{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,13]],"date-time":"2025-05-13T02:43:10Z","timestamp":1747104190052},"publisher-location":"Berlin, Heidelberg","reference-count":18,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540611868"},{"type":"electronic","value":"9783540683391"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1996]]},"DOI":"10.1007\/3-540-68339-9_3","type":"book-chapter","created":{"date-parts":[[2007,8,6]],"date-time":"2007-08-06T01:31:14Z","timestamp":1186363874000},"page":"19-32","source":"Crossref","is-referenced-by-count":46,"title":["On the Security of Two MAC Algorithms"],"prefix":"10.1007","author":[{"given":"Bart","family":"Preneel","sequence":"first","affiliation":[]},{"given":"Paul C.","family":"van Oorschot","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2001,7,13]]},"reference":[{"key":"3_CR1","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"341","DOI":"10.1007\/3-540-48658-5_32","volume-title":"Proc. Crypto\u201994","author":"M. Bellare","year":"1994","unstructured":"M. Bellare, J. Kilian, P. Rogaway, \u201cThe security of cipher block chaining,\u201d Proc. Crypto\u201994, LNCS 839, Springer-Verlag, 1994, pp. 341\u2013358."},{"key":"3_CR2","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"15","DOI":"10.1007\/3-540-44750-4_2","volume-title":"Proc. Crypto\u201995","author":"M. Bellare","year":"1995","unstructured":"M. Bellare, R. Gu\u00e9rin, P. Rogaway, \u201cXOR MACs: new methods for message authentication using block ciphers,\u201d Proc. Crypto\u201995, LNCS 963, Springer-Verlag, 1995, pp. 15\u201328."},{"key":"3_CR3","unstructured":"M. Bellare, R. Canetti, H. Krawczyk, \u201cHow to key Merkle-Cascaded pseudo-randomness and its concrete security\u201d, 10 November 1995, http:\/\/www.research.ibm.com\/security\/ ."},{"key":"3_CR4","doi-asserted-by":"crossref","unstructured":"M. Bellare, R. Canetti, H. Krawczyk, \u201cKeying hash functions for message authentication,\u201d 25 January 1996, http:\/\/www.research.ibm.com\/security\/ .","DOI":"10.1007\/3-540-68697-5_1"},{"key":"3_CR5","doi-asserted-by":"crossref","unstructured":"E. Biham, A. Shamir, Differential Cryptanalysis of the Data Encryption Standard, Springer-Verlag, 1993.","DOI":"10.1007\/978-1-4613-9314-6"},{"key":"3_CR6","unstructured":"H. Block, \u201cFile authentication: A rule for constructing algorithms,\u201d S\u00c4Kdata Report, October 12, 1983."},{"key":"3_CR7","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"393","DOI":"10.1007\/3-540-39568-7_30","volume-title":"Proc. Crypto\u201984","author":"D. Davies","year":"1985","unstructured":"D. Davies, \u201cA message authenticator algorithm suitable for a mainframe computer,\u201d Proc. Crypto\u201984, LNCS 196, Springer-Verlag, 1985, pp. 393\u2013400."},{"key":"3_CR8","unstructured":"D. Davies, D.O. Clayden, \u201cThe message authenticator algorithm (MAA) and its implementation,\u201d NPL Report DITC 109\/88, Feb. 1988."},{"key":"3_CR9","doi-asserted-by":"crossref","unstructured":"D. Davies, W. Price, Security for Computer Networks, 2nd ed., Wiley, 1989.","DOI":"10.1016\/0267-3649(89)90162-3"},{"key":"3_CR10","unstructured":"ISO 8731:1987, Banking \u2014 approved algorithms for message authentication, Part 1, DEA, IS 8731-1, Part 2, Message Authentication Algorithm (MAA), IS 8731-2."},{"key":"3_CR11","unstructured":"ISO\/IEC 9797:1993, Information technology \u2014 Data cryptographic techniques \u2014 Data integrity mechanisms using a cryptographic check function employing a block cipher algorithm."},{"issue":"1","key":"3_CR12","first-page":"5","volume":"1","author":"B. Kaliski","year":"1995","unstructured":"B. Kaliski, M. Robshaw, \u201cMessage authentication with MD5,\u201d CryptoBytes (RSA Laboratories Technical Newsletter), Vol. 1, No. 1, Spring 1995, pp. 5\u20138.","journal-title":"CryptoBytes (RSA Laboratories Technical Newsletter)"},{"key":"3_CR13","series-title":"Lect Notes Comput Sci","first-page":"1","volume-title":"Proc. Crypto\u201994","author":"M. Matsui","year":"1994","unstructured":"M. Matsui, \u201cThe first experimental cryptanalysis of the Data Encryption Standard,\u201d Proc. Crypto\u201994, LNCS 839, Springer-Verlag, 1994, pp. 1\u201311."},{"key":"3_CR14","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/3-540-60590-8","volume-title":"Proc. Crypto\u201995","author":"B. Preneel","year":"1995","unstructured":"B. Preneel, P.C. van Oorschot, \u201cMDx-MAC and building fast MACs from hash functions\u201d, Proc. Crypto\u201995, LNCS 963, Springer-Verlag, 1995, pp. 1\u201314."},{"key":"3_CR15","doi-asserted-by":"crossref","unstructured":"R.L. Rivest, \u201cThe MD5 message-digest algorithm,\u201d Request for Comments (RFC) 1321, Internet Activities Board, Internet Privacy Task Force, April 1992.","DOI":"10.17487\/rfc1321"},{"key":"3_CR16","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"29","DOI":"10.1007\/3-540-44750-4_3","volume-title":"Proc. Crypto\u201995","author":"P. Rogaway","year":"1995","unstructured":"P. Rogaway, \u201cBucket hashing and its application to fast message authentication\u201d, Proc. Crypto\u201995, LNCS 963, Springer-Verlag, 1995, pp. 29\u201342."},{"key":"3_CR17","doi-asserted-by":"crossref","unstructured":"P. Metzger, W. Simpson, \u201cIP Authentication using Keyed MD5\u201d, Internet Request for Comments 1828, August 1995.","DOI":"10.17487\/rfc1828"},{"issue":"5","key":"3_CR18","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1145\/141809.141812","volume":"22","author":"G. Tsudik","year":"1992","unstructured":"G. Tsudik, \u201cMessage authentication with one-way hash functions,\u201d ACM Computer Communications Review, Vol. 22, No. 5, 1992, pp. 29\u201338.","journal-title":"ACM Computer Communications Review"}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2014 EUROCRYPT \u201996"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-68339-9_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,5,13]],"date-time":"2023-05-13T17:59:31Z","timestamp":1684000771000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-68339-9_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1996]]},"ISBN":["9783540611868","9783540683391"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/3-540-68339-9_3","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[1996]]}}}