{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T19:35:41Z","timestamp":1725564941019},"publisher-location":"Berlin, Heidelberg","reference-count":16,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540223795"},{"type":"electronic","value":"9783540278009"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2004]]},"DOI":"10.1007\/978-3-540-27800-9_37","type":"book-chapter","created":{"date-parts":[[2010,9,5]],"date-time":"2010-09-05T23:00:38Z","timestamp":1283727638000},"page":"427-439","source":"Crossref","is-referenced-by-count":13,"title":["Unconditionally Secure Encryption Under Strong Attacks"],"prefix":"10.1007","author":[{"given":"Luke","family":"McAven","sequence":"first","affiliation":[]},{"given":"Rei","family":"Safavi-Naini","sequence":"additional","affiliation":[]},{"given":"Moti","family":"Yung","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"37_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"26","DOI":"10.1007\/BFb0055718","volume-title":"Advances in Cryptology - CRYPTO \u201998","author":"M. Bellare","year":"1998","unstructured":"Bellare, M., Desai, A., Pointcheveal, D., Rogaway, P.: Relations among notions of security for public\u2013key encryption schemes. In: Krawczyk, H. (ed.) CRYPTO 1998. LNCS, vol.\u00a01462, pp. 26\u201345. Springer, Heidelberg (1998)"},{"key":"37_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"519","DOI":"10.1007\/3-540-48405-1_33","volume-title":"Advances in Cryptology - CRYPTO \u201999","author":"M. Bellare","year":"1999","unstructured":"Bellare, M., Sahai, A.: Non\u2013malleable encryption: Equivalence between two notions, and an indistinguishability\u2013based characterisation. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol.\u00a01666, p. 519. Springer, Heidelberg (1999)"},{"key":"37_CR3","unstructured":"Bellare, M., Desai, A., Pointcheveal, D., Rogaway, P.: Relations among notions of security for public\u2013key encryption schemes. (2001)"},{"issue":"6","key":"37_CR4","doi-asserted-by":"publisher","first-page":"375","DOI":"10.1002\/jcd.3180020603","volume":"2","author":"J. Bierbrauer","year":"1994","unstructured":"Bierbrauer, J., Edel, Y.: Theory of perpendicular arrays. J. Combin. Designs\u00a02(6), 375\u2013406 (1994)","journal-title":"J. Combin. Designs"},{"key":"37_CR5","doi-asserted-by":"crossref","unstructured":"Desmedt, Y., Frankel, Y., Yung, M.: Multi\u2013receiver\/multi\u2013sender network security: efficient authenticated multicast\/feedback. In: IEEE Infocom 1992, pp. 2045\u20132054 (1992)","DOI":"10.1109\/INFCOM.1992.263476"},{"key":"37_CR6","doi-asserted-by":"crossref","unstructured":"Dolev, D., Dwork, C., Naor, M.: Non\u2013malleable cryptography. In: 23rd STOC ACM, pp. 542\u2013552 (1991)","DOI":"10.1145\/103418.103474"},{"key":"37_CR7","unstructured":"Dolev, D., Dwork, C., Naor, M.: Non\u2013malleable cryptography. Technical Report CS95\u201327, Weizmann Institute of Science (1995)"},{"issue":"2","key":"37_CR8","doi-asserted-by":"publisher","first-page":"391","DOI":"10.1137\/S0097539795291562","volume":"30","author":"D. Dolev","year":"2000","unstructured":"Dolev, D., Dwork, C., Naor, M.: Non\u2013malleable cryptography. SIAM J. Computing\u00a030(2), 391\u2013437 (2000)","journal-title":"SIAM J. Computing"},{"key":"37_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"81","DOI":"10.1007\/3-540-36178-2_5","volume-title":"Advances in Cryptology - ASIACRYPT 2002","author":"G. Hanaoka","year":"2002","unstructured":"Hanaoka, G., Shikata, J., Hanaoka, Y., Imai, H.: Unconditionally secure anonymous encryption and group authentication. In: Zheng, Y. (ed.) ASIACRYPT 2002. LNCS, vol.\u00a02501, pp. 81\u201399. Springer, Heidelberg (2002)"},{"key":"37_CR10","first-page":"245","volume-title":"32nd STOC","author":"J. Katz","year":"2000","unstructured":"Katz, J., Yung, M.: Complete characterization of security notions for probabilistic private\u2013key encryption. In: 32nd STOC, pp. 245\u2013254. ACM, New York (2000)"},{"key":"37_CR11","first-page":"141","volume":"18","author":"R.C. Mullin","year":"1980","unstructured":"Mullin, R.C., Schellenberg, P.J., van Rees, G.H.J., Vanstone, S.A.: On the construction of perpendicular arrays. Utilitas Math.\u00a018, 141\u2013160 (1980)","journal-title":"Utilitas Math."},{"key":"37_CR12","first-page":"427","volume-title":"22nd STOC","author":"M. Naor","year":"1990","unstructured":"Naor, M., Yung, M.: Public\u2013key cryptosystems provably secure against chosen\u2013 ciphertext attacks. In: 22nd STOC, pp. 427\u2013437. ACM, New York (1990)"},{"key":"37_CR13","doi-asserted-by":"crossref","first-page":"379","DOI":"10.1002\/j.1538-7305.1948.tb01338.x","volume":"27","author":"C.E. Shannon","year":"1948","unstructured":"Shannon, C.E.: A mathematical theory of communication. The Bell System Technical Journal\u00a027, 379\u2013423 (1948)","journal-title":"The Bell System Technical Journal"},{"issue":"4","key":"37_CR14","doi-asserted-by":"crossref","first-page":"656","DOI":"10.1002\/j.1538-7305.1949.tb00928.x","volume":"28","author":"C.E. Shannon","year":"1949","unstructured":"Shannon, C.E.: Communication theory of secrecy systems. The Bell System Technical Journal\u00a028(4), 656\u2013715 (1949)","journal-title":"The Bell System Technical Journal"},{"key":"37_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"411","DOI":"10.1007\/3-540-39568-7_32","volume-title":"Advances in Cryptology","author":"G.J. Simmons","year":"1985","unstructured":"Simmons, G.J.: Authentication theory\/coding theory. In: Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol.\u00a0196, pp. 411\u2013431. Springer, Heidelberg (1985)"},{"key":"37_CR16","doi-asserted-by":"publisher","first-page":"23","DOI":"10.1007\/BF02252868","volume":"2","author":"D.R. Stinson","year":"1990","unstructured":"Stinson, D.R.: The combinatorics of authentication and secrecy codes. Journal of Cryptology\u00a02, 23\u201349 (1990)","journal-title":"Journal of Cryptology"}],"container-title":["Lecture Notes in Computer Science","Information Security and Privacy"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-27800-9_37.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,19]],"date-time":"2020-11-19T04:21:22Z","timestamp":1605759682000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-27800-9_37"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004]]},"ISBN":["9783540223795","9783540278009"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-27800-9_37","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2004]]}}}