{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T22:10:50Z","timestamp":1725574250177},"publisher-location":"Berlin, Heidelberg","reference-count":20,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540213703"},{"type":"electronic","value":"9783540246541"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2004]]},"DOI":"10.1007\/978-3-540-24654-1_25","type":"book-chapter","created":{"date-parts":[[2011,1,7]],"date-time":"2011-01-07T12:49:37Z","timestamp":1294404577000},"page":"348-360","source":"Crossref","is-referenced-by-count":2,"title":["Lower Bound on Linear Authenticated Encryption"],"prefix":"10.1007","author":[{"given":"Charanjit S.","family":"Jutla","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"25_CR1","unstructured":"ANSI X3.106, American National Standard for Information Systems \u2013 Data Encryption Algorithm \u2013 Modes of Operation, American National Standards Institute (1983)"},{"key":"25_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"341","DOI":"10.1007\/3-540-48658-5_32","volume-title":"Advances in Cryptology - CRYPTO \u201994","author":"M. Bellare","year":"1994","unstructured":"Bellare, M., Kilian, J., Rogaway, P.: The Security of Cipher Block Chaining. In: Desmedt, Y.G. (ed.) CRYPTO 1994. LNCS, vol.\u00a0839, pp. 341\u2013358. Springer, Heidelberg (1994)"},{"key":"25_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"531","DOI":"10.1007\/3-540-44448-3_41","volume-title":"Advances in Cryptology - ASIACRYPT 2000","author":"M. Bellare","year":"2000","unstructured":"Bellare, M., Namprempre, C.: Authenticated Encryption: Relations among notions and analysis of the generic composition paradigm. In: Okamoto, T. (ed.) ASIACRYPT 2000. LNCS, vol.\u00a01976, p. 531. Springer, Heidelberg (2000)"},{"key":"25_CR4","doi-asserted-by":"crossref","unstructured":"Gligor, V.D., Donescu, P.: Integrity Aware PCBC Encryption Schemes. In: 7th Intl. Workshop on Security Protocols, Cambridge. LNCS (1999)","DOI":"10.1007\/10720107_22"},{"key":"25_CR5","doi-asserted-by":"crossref","unstructured":"Gligor, V.D., Donescu, P.: Fast Encryption Authentication: XCBC Encryption and XECB Authentication Modes. In: Proc. Fast Software Encryption 2001 (2001)","DOI":"10.1007\/3-540-45473-X_8"},{"key":"25_CR6","unstructured":"ISO 8372, \u201cInformation processing \u2013 Modes of operation for a 64-bit block cipher algorithm\u201d, International Organization for Standardization, Geneva, Switzerland (1987)"},{"key":"25_CR7","unstructured":"ISO\/IEC 9797, Data cryptographic techniques \u2013 Data integrity mechanism using a cryptographic check function employing a block cipher algorithm (1989)"},{"key":"25_CR8","doi-asserted-by":"crossref","unstructured":"Luby, M.: Pseudorandomness and Cryptographic Applications. Princeton Computer Science Notes (1996)","DOI":"10.1515\/9780691206844"},{"key":"25_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"529","DOI":"10.1007\/3-540-44987-6_32","volume-title":"Advances in Cryptology - EUROCRYPT 2001","author":"C.S. Jutla","year":"2001","unstructured":"Jutla, C.S.: Encryption Modes with Almost Free Message Integrity. In: Pfitzmann, B. (ed.) EUROCRYPT 2001. LNCS, vol.\u00a02045, p. 529. Springer, Heidelberg (2001)"},{"key":"25_CR10","doi-asserted-by":"crossref","unstructured":"Katz, J., Yung, M.: Unforgeable Encryption and Adaptively Secure Modes of Operation. In: Proc. Fast Software Encryption (2000)","DOI":"10.1007\/3-540-44706-7_20"},{"key":"25_CR11","unstructured":"Modified PCBC for DES, http:\/\/diswww.mit.edu:8008\/menelaus.mit.edu\/kprot\/23"},{"key":"25_CR12","unstructured":"Black, A., Stiglic, A.: Free-Mac Mode, sci.crypt Newsgroup, 2000\/03\/07"},{"key":"25_CR13","volume-title":"Algebra","author":"S. MacLane","year":"1967","unstructured":"MacLane, S.: Algebra. Macmillan, New York (1967)"},{"key":"25_CR14","doi-asserted-by":"crossref","unstructured":"Knudsen, L.R., Lai, X., Preneel, B.: Attacks on Fasst Double Block Length Hash Functions. Journal of Cryptology\u00a011(1) (Winter 1998)","DOI":"10.1007\/s001459900035"},{"key":"25_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"129","DOI":"10.1007\/3-540-48658-5_15","volume-title":"Advances in Cryptology - CRYPTO \u201994","author":"H. Krawczyk","year":"1994","unstructured":"Krawczyk, H.: LFSR-based Hashing and Authentication. In: Desmedt, Y.G. (ed.) CRYPTO 1994. LNCS, vol.\u00a0839, pp. 129\u2013139. Springer, Heidelberg (1994)"},{"key":"25_CR16","volume-title":"Cryptography: A New Dimension in Computer Data Security","author":"C.H. Meyer","year":"1982","unstructured":"Meyer, C.H., Matyas, S.M.: Cryptography: A New Dimension in Computer Data Security. John Wiley and Sons, New York (1982)"},{"key":"25_CR17","unstructured":"National Institute of Standards and Technology. Recommendation for Block Cipher Modes of Operation, SP 800-38A, http:\/\/csrc.nist.gov\/publications\/nistpubs\/index.html"},{"key":"25_CR18","unstructured":"National Bureau of Standards, NBS FIPS PUB 81, DES modes of operation, U. S. Department of Commerce (1980)"},{"key":"25_CR19","unstructured":"RFC 1510, The Kerberos network authentication service (V5), J. Kohl and B.C. Neuman (September 1993)"},{"key":"25_CR20","series-title":"Lecture Notes in Computer Science","first-page":"196","volume-title":"Machines, Languages, and Complexity","author":"P. Rogaway","year":"1989","unstructured":"Rogaway, P., Bellare, M., Black, J., Krovetz, T.: OCB: A Block- Cipher Mode of Operation for Efficient Authenticated Encryption. In: Eighth ACM Conference on Computer and Communications Security (CCS-8), pp. 196\u2013205. ACM Press, New York (2001)"}],"container-title":["Lecture Notes in Computer Science","Selected Areas in Cryptography"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-24654-1_25.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,19]],"date-time":"2020-11-19T04:50:25Z","timestamp":1605761425000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-24654-1_25"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004]]},"ISBN":["9783540213703","9783540246541"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-24654-1_25","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2004]]}}}