{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,30]],"date-time":"2025-07-30T15:38:07Z","timestamp":1753889887236},"publisher-location":"Berlin, Heidelberg","reference-count":9,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540583332"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/3-540-48658-5_14","type":"book-chapter","created":{"date-parts":[[2007,8,9]],"date-time":"2007-08-09T20:50:39Z","timestamp":1186692639000},"page":"121-128","source":"Crossref","is-referenced-by-count":6,"title":["Cryptanalysis of the Gemmell and Naor Multiround Authentication Protocol"],"prefix":"10.1007","author":[{"given":"Christian","family":"Gehrmann","sequence":"first","affiliation":[]}],"member":"297","reference":[{"issue":"3","key":"14_CR1","doi-asserted-by":"crossref","first-page":"405","DOI":"10.1002\/j.1538-7305.1974.tb02751.x","volume":"53","author":"E. Gilbert","year":"1974","unstructured":"E. Gilbert, F.J. MacWilliams, N. Sloane, \u201cCodes Which Detect Deception\u201d. Bell System Technical Journal. Vol. 53, No. 3. March 1974, pp. 405\u2013424.","journal-title":"Bell System Technical Journal"},{"key":"14_CR2","doi-asserted-by":"publisher","first-page":"265","DOI":"10.1016\/0022-0000(81)90033-7","volume":"22","author":"J.L. Carter","year":"1981","unstructured":"J.L. Carter, M.N. Wegman, \u201cNew hash functions and their use in authentication and set equality\u201d, J. Computer and System Sci., Vol 22, 1981, pp. 265\u2013279.","journal-title":"J. Computer and System Sci."},{"key":"14_CR3","volume-title":"Contemporary Cryptology, The science for information integrity","author":"G.J. Simmons","year":"1992","unstructured":"G.J. Simmons, \u201cA survey of Information Authentication\u201d, in Contemporary Cryptology, The science for information integrity, ed. G.J. Simmons, IEEE Press, New York, 1992."},{"key":"14_CR4","doi-asserted-by":"crossref","unstructured":"T. Johansson, G. Kabatanskii, B. Smeets, \u201cOn the relation between A-codes and codes correcting independent errors\u201d, Proceedings of Eurocrypt\u2019 93, 1993, pp. 1\u201311.","DOI":"10.1007\/3-540-48285-7_1"},{"key":"14_CR5","doi-asserted-by":"crossref","unstructured":"J. Bierbrauer, T. Johansson, G. Kabatanskii, B. Smeets, \u201cOn Families of Hash Functions via Geometric Codes and Concatenation\u201d, Proceedings of CRYPTO\u2019 93, 1993, pp. 331\u2013342.","DOI":"10.1007\/3-540-48329-2_28"},{"key":"14_CR6","unstructured":"D.R. Stinson, \u201cUniversal hashing and authentication codes\u201d, to appear in IEEE Transaction on Information Theory."},{"key":"14_CR7","doi-asserted-by":"crossref","unstructured":"C. Gehrmann, \u201cLong Message Authentication by using Pseudo-Random Functions\u201d, Proceedings of IEEE ISIT 94, to appear (preprint).","DOI":"10.1109\/ISIT.1994.395108"},{"key":"14_CR8","doi-asserted-by":"publisher","first-page":"300","DOI":"10.1137\/0108018","volume":"8","author":"I.S. Reed","year":"1960","unstructured":"I.S. Reed, G. Solomon, \u201cPolynomial Codes over certain Finite Fields\u201d, J. Soc. Ind. Appl. Math., vol. 8, June 1960, pp. 300\u2013304.","journal-title":"J. Soc. Ind. Appl. Math."},{"key":"14_CR9","doi-asserted-by":"crossref","unstructured":"P. Gemmell, M. Naor, \u201cCodes for interactive authentication\u201d, Proceedings of CRYPTO\u2019 93, 1993, pp. 355\u2013367.","DOI":"10.1007\/3-540-48329-2_30"}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2014 CRYPTO \u201994"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-48658-5_14.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,17]],"date-time":"2020-11-17T21:16:08Z","timestamp":1605647768000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-48658-5_14"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540583332"],"references-count":9,"URL":"https:\/\/doi.org\/10.1007\/3-540-48658-5_14","relation":{},"subject":[]}}