{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T19:38:41Z","timestamp":1725824321265},"publisher-location":"Cham","reference-count":14,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319199610"},{"type":"electronic","value":"9783319199627"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-19962-7_25","type":"book-chapter","created":{"date-parts":[[2015,6,24]],"date-time":"2015-06-24T04:28:10Z","timestamp":1435120090000},"page":"433-450","source":"Crossref","is-referenced-by-count":1,"title":["Generalizing PMAC Under Weaker Assumptions"],"prefix":"10.1007","author":[{"given":"Nilanjan","family":"Datta","sequence":"first","affiliation":[]},{"given":"Kan","family":"Yasuda","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,6,25]]},"reference":[{"key":"25_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"15","DOI":"10.1007\/3-540-44750-4_2","volume-title":"Advances in Cryptology - CRYPTO \u201995","author":"M Bellare","year":"1995","unstructured":"Bellare, M., Gu\u00e9rin, R., Rogaway, P.: XOR MACs: new methods for message authentication using finite pseudorandom functions. In: Coppersmith, D. (ed.) CRYPTO 1995. LNCS, vol. 963, pp. 15\u201328. Springer, Heidelberg (1995). \u00a7\n                      \n                        \n                      \n                      $$1$$\n                      \n                        \n                          \n                            1"},{"key":"25_CR2","series-title":"Lecture Notes in Computer Science","first-page":"1","volume-title":"Advances in Cryptology - CRYPTO \u201996","author":"M Bellare","year":"1996","unstructured":"Bellare, M., Canetti, R., Krawczyk, H.: Keying hash functions for message authentication. In: Koblitz, N. (ed.) CRYPTO 1996. LNCS, vol. 1109, pp. 1\u201315. Springer, Heidelberg (1996). \u00a7\n                      \n                        \n                      \n                      $$1$$\n                      \n                        \n                          \n                            1"},{"key":"25_CR3","unstructured":"Bellare, M., Desai, A., Jokipii, E., Rogaway, P.: A concrete security treatment of symmetric encryption. In: Proceedings of the 38th Annual Symposium on Foundations of Computer science, FOCS, vol. 394 (1997). \u00a7\n                      \n                        \n                      \n                      $$2.2$$\n                      \n                        \n                          \n                            2.2"},{"key":"25_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"602","DOI":"10.1007\/11818175_36","volume-title":"Advances in Cryptology - CRYPTO 2006","author":"M Bellare","year":"2006","unstructured":"Bellare, M.: New proofs for NMAC and HMAC: security without collision-resistance. In: Dwork, C. (ed.) CRYPTO 2006. LNCS, vol. 4117, pp. 602\u2013619. Springer, Heidelberg (2006). \u00a7\n                      \n                        \n                      \n                      $$2.1$$\n                      \n                        \n                          \n                            2.1\n                          \n                        \n                      \n                    , \u00a7\n                      \n                        \n                      \n                      $$2.2$$\n                      \n                        \n                          \n                            2.2\n                          \n                        \n                      \n                    , \u00a7\n                      \n                        \n                      \n                      $$2.2$$\n                      \n                        \n                          \n                            2.2\n                          \n                        \n                      \n                    , \u00a7\n                      \n                        \n                      \n                      $$4$$\n                      \n                        \n                          \n                            4\n                          \n                        \n                      \n                    , \u00a7\n                      \n                        \n                      \n                      $$4$$\n                      \n                        \n                          \n                            4"},{"key":"25_CR5","unstructured":"Bellare, M., Goldrich, O., Mityagin, A.: The power of verification queries in message authentication and authenticated encryption. Cryptology ePrint Archive: Report 2004\/309 (2004). \u00a7\n                      \n                        \n                      \n                      $$2.2$$\n                      \n                        \n                          \n                            2.2"},{"key":"25_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"384","DOI":"10.1007\/3-540-46035-7_25","volume-title":"Advances in Cryptology - EUROCRYPT 2002","author":"JA Black","year":"2002","unstructured":"Black, J.A., Rogaway, P.: A block-cipher mode of operation for parallelizable message authentication. In: Knudsen, L.R. (ed.) EUROCRYPT 2002. LNCS, vol. 2332, pp. 384\u2013397. Springer, Heidelberg (2002)"},{"key":"25_CR7","unstructured":"Goldreich, O., Goldwasser, S., Micali, S.: How to construct random functions. In: JACM 1986, pp. 792\u2013807 (1986). \u00a7\n                      \n                        \n                      \n                      $$2.1$$\n                      \n                        \n                          \n                            2.1"},{"key":"25_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"129","DOI":"10.1007\/978-3-540-39887-5_11","volume-title":"Fast Software Encryption","author":"T Iwata","year":"2003","unstructured":"Iwata, T., Kurosawa, K.: OMAC: one-key CBC MAC. In: Johansson, T. (ed.) FSE 2003. LNCS, vol. 2887, pp. 129\u2013153. Springer, Heidelberg (2003). \u00a7\n                      \n                        \n                      \n                      $$1$$\n                      \n                        \n                          \n                            1"},{"key":"25_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"472","DOI":"10.1007\/11523468_39","volume-title":"Automata, Languages and Programming","author":"UM Maurer","year":"2005","unstructured":"Maurer, U.M., Sj\u00f6din, J.: Single-key AIL-MACs from any FIL-MAC. In: Caires, L., Italiano, G.F., Monteiro, L., Palamidessi, C., Yung, M. (eds.) ICALP 2005. LNCS, vol. 3580, pp. 472\u2013484. Springer, Heidelberg (2005)"},{"key":"25_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"226","DOI":"10.1007\/11799313_15","volume-title":"Fast Software Encryption","author":"K Minematsu","year":"2006","unstructured":"Minematsu, K., Tsunoo, Y.: Provably secure MACs from differentially-uniform permutations and AES-based implementations. In: Robshaw, M. (ed.) FSE 2006. LNCS, vol. 4047, pp. 226\u2013241. Springer, Heidelberg (2006). \u00a7\n                      \n                        \n                      \n                      $$1$$\n                      \n                        \n                          \n                            1"},{"key":"25_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1007\/978-3-540-30539-2_2","volume-title":"Advances in Cryptology - ASIACRYPT 2004","author":"P Rogaway","year":"2004","unstructured":"Rogaway, P.: Efficient instantiations of tweakable blockciphers and refinements to modes OCB and PMAC. In: Lee, P.J. (ed.) ASIACRYPT 2004. LNCS, vol. 3329, pp. 16\u201331. Springer, Heidelberg (2004). \u00a7\n                      \n                        \n                      \n                      $$1$$\n                      \n                        \n                          \n                            1"},{"key":"25_CR12","doi-asserted-by":"publisher","first-page":"4025","DOI":"10.1109\/TIT.2010.2050921","volume":"56","author":"P Sarkar","year":"2010","unstructured":"Sarkar, P.: Pesudo-Random functions and parallelizable modes of operations of a block cipher. IEEE Transaction on Information Theory 56, 4025\u20134037 (2010). \u00a7\n                      \n                        \n                      \n                      $$1$$\n                      \n                        \n                          \n                            1","journal-title":"IEEE Transaction on Information Theory"},{"key":"25_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"313","DOI":"10.1007\/3-540-68697-5_24","volume-title":"Advances in Cryptology - CRYPTO \u201996","author":"V Shoup","year":"1996","unstructured":"Shoup, V.: On fast and provably secure message authentication based on universal hashing. In: Koblitz, N. (ed.) CRYPTO 1996. LNCS, vol. 1109, pp. 313\u2013328. Springer, Heidelberg (1996). \u00a7\n                      \n                        \n                      \n                      $$1$$\n                      \n                        \n                          \n                            1"},{"key":"25_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"268","DOI":"10.1007\/978-3-642-00730-9_17","volume-title":"Information Security and Cryptology \u2013 ICISC 2008","author":"K Yasuda","year":"2009","unstructured":"Yasuda, K.: A single-key domain extender for privacy-preserving MACs and PRFs. In: Lee, P.J., Cheon, J.H. (eds.) ICISC 2008. LNCS, vol. 5461, pp. 268\u2013285. Springer, Heidelberg (2009). \u00a7\n                      \n                        \n                      \n                      $$2a$$\n                      \n                        \n                          \n                            2\n                            a\n                          \n                        \n                      \n                    , \u00a7\n                      \n                        \n                      \n                      $$4$$\n                      \n                        \n                          \n                            4\n                          \n                        \n                      \n                    , \u00a7\n                      \n                        \n                      \n                      $$4.2$$\n                      \n                        \n                          \n                            4.2"}],"container-title":["Lecture Notes in Computer Science","Information Security and Privacy"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-19962-7_25","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,30]],"date-time":"2019-05-30T04:22:55Z","timestamp":1559190175000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-19962-7_25"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319199610","9783319199627"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-19962-7_25","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]}}}