{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,12]],"date-time":"2026-05-12T16:12:02Z","timestamp":1778602322890,"version":"3.51.4"},"publisher-location":"Berlin, Heidelberg","reference-count":20,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540583332","type":"print"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/3-540-48658-5_32","type":"book-chapter","created":{"date-parts":[[2007,8,9]],"date-time":"2007-08-09T20:50:39Z","timestamp":1186692639000},"page":"341-358","source":"Crossref","is-referenced-by-count":193,"title":["The Security of Cipher Block Chaining"],"prefix":"10.1007","author":[{"given":"Mihir","family":"Bellare","sequence":"first","affiliation":[]},{"given":"Joe","family":"Kilian","sequence":"additional","affiliation":[]},{"given":"Phillip","family":"Rogaway","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"32_CR1","unstructured":"ANSI X9.9, \u201cAmerican National Standard for Financial Institution Message Authentication (Wholesale),\u201d American Bankers Association, 1981. Revised 1986."},{"key":"32_CR2","unstructured":"M. Bellare, R. Gu\u00e9rin and P. Rogaway, \u201cFully parallelizable message authentication,\u201d Manuscript, April 1994."},{"key":"32_CR3","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48329-2_21","volume-title":"Advances in Cryptology \u2014 Crypto 93 Proceedings","author":"M. Bellare","year":"1994","unstructured":"M. Bellare and P. Rogaway, \u201cEntity authentication and key distribution,\u201d Advances in Cryptology \u2014 Crypto 93 Proceedings, Lecture Notes in Computer Science Vol. 773, Springer-Verlag, D. Stinson, ed., 1994."},{"key":"32_CR4","doi-asserted-by":"crossref","unstructured":"M. Bellare and P. Rogaway, \u201cOptimal asymmetric encryption,\u201d Advances in Cryptology \u2014 Eurocrypt 94 Proceedings, 1994.","DOI":"10.1007\/BFb0053428"},{"key":"32_CR5","series-title":"Lect Notes Comput Sci","volume-title":"Advances in Cryptology \u2014 Crypto 91 Proceedings","author":"R. Bird","year":"1991","unstructured":"R. Bird, I. Gopal, A. Herzberg, P. Janson, S. Kutten, R. Molva and M. Yung, \u201cSystematic design of two-party authentication protocols,\u201d Advances in Cryptology \u2014 Crypto 91 Proceedings, Lecture Notes in Computer Science Vol. 576, Springer-Verlag, J. Feigenbaum, ed., 1991."},{"key":"32_CR6","unstructured":"S. Even, O. Goldreich and S. Micali, \u201cOn-line\/Off line digital signatures,\u201d Manuscript, March 1994. Preliminary version in Crypto 89."},{"key":"32_CR7","unstructured":"U. Feige and M. Naor, Private communication, April 1994."},{"key":"32_CR8","doi-asserted-by":"crossref","unstructured":"O. Goldreich and L. Levin, \u201cA hard predicate for all one-way functions,\u201d Proceedings of the Twenty First Annual Symposium on the Theory of Computing, ACM, 1989.","DOI":"10.1145\/73007.73010"},{"key":"32_CR9","doi-asserted-by":"publisher","first-page":"210","DOI":"10.1145\/6490.6503","volume":"33","author":"O. Goldreich","year":"1986","unstructured":"O. Goldreich, S. Goldwasser and S. Micali, \u201cHow to construct random functions,\u201d Journal of the ACM, Vol. 33, No. 4, 210\u2013217, (1986).","journal-title":"Journal of the ACM"},{"key":"32_CR10","series-title":"Lect Notes Comput Sci","volume-title":"Advances in Cryptology \u2014 Crypto 84 Proceedings","author":"O. Goldreich","year":"1985","unstructured":"O. Goldreich, S. Goldwasser and S. Micali, \u201cOn the cryptographic applications of random functions,\u201d Advances in Cryptology \u2014 Crypto 84 Proceedings, Lecture Notes in Computer Science Vol. 196, Springer-Verlag, B. Blakley, ed., 1985."},{"issue":"2","key":"32_CR11","doi-asserted-by":"publisher","first-page":"281","DOI":"10.1137\/0217017","volume":"17","author":"S. Goldwasser","year":"1988","unstructured":"S. Goldwasser, S. Micali and R. Rivest, \u201cA digital signature scheme secure against adaptive chosen-message attacks,\u201d SIAM Journal of Computing, 17(2):281\u2013308, April 1988.","journal-title":"SIAM Journal of Computing"},{"key":"32_CR12","doi-asserted-by":"crossref","unstructured":"R. Impagliazzo, L. Levin and M. Luby, \u201cPseudo-random generation from one-way functions,\u201d Proceedings of the Twenty First Annual Symposium on the Theory of Computing, ACM, 1989.","DOI":"10.1145\/73007.73009"},{"key":"32_CR13","unstructured":"ISO\/IEC 9797, \u201cData cryptographic techniques \u2014 Data integrity mechanism using a cryptographic check function employing a block cipher algorithm,\u201d 1989."},{"key":"32_CR14","unstructured":"T. Leighton and S. Micali, \u201cProvably fast and secure digital signature algorithms based on secure hash functions,\u201d Manuscript, March 1993."},{"key":"32_CR15","doi-asserted-by":"crossref","unstructured":"M. Luby and C. Rackoff, \u201cHow to construct pseudorandom permutations from pseudorandom functions,\u201d SIAM J. Computation, Vol. 17, No. 2, April 1988.","DOI":"10.1137\/0217022"},{"key":"32_CR16","series-title":"Lect Notes Comput Sci","volume-title":"Advances in Cryptology \u2014 Crypto 87 Proceedings","author":"M. Luby","year":"1987","unstructured":"M. Luby and C. Rackoff, \u201cA study of password security,\u201d Advances in Cryptology \u2014 Crypto 87 Proceedings, Lecture Notes in Computer Science Vol. 293, Springer-Verlag, C. Pomerance, ed., 1987."},{"key":"32_CR17","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48329-2_18","volume-title":"Advances in Cryptology \u2014 Crypto 93 Proceedings","author":"K. Ohta","year":"1994","unstructured":"K. Ohta and M. Matsui, \u201cDifferential attack on message authentication codes,\u201d Advances in Cryptology \u2014 Crypto 93 Proceedings, Lecture Notes in Computer Science Vol. 773, Springer-Verlag, D. Stinson, ed., 1994."},{"key":"32_CR18","doi-asserted-by":"crossref","unstructured":"R. Rivest, \u201cThe MD5 message-digest algorithm,\u201d IETF Network Working Group, RFC 1321, April 1992.","DOI":"10.17487\/rfc1321"},{"key":"32_CR19","series-title":"Lect Notes Comput Sci","volume-title":"Advances in Cryptology \u2014 Crypto 89 Proceedings","author":"C. Schnorr","year":"1989","unstructured":"C. Schnorr, \u201cEfficient identification and signatures for smart cards,\u201d Advances in Cryptology \u2014 Crypto 89 Proceedings, Lecture Notes in Computer Science Vol. 435, Springer-Verlag, G. Brassard, ed., 1989."},{"key":"32_CR20","doi-asserted-by":"crossref","unstructured":"S. Stubblebine and V. Gligor, \u201cOn message integrity in cryptographic protocols,\u201d Proceedings of the 1992 IEEE Computer Society Symposium on Research in Security and Privacy. May 1992.","DOI":"10.1109\/RISP.1992.213268"}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2014 CRYPTO \u201994"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-48658-5_32.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,28]],"date-time":"2021-04-28T00:50:48Z","timestamp":1619571048000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-48658-5_32"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540583332"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/3-540-48658-5_32","relation":{},"subject":[]}}