{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T23:07:02Z","timestamp":1725664022864},"publisher-location":"Berlin, Heidelberg","reference-count":18,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540572206"},{"type":"electronic","value":"9783540479765"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1993]]},"DOI":"10.1007\/3-540-57220-1_73","type":"book-chapter","created":{"date-parts":[[2012,2,26]],"date-time":"2012-02-26T12:21:49Z","timestamp":1330258909000},"page":"339-348","source":"Crossref","is-referenced-by-count":10,"title":["A fast cryptographic checksum algorithm based on stream ciphers"],"prefix":"10.1007","author":[{"given":"Xuejia","family":"Lai","sequence":"first","affiliation":[]},{"given":"Rainer A.","family":"Rueppel","sequence":"additional","affiliation":[]},{"given":"Jack","family":"Woollven","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2005,5,31]]},"reference":[{"key":"27_CR1","volume-title":"Financial Institution Message Authentication (Wholesale)","author":"ANSI X9.9-1986","year":"1986","unstructured":"ANSI X9.9-1986, Financial Institution Message Authentication (Wholesale), American Bankers Association, Washington DC, 1986."},{"key":"27_CR2","unstructured":"G. Brassard, Modern Cryptology, LNCS 325, Springer-Verlag, 1988."},{"key":"27_CR3","unstructured":"Data Encryption Standard, FIPS PUB 46, National Tech. Info. Service, Springfield, VA, 1977."},{"key":"27_CR4","doi-asserted-by":"crossref","unstructured":"I. B. Damgaard, \u201cA Design Principle for Hash Functions\u201d, Advances in Cryptology-CRYPTO'89, LNCS 435, pp. 416\u2013427, Springer-Verlag, 1990.","DOI":"10.1007\/0-387-34805-0_39"},{"key":"27_CR5","doi-asserted-by":"crossref","unstructured":"Yvo Desmedt, \u201cUnconditional secure authentication schemes and practical and theoretical consequences\u201d, Advances in Cryptology-CRYPTO'85, LNCS 218 pp. 42\u201355, Springer-Verlag, 1986.","DOI":"10.1007\/3-540-39799-X_6"},{"key":"27_CR6","doi-asserted-by":"crossref","first-page":"469","DOI":"10.1109\/TIT.1985.1057074","volume":"IT-31","author":"T. Gamal El","year":"1985","unstructured":"T. El Gamal, \u201cA Public Key Cryptosystem and a Signature Scheme based on Discrete Logarithms\u201d, IEEE Trans. on Info. Th., Vol. IT-31, pp. 469\u2013472, 1985.","journal-title":"IEEE Trans. on Info. Th."},{"key":"27_CR7","volume-title":"Shift Register Sequences","author":"S. W. Golomb","year":"1967","unstructured":"S. W. Golomb, Shift Register Sequences, Holden-Day, San Francisco, 1967."},{"key":"27_CR8","unstructured":"ISO 8731-1, \u201cBanking \u2014 Approved Algorithms for Message Authentication \u2014 Part 1: DEA\u201d, International Organization for Standardization, 1987."},{"key":"27_CR9","unstructured":"ISO\/IEC 9797, \u201cData cryptographic techniques \u2014 Data integrity mechanism using a cryptographic check function employing a block cipher algorithm\u201d, International Organization for Standardization, 1-st. edition, 1989."},{"key":"27_CR10","doi-asserted-by":"crossref","unstructured":"R. R. Jueneman, \u201cA High-Speed Manipulation Detection Code\u201d, Advances in Cryptology-CRYPTO'86, Proceedings, pp. 327\u2013346, Springer-Verlag, 1987.","DOI":"10.1007\/3-540-47721-7_25"},{"key":"27_CR11","volume-title":"ETH series in Information Processing","author":"X. Lai","year":"1992","unstructured":"X. Lai, \u201cOn the Design and Security of Block Ciphers\u201d, ETH series in Information Processing (Ed. J.L. Massey), Vol.1, Hartung-Gorre Verlag, Konstanz, 1992."},{"key":"27_CR12","unstructured":"X. Lai and J. L. Massey, \u201cSome Connections between Scramblers and Invertible Automata\u201d, Proceedings of Beijing International Workshop on Information Theory (BIWIT'88), p. DI-5.1, International Academic Publishers, July, 1988."},{"key":"27_CR13","unstructured":"C. J. Mitchell, F. Piper and P. Wild, \u201cDigital Signatures\u201d, Contemporary Cryptology (Ed. G. Simmons), pp. 325\u2013378, IEEE Press, 1991."},{"key":"27_CR14","doi-asserted-by":"crossref","first-page":"120","DOI":"10.1145\/359340.359342","volume":"21","author":"R. L. Rivest","year":"1978","unstructured":"R. L. Rivest, A. Shamir and L. Adleman, \u201cA Method for obtaining digital Signatures and Public-Key Cryptosystems\u201d, Communications of the ACM 21 (1978), pp. 120\u2013126.","journal-title":"Communications of the ACM"},{"key":"27_CR15","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-642-82865-2","volume-title":"Analysis and Design of Stream Ciphers","author":"R. A. Rueppel","year":"1986","unstructured":"R. A. Rueppel, Analysis and Design of Stream Ciphers, New York, NY, Springer-Verlag, 1986."},{"key":"27_CR16","unstructured":"R. A. Rueppel, \u201cStream Ciphers\u201d, Contemporary Cryptology: The Science of Information Integrity (Ed. G. Simmons), pp. 65\u2013134, IEEE Press, 1991."},{"key":"27_CR17","doi-asserted-by":"crossref","first-page":"656","DOI":"10.1002\/j.1538-7305.1949.tb00928.x","volume":"28","author":"C. E. Shannon","year":"1949","unstructured":"C. E. Shannon, \u201cCommunication Theory of Secrecy Systems\u201d, Bell. System Technical Journal, Vol. 28, pp. 656\u2013715, Oct. 1949.","journal-title":"Bell. System Technical Journal"},{"key":"27_CR18","doi-asserted-by":"crossref","first-page":"203","DOI":"10.1007\/978-1-4684-4730-9_17","volume-title":"Advances in Cryptology-CRYPTO'83, Proceedings","author":"R. S. Winternitz","year":"1984","unstructured":"R. S. Winternitz, \u201cProducing One-Way Hash Function from DES\u201d, Advances in Cryptology-CRYPTO'83, Proceedings, pp. 203\u2013207, Plenum Press, New York, 1984."}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2014 AUSCRYPT '92"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-57220-1_73.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,28]],"date-time":"2021-04-28T01:00:52Z","timestamp":1619571652000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-57220-1_73"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1993]]},"ISBN":["9783540572206","9783540479765"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/3-540-57220-1_73","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[1993]]}}}