{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T22:24:49Z","timestamp":1725488689502},"publisher-location":"Berlin, Heidelberg","reference-count":5,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540546207"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/3-540-46416-6_51","type":"book-chapter","created":{"date-parts":[[2007,8,6]],"date-time":"2007-08-06T18:02:07Z","timestamp":1186423327000},"page":"542-546","source":"Crossref","is-referenced-by-count":0,"title":["Probabilistic Analysis of Elementary Randomizers"],"prefix":"10.1007","author":[{"given":"Josef","family":"Pieprzyk","sequence":"first","affiliation":[]}],"member":"297","reference":[{"issue":"2","key":"51_CR1","doi-asserted-by":"publisher","first-page":"373","DOI":"10.1137\/0217022","volume":"17","author":"M. Luby","year":"1988","unstructured":"M. Luby and Ch. Rackoff. How to construct pseudorandom permutations from pseudorandom functions. SIAM Journal on Computing, 17(2):373\u2013386, April 1988.","journal-title":"SIAM Journal on Computing"},{"key":"51_CR2","volume-title":"A study on data security","author":"Y. Ohnishi","year":"1988","unstructured":"Y. Ohnishi. A study on data security. Master Thesis, Tohoku University, Japan, 1988. (in Japanese)."},{"key":"51_CR3","doi-asserted-by":"crossref","unstructured":"J.P. Pieprzyk. How to construct pseudorandom permutations from single pseudorandom functions. Abstracts of EUROCRYPT\u201990, May 1990.","DOI":"10.1007\/3-540-46877-3_12"},{"key":"51_CR4","doi-asserted-by":"crossref","unstructured":"J.P. Pieprzyk and R. Safavi-Naini. Randomized authentication systems. In EUROCRYPT\u201991, Brighton, UK, April 1991.","DOI":"10.1007\/3-540-46416-6_40"},{"key":"51_CR5","doi-asserted-by":"crossref","unstructured":"C.P. Schnorr. On the construction of random number generators and random function generators. In Proc. of Eurocrypt 88, Lecture Notes in Computer Science, New York, 1988. Springer Verlag.","DOI":"10.1007\/3-540-45961-8_19"}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2014 EUROCRYPT \u201991"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-46416-6_51.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,17]],"date-time":"2020-11-17T21:11:37Z","timestamp":1605647497000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-46416-6_51"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540546207"],"references-count":5,"URL":"https:\/\/doi.org\/10.1007\/3-540-46416-6_51","relation":{},"subject":[]}}