{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,10]],"date-time":"2026-04-10T04:20:42Z","timestamp":1775794842146,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":10,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540594093","type":"print"},{"value":"9783540492641","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1995]]},"DOI":"10.1007\/3-540-49264-x_24","type":"book-chapter","created":{"date-parts":[[2007,8,7]],"date-time":"2007-08-07T06:52:09Z","timestamp":1186469529000},"page":"301-310","source":"Crossref","is-referenced-by-count":57,"title":["New Hash Functions for Message Authentication"],"prefix":"10.1007","author":[{"given":"Hugo","family":"Krawczyk","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2001,7,13]]},"reference":[{"key":"24_CR1","doi-asserted-by":"crossref","unstructured":"Noga Alon, Oded Goldreich, Johan Hastad, and Rene Peralta. Simple constructions of almost k-wise independent random variables. In 31th Annual Symposium on Foundations of Computer Science, St. Louis, Missouri, pages 544\u2013553, October 1990.","DOI":"10.1109\/FSCS.1990.89575"},{"key":"24_CR2","unstructured":"Bierbrauer J., Johansson T., Kabatianskii G., and Smeets, B., \u201cOn Families of Hash Functions via Geometric Codes and Concatenation\u201d, Crypto'93"},{"key":"24_CR3","unstructured":"G. Even. Construction of small probability spaces for simulation. M.Sc. thesis, Dept. of Computer Science, Technion, August 1991."},{"key":"24_CR4","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"129","DOI":"10.1007\/3-540-48658-5_15","volume-title":"Advances in Cryptology \u2014 CRYPTO 94 Proceedings","author":"H. Krawczyk","year":"1994","unstructured":"Krawczyk, H., \u201cLFSR-based Hashing and Authentication\u201d, Advances in Cryptology \u2014 CRYPTO 94 Proceedings, Lecture Notes in Computer Science Vol. 839, Springer-Verlag, Y. G. Desmedt, ed 1994, pp. 129\u2013139."},{"issue":"6","key":"24_CR5","doi-asserted-by":"publisher","first-page":"1331","DOI":"10.1137\/0222080","volume":"22","author":"E. Kushilevitz","year":"1993","unstructured":"E. Kushilevitz and Y. Mansour. \u201cLearning decision trees using the Fourier spectrum\u201d, SIAM Journal on Computing 22(6) 1331\u20131348, December 1993.","journal-title":"SIAM Journal on Computing"},{"issue":"1","key":"24_CR6","doi-asserted-by":"publisher","first-page":"121","DOI":"10.1016\/0304-3975(93)90257-T","volume":"107","author":"Y. Mansour","year":"1993","unstructured":"Mansour, Y., Nisan, N., and Tiwari, P., \u201cThe Computational Complexity of Universal Hash Functions\u201d, Theoretical Computer Science, 107(1):121\u2013133, 1993.","journal-title":"Theoretical Computer Science"},{"issue":"4","key":"24_CR7","doi-asserted-by":"publisher","first-page":"838","DOI":"10.1137\/0222053","volume":"22","author":"J. Naor","year":"1993","unstructured":"Joseph Naor and Moni Naor. Small bias probability spaces: efficient construction and applications. SIAM Jour. on Computing, Vol. 22, No. 4, 1993, pp. 838\u2013856.","journal-title":"SIAM Jour. on Computing"},{"key":"24_CR8","doi-asserted-by":"crossref","unstructured":"Stinson, D.R., \u201cUniversal hashing and authentication codes\u201d, Proc. of Crypto'91, pp. 74\u201385.","DOI":"10.1007\/3-540-46766-1_5"},{"key":"24_CR9","unstructured":"Vazirani, U.V., \u201cRandomness, Adversaries and Computation\u201d, Ph.D. Thesis, EECS, UC Berkeley, 1986."},{"key":"24_CR10","first-page":"265","volume":"22","author":"M.N. Wegman","year":"1981","unstructured":"Wegman, M.N., and Carter, J.L., \u201cNew Hash Functions and Their Use in Authentication and Set Equality\u201d, JCSS, 22, 1981, pp. 265\u2013279.","journal-title":"JCSS"}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2014 EUROCRYPT \u201995"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-49264-X_24","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,20]],"date-time":"2025-01-20T05:07:48Z","timestamp":1737349668000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-49264-X_24"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1995]]},"ISBN":["9783540594093","9783540492641"],"references-count":10,"URL":"https:\/\/doi.org\/10.1007\/3-540-49264-x_24","relation":{},"ISSN":["0302-9743"],"issn-type":[{"value":"0302-9743","type":"print"}],"subject":[],"published":{"date-parts":[[1995]]}}}