"},{"key":"40_CR7","doi-asserted-by":"crossref","unstructured":"Andrew C. Yao. Theory and application of trapdoor functions. In Proceedings of the 23rd IEEE Symposium on Fundation of Computer Science, pages 80\u201391, New York, 1982. IEEE.","DOI":"10.1109\/SFCS.1982.45"},{"key":"40_CR8","unstructured":"Y. Zheng, T. Matsumoto, and H. Imai. On the construction of block ciphers provably secure and not relying on any unproved hypotheses. Abstracts of CRYPTO\u201989, Santa Barbara, CA, July 1989."}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2014 EUROCRYPT \u201991"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-46416-6_40.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,20]],"date-time":"2025-01-20T04:39:05Z","timestamp":1737347945000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-46416-6_40"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540546207"],"references-count":8,"URL":"https:\/\/doi.org\/10.1007\/3-540-46416-6_40","relation":{},"subject":[]}}