{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,2]],"date-time":"2026-01-02T07:41:23Z","timestamp":1767339683851},"publisher-location":"Berlin, Heidelberg","reference-count":15,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540577669"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/3-540-48329-2_4","type":"book-chapter","created":{"date-parts":[[2007,8,6]],"date-time":"2007-08-06T01:25:55Z","timestamp":1186363555000},"page":"40-48","source":"Crossref","is-referenced-by-count":34,"title":["An Integrity Check Value Algorithm for Stream Ciphers"],"prefix":"10.1007","author":[{"given":"Richard","family":"Taylor","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"4_CR1","unstructured":"Brassard, G.: On Computationally Secure Authentication Tags. Advances in Cryptology-CRYPTO\u201982, proceedings, Springer-Verlag (1983) 79\u201386"},{"key":"4_CR2","doi-asserted-by":"publisher","first-page":"143","DOI":"10.1016\/0022-0000(79)90044-8","volume":"18","author":"J. L. Carter","year":"1979","unstructured":"Carter, J. L., Wegman, M. N.: Universal Classes of Hash Functions. Journal of Computer and Systems Sciences 18 (1979) 143\u2013154","journal-title":"Journal of Computer and Systems Sciences"},{"key":"4_CR3","doi-asserted-by":"crossref","unstructured":"Damgaard, I. B.: A Design Principle for Hash Functions. Advances in Cryptology-CRYPTO\u201989, proceedings, Springer-Verlag (1990) 416\u2013427","DOI":"10.1007\/0-387-34805-0_39"},{"key":"4_CR4","unstructured":"ISO\/IEC 9797: Data Cryptographic Techniques-Data Integrity Mechanism using a Cryptographic Check Function employing a Block Cipher Algorithm. International Organisation for Standardisation (1989)"},{"key":"4_CR5","unstructured":"Jueneman, R. R.: A High-Speed Manipulation Detection Code. Advances in Cryptology-CRYPTO\u201986, proceedings, Springer-Verlag (1987) 327\u2013346"},{"key":"4_CR6","unstructured":"Knobloch, H. J.: A Smart Card Implementation of the Fiat-Shamir Identification Scheme. Advances in Cryptology-EUROCRYPT\u201988, proceedings, Springer-Verlag (1989) 87\u201396"},{"key":"4_CR7","volume-title":"The Art of Computer Programming","author":"D. Knuth","year":"1981","unstructured":"Knuth, D.: The Art of Computer Programming. Vol. 2, 2nd edition, Addison-Wesley, Reading, Mass. (1981)","edition":"2nd edition"},{"key":"4_CR8","unstructured":"Lai, X., Massey, J. L.: Hash Functions based on Block Ciphers. EUROCRYPT\u201992, extended abstracts (1992) 53\u201367"},{"key":"4_CR9","unstructured":"Lai, X., Rueppel, R. A., Woollven, J.: A Fast Cryptographic Checksum Algorithm based on Stream Ciphers. AUSCRYPT\u201992, abstracts (1992) 8-7\u20138-11"},{"key":"4_CR10","doi-asserted-by":"crossref","unstructured":"Merkle, R. C: One Way Hash Functions and DES. Advances in Cryptology-CRYPTO\u201989, proceedings, Springer-Verlag (1990) 428\u2013446","DOI":"10.1007\/0-387-34805-0_40"},{"key":"4_CR11","volume-title":"The Theory of Numbers","author":"I. Niven","year":"1980","unstructured":"Niven, I., Zuckerman, H. S.: The Theory of Numbers (fourth edition). John Wiley and Sons, New York-Chichester-Brisbane-Toronto (1980)","edition":"fourth edition"},{"key":"4_CR12","unstructured":"Rivest, R. L.: The MD4 Message Digest Algorithm. Advances in Cryptology-CRYPTO\u201990, proceedings, Springer-Verlag (1991) 303\u2013311"},{"key":"4_CR13","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-642-82865-2","volume-title":"Analysis and Design of Stream Ciphers","author":"R. A. Rueppel","year":"1986","unstructured":"Rueppel, R. A.: Analysis and Design of Stream Ciphers. Springer-Verlag, Berlin (1986)"},{"key":"4_CR14","doi-asserted-by":"publisher","first-page":"265","DOI":"10.1016\/0022-0000(81)90033-7","volume":"22","author":"M. N. Wegman","year":"1981","unstructured":"Wegman, M. N., Carter, J. L.: New Hash Functions and their use in Authentication and Set Equality. Journal of Computer and System Sciences 22 (1981) 265\u2013279","journal-title":"Journal of Computer and System Sciences"},{"key":"4_CR15","doi-asserted-by":"publisher","first-page":"187","DOI":"10.1080\/0161-117991854025","volume":"3","author":"G. Yuval","year":"1979","unstructured":"Yuval, G.: How to Swindle Rabin. Cryptologia 3 (1979) 187\u2013189","journal-title":"Cryptologia"}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2014 CRYPTO\u2019 93"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-48329-2_4.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,17]],"date-time":"2020-11-17T21:15:43Z","timestamp":1605647743000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-48329-2_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540577669"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/3-540-48329-2_4","relation":{},"subject":[]}}