{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,29]],"date-time":"2026-01-29T21:19:37Z","timestamp":1769721577527,"version":"3.49.0"},"publisher-location":"Berlin, Heidelberg","reference-count":19,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540209966","type":"print"},{"value":"9783540246602","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2004]]},"DOI":"10.1007\/978-3-540-24660-2_1","type":"book-chapter","created":{"date-parts":[[2010,8,2]],"date-time":"2010-08-02T15:18:44Z","timestamp":1280762324000},"page":"1-14","source":"Crossref","is-referenced-by-count":16,"title":["Online Encryption Schemes: New Security Notions and Constructions"],"prefix":"10.1007","author":[{"given":"Alexandra","family":"Boldyreva","sequence":"first","affiliation":[]},{"given":"Nut","family":"Taesombut","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"1_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"292","DOI":"10.1007\/3-540-44647-8_18","volume-title":"Advances in Cryptology - CRYPTO 2001","author":"M. Bellare","year":"2001","unstructured":"Bellare, M., Boldyreva, A., Knudsen, L., Namprempre, C.: Online Ciphers and the Hash-CBC Constructions. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol.\u00a02139, p. 292. Springer, Heidelberg (2001), \n                    \n                      www.cse.ucsd.edu\/users\/mihir\/papers\/olc.html"},{"key":"1_CR2","volume-title":"Proc. of the 38th Symposium on Foundations of Computer Science","author":"M. Bellare","year":"1997","unstructured":"Bellare, M., Desai, A., Jokipii, E., Rogaway, P.: A Concrete Security Treatment of Symmetric Encryption: Analysis of the DES Modes of Operation. In: Proc. of the 38th Symposium on Foundations of Computer Science, IEEE, Los Alamitos (1997)"},{"key":"1_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"341","DOI":"10.1007\/3-540-48658-5_32","volume-title":"Advances in Cryptology - CRYPTO \u201994","author":"M. Bellare","year":"1994","unstructured":"Bellare, M., Kilian, J., Rogaway, P.: The Security of Cipher Block Chaining. In: Desmedt, Y.G. (ed.) CRYPTO 1994. LNCS, vol.\u00a0839, pp. 341\u2013358. Springer, Heidelberg (1994)"},{"key":"1_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"531","DOI":"10.1007\/3-540-44448-3_41","volume-title":"Advances in Cryptology - ASIACRYPT 2000","author":"M. Bellare","year":"2000","unstructured":"Bellare, M., Namprempre, C.: Authenticated encryption: Relations among notions and analysis of the generic composition paradigm. In: Okamoto, T. (ed.) ASIACRYPT 2000. LNCS, vol.\u00a01976, p. 531. Springer, Heidelberg (2000)"},{"key":"1_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"197","DOI":"10.1007\/3-540-44598-6_12","volume-title":"Advances in Cryptology - CRYPTO 2000","author":"J. Black","year":"2000","unstructured":"Black, J., Rogaway, P.: CBC MACs for Arbitrary-Length Messages: The Three-Key Constructions. In: Bellare, M. (ed.) CRYPTO 2000. LNCS, vol.\u00a01880, p. 197. Springer, Heidelberg (2000)"},{"key":"1_CR6","series-title":"Lecture Notes in Computer Science","volume-title":"Fast Software Encryption","author":"M. Blaze","year":"1996","unstructured":"Blaze, M.: High-bandwidth Encryption with Low-bandwidth Smart Cards. In: Gollmann, D. (ed.) FSE 1996. LNCS, vol.\u00a01039, Springer, Heidelberg (1996)"},{"key":"1_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"251","DOI":"10.1007\/BFb0054131","volume-title":"Advances in Cryptology - EUROCRYPT \u201998","author":"M. Blaze","year":"1998","unstructured":"Blaze, M., Feigenbaum, J., Naor, M.: A Formal Treatment of Remotely Keyed Encryption. In: Nyberg, K. (ed.) EUROCRYPT 1998. LNCS, vol.\u00a01403, pp. 251\u2013265. Springer, Heidelberg (1998)"},{"key":"1_CR8","unstructured":"Boldyreva, A., Taesombut, N.: Online Encryption Schemes: New Security Notions and Constructions, Full version of this paper, Available at \n                    \n                      http:\/\/www-cse.ucsd.edu\/users\/aboldyre"},{"key":"1_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-39200-9_19","volume-title":"Advances in Cryptology \u2013 EUROCRPYT 2003","author":"Y. Dodis","year":"2003","unstructured":"Dodis, Y., An, J.H.: Concealment and Its Applications to Authenticated Encryption. In: Biham, E. (ed.) EUROCRYPT 2003. LNCS, vol.\u00a02656, Springer, Heidelberg (2003)"},{"key":"1_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"92","DOI":"10.1007\/3-540-45473-X_8","volume-title":"Fast Software Encryption","author":"V. Gligor","year":"2002","unstructured":"Gligor, V., Donescu, P.: Fast Encryption and Authentication: XCBC Encryption and XECB Authenticated Modes. In: Matsui, M. (ed.) FSE 2001. LNCS, vol.\u00a02355, p. 92. Springer, Heidelberg (2002)"},{"key":"1_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-24654-1_11","volume-title":"Selected Areas in Cryptography","author":"P.-A. Fouque","year":"2004","unstructured":"Fouque, P.-A., Joux, A., Martinet, G., Valette, F.: Authenticated On-line Encryption. In: Matsui, M., Zuccherato, R.J. (eds.) SAC 2003. LNCS, vol.\u00a03006, Springer, Heidelberg (2004)"},{"key":"1_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"362","DOI":"10.1007\/978-3-540-39887-5_26","volume-title":"Fast Software Encryption","author":"P.-A. Fouque","year":"2003","unstructured":"Fouque, P.-A., Martinet, G., Poupard, G.: Practical Symmetric On-line Encryption. In: Johansson, T. (ed.) FSE 2003. LNCS, vol.\u00a02887, pp. 362\u2013375. Springer, Heidelberg (2003)"},{"key":"1_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"129","DOI":"10.1007\/978-3-540-39887-5_11","volume-title":"Fast Software Encryption","author":"T. Iwata","year":"2003","unstructured":"Iwata, T., Kurosawa, K.: OMAC: One-Key CBC MAC. In: Johansson, T. (ed.) FSE 2003. LNCS, vol.\u00a02887, pp. 129\u2013153. Springer, Heidelberg (2003)"},{"key":"1_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"95","DOI":"10.1007\/3-540-48519-8_8","volume-title":"Fast Software Encryption","author":"M. Jakobsson","year":"1999","unstructured":"Jakobsson, M., Stern, J., Yung, M.: Scramble All, Encrypt Small. In: Knudsen, L.R. (ed.) FSE 1999. LNCS, vol.\u00a01636, p. 95. Springer, Heidelberg (1999)"},{"key":"1_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1007\/3-540-45708-9_2","volume-title":"Advances in Cryptology - CRYPTO 2002","author":"A. Joux","year":"2002","unstructured":"Joux, A., Martinet, G., Valette, F.: Blockwise-adaptive attackers. In: Yung, M. (ed.) CRYPTO 2002. LNCS, vol.\u00a02442, p. 17. Springer, Heidelberg (2002)"},{"key":"1_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"529","DOI":"10.1007\/3-540-44987-6_32","volume-title":"Advances in Cryptology - EUROCRYPT 2001","author":"C. Jutla","year":"2001","unstructured":"Jutla, C.: Encryption Modes With Almost Free Message Integrity. In: Pfitzmann, B. (ed.) EUROCRYPT 2001. LNCS, vol.\u00a02045, p. 529. Springer, Heidelberg (2001)"},{"key":"1_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"219","DOI":"10.1007\/BFb0052349","volume-title":"Fast Software Encryption","author":"S. Lucks","year":"1997","unstructured":"Lucks, S.: On the Security of Remotely Keyed Encryption. In: Biham, E. (ed.) FSE 1997. LNCS, vol.\u00a01267, pp. 219\u2013229. Springer, Heidelberg (1997)"},{"key":"1_CR18","unstructured":"NIST. FIPS PUB81 - DES Modes of Operation (December 1980)"},{"key":"1_CR19","volume-title":"Eighth ACM Conference on Computer and Communications Security (CCS-8)","author":"P. Rogaway","year":"2001","unstructured":"Rogaway, P., Bellare, M., Black, J., Krovetz, T.: OCB: A Block-Cipher Mode of Operation for Efficient Authenticated Encryption. In: Eighth ACM Conference on Computer and Communications Security (CCS-8), ACM Press, New York (2001)"}],"container-title":["Lecture Notes in Computer Science","Topics in Cryptology \u2013 CT-RSA 2004"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-24660-2_1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,10,6]],"date-time":"2018-10-06T11:43:06Z","timestamp":1538826186000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-24660-2_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004]]},"ISBN":["9783540209966","9783540246602"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-24660-2_1","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2004]]}}}