{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,6]],"date-time":"2026-05-06T10:49:53Z","timestamp":1778064593864,"version":"3.51.4"},"publisher-location":"Berlin, Heidelberg","reference-count":20,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540209966","type":"print"},{"value":"9783540246602","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2004]]},"DOI":"10.1007\/978-3-540-24660-2_23","type":"book-chapter","created":{"date-parts":[[2010,8,2]],"date-time":"2010-08-02T15:18:44Z","timestamp":1280762324000},"page":"292-304","source":"Crossref","is-referenced-by-count":112,"title":["A Parallelizable Enciphering Mode"],"prefix":"10.1007","author":[{"given":"Shai","family":"Halevi","sequence":"first","affiliation":[]},{"given":"Phillip","family":"Rogaway","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"23_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"113","DOI":"10.1007\/3-540-60865-6_48","volume-title":"Fast Software Encryption","author":"R. Anderson","year":"1996","unstructured":"Anderson, R., Biham, E.: Two practical and provably secure block ciphers: BEAR and LION. In: Gollmann, D. (ed.) FSE 1996. LNCS, vol.\u00a01039, pp. 113\u2013120. Springer, Heidelberg (1996), www.cs.technion.ac.il\/~biham\/"},{"key":"23_CR2","doi-asserted-by":"crossref","unstructured":"Bellare, M., Kilian, J., Rogaway, P.: The security of the cipher block chaining message authentication code. Journal of Computer and System Sciences\u00a061(3), 362\u2013399, www.cs.ucdavis.edu\/~rogaway","DOI":"10.1006\/jcss.1999.1694"},{"key":"23_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"384","DOI":"10.1007\/3-540-46035-7_25","volume-title":"Advances in Cryptology - EUROCRYPT 2002","author":"J. Black","year":"2002","unstructured":"Black, J., Rogaway, P.: A block-cipher mode of operation for parallelizable message authentication. In: Knudsen, L.R. (ed.) EUROCRYPT 2002. LNCS, vol.\u00a02332, pp. 384\u2013397. Springer, Heidelberg (2002)"},{"key":"23_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"49","DOI":"10.1007\/3-540-44706-7_4","volume-title":"Fast Software Encryption","author":"P. Crowley","year":"2001","unstructured":"Crowley, P.: Mercy: A fast large block cipher for disk sector encryption. In: Schneier, B. (ed.) FSE 2000. LNCS, vol.\u00a01978, pp. 49\u201363. Springer, Heidelberg (2001), www.ciphergoth.org\/crypto\/mercy"},{"key":"23_CR5","unstructured":"Duplichan, S.: A primitive polynomial search program. Web document (2003), Available at users2.ev1.net\/~sduplichan\/primitivepolynomials\/primivitePolynomials.htm"},{"key":"23_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"482","DOI":"10.1007\/978-3-540-45146-4_28","volume-title":"Advances in Cryptology - CRYPTO 2003","author":"S. Halevi","year":"2003","unstructured":"Halevi, S., Rogaway, P.: A tweakable enciphering mode. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol.\u00a02729, pp. 482\u2013499. Springer, Heidelberg (2003), Full version available on the ePrint archive, http:\/\/eprint.iacr.org\/2003\/148\/"},{"key":"23_CR7","unstructured":"Halevi, S., Rogaway, P.: A parallelizable enciphering mode (2003), Full version available on the ePrint archive, http:\/\/eprint.iacr.org\/2003\/147\/"},{"key":"23_CR8","unstructured":"Hughes, J.: Personal communication (2002)"},{"key":"23_CR9","unstructured":"IEEE. Security in Storage Working Group (SISWG) (May 2002), See www.siswg.org and www.mail-archive.com\/cryptography_wasabisystems.com\/msg02102.html"},{"key":"23_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/3-540-39200-9_1","volume-title":"Advances in Cryptology \u2013 EUROCRPYT 2003","author":"A. Joux","year":"2003","unstructured":"Joux, A.: Cryptanalysis of the EMD mode of operation. In: Biham, E. (ed.) EUROCRYPT 2003. LNCS, vol.\u00a02656, pp. 1\u201316. Springer, Heidelberg (2003)"},{"key":"23_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"529","DOI":"10.1007\/3-540-44987-6_32","volume-title":"Advances in Cryptology - EUROCRYPT 2001","author":"C. Jutla","year":"2001","unstructured":"Jutla, C.: Encryption modes with almost free message integrity. In: Pfitzmann, B. (ed.) EUROCRYPT 2001. LNCS, vol.\u00a02045, pp. 529\u2013544. Springer, Heidelberg (2001)"},{"key":"#cr-split#-23_CR12.1","doi-asserted-by":"crossref","unstructured":"Kilian, J., Rogaway, P.: How to protect DES against exhaustive key search. Journal of Cryptology??14(1), 17???35 (2001);","DOI":"10.1007\/s001450010015"},{"key":"#cr-split#-23_CR12.2","unstructured":"Earlier version in McCurley, K.S., Ziegler, C.D. (eds.): Advances in Cryptology 1981 - 1997. LNCS, vol.??1440. Springer, Heidelberg (1999), www.cs.ucdavis.edu\/~rogaway"},{"key":"23_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1007\/3-540-45708-9_3","volume-title":"Advances in Cryptology - CRYPTO 2002","author":"M. Liskov","year":"2002","unstructured":"Liskov, M., Rivest, R., Wagner, D.: Tweakable block ciphers. In: Yung, M. (ed.) CRYPTO 2002. LNCS, vol.\u00a02442, pp. 31\u201346. Springer, Heidelberg (2002), www.cs.berkeley.edu\/~daw\/"},{"key":"23_CR14","doi-asserted-by":"crossref","unstructured":"Luby, M., Rackoff, C.: How to construct pseudorandom permutations from pseudorandom functions. SIAM J. of Computation 17(2) (April 1988)","DOI":"10.1137\/0217022"},{"key":"23_CR15","unstructured":"Naor, M., Reingold, O.: A pseudo-random encryption mode. Manuscript, available from www.wisdom.weizmann.ac.il\/~naor\/"},{"issue":"1","key":"23_CR16","doi-asserted-by":"crossref","first-page":"29","DOI":"10.1007\/PL00003817","volume":"12","author":"M. Naor","year":"1999","unstructured":"Naor, M., Reingold, O.: On the construction of pseudo-random permutations: Luby-Rackoff revisited. Journal of Cryptology\u00a012(1), 29\u201366 (1999); Earlier version in STOC 1997 (1997), Available from www.wisdom.weizmann.ac.il\/~naor\/","journal-title":"Journal of Cryptology"},{"key":"23_CR17","doi-asserted-by":"publisher","first-page":"196","DOI":"10.1145\/501983.502011","volume-title":"Eighth ACM Conference on Computer and Communications Security (CCS-8)","author":"P. Rogaway","year":"2001","unstructured":"Rogaway, P., Bellare, M., Black, J., Krovetz, T.: OCB: A block-cipher mode of operation for efficient authenticated encryption. In: Eighth ACM Conference on Computer and Communications Security (CCS-8), pp. 196\u2013205. ACM Press, New York (2001)"},{"key":"23_CR18","unstructured":"Schroeppel, R.: The hasty pudding cipher. AES candidate submitted to NIST (1999), www.cs.arizona.edu\/~cs\/hpc"},{"key":"23_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"461","DOI":"10.1007\/0-387-34805-0_42","volume-title":"Advances in Cryptology - CRYPTO \u201989","author":"Y. Zheng","year":"1990","unstructured":"Zheng, Y., Matsumoto, T., Imai, H.: On the construction of block ciphers provably secure and not relying on any unproved hypotheses. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol.\u00a0435, pp. 461\u2013480. Springer, Heidelberg (1990)"}],"container-title":["Lecture Notes in Computer Science","Topics in Cryptology \u2013 CT-RSA 2004"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-24660-2_23","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T03:31:22Z","timestamp":1559359882000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-24660-2_23"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004]]},"ISBN":["9783540209966","9783540246602"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-24660-2_23","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2004]]}}}