{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T19:35:36Z","timestamp":1725564936650},"publisher-location":"Berlin, Heidelberg","reference-count":23,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540223795"},{"type":"electronic","value":"9783540278009"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2004]]},"DOI":"10.1007\/978-3-540-27800-9_38","type":"book-chapter","created":{"date-parts":[[2010,9,5]],"date-time":"2010-09-05T19:00:38Z","timestamp":1283713238000},"page":"440-453","source":"Crossref","is-referenced-by-count":3,"title":["ManTiCore: Encryption with Joint Cipher-State Authentication"],"prefix":"10.1007","author":[{"given":"Erik","family":"Anderson","sequence":"first","affiliation":[]},{"given":"Cheryl","family":"Beaver","sequence":"additional","affiliation":[]},{"given":"Timothy","family":"Draelos","sequence":"additional","affiliation":[]},{"given":"Richard","family":"Schroeppel","sequence":"additional","affiliation":[]},{"given":"Mark","family":"Torgerson","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"38_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"113","DOI":"10.1007\/3-540-60865-6_48","volume-title":"Fast Software Encryption","author":"R. Anderson","year":"1996","unstructured":"Anderson, R., Biham, E.: Two Practical and Provably Secure Block Ciphers: BEAR and LION. In: Gollmann, D. (ed.) FSE 1996. LNCS, vol.\u00a01039, pp. 113\u2013120. Springer, Heidelberg (1996)"},{"key":"38_CR2","unstructured":"Barreto, P.: The Block Cipher Rijndael, http:\/\/www.esat.kuleuven.ac.be\/~rijmen\/rijndael\/"},{"key":"38_CR3","first-page":"394","volume-title":"FOCS 1997","author":"M. Bellare","year":"1997","unstructured":"Bellare, M., Desai, A., Jokipii, E., Rogaway, P.: A Concrete Security Treatment of Symmetric Encryption. In: FOCS 1997, pp. 394\u2013403. IEEE, Los Alamitos (1997)"},{"key":"38_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"15","DOI":"10.1007\/3-540-44750-4_2","volume-title":"Advances in Cryptology - CRYPTO \u201995","author":"M. Bellare","year":"1995","unstructured":"Bellare, M., Guerin, R., Rogaway, P.: XOR MACS: New Methods for Message Authentication using Finite Pseudorandom Functions. In: Coppersmith, D. (ed.) CRYPTO 1995. LNCS, vol.\u00a0963, pp. 15\u201328. Springer, Heidelberg (1995)"},{"key":"38_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"531","DOI":"10.1007\/3-540-44448-3_41","volume-title":"Advances in Cryptology - ASIACRYPT 2000","author":"M. Bellare","year":"2000","unstructured":"Bellare, M., Namprempre, C.: Authenticated Encryption: Relations Among Notions and Analysis of the Generic Composition Paradigm. In: Okamoto, T. (ed.) ASIACRYPT 2000. LNCS, vol.\u00a01976, pp. 531\u2013545. Springer, Heidelberg (2000)"},{"key":"38_CR6","unstructured":"Dai, W.: Crypto++ Library, http:\/\/www.eskimo.com\/weidai\/cryptlib.html"},{"key":"38_CR7","unstructured":"Department of Commerce\/NIST. Secure Hash Standard, FIPSPUB 180-1 (2001)"},{"key":"38_CR8","unstructured":"Department of Commerce\/NIST. Advanced Encryption Standard, FIPSPUB 197 (2001)"},{"key":"38_CR9","unstructured":"Gladman, B.: Implementations of AES (Rijndael) in C\/C++ and Assembler, http:\/\/fp.gladman.plus.com\/cryptographytechnology\/rijndael\/"},{"key":"38_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"92","DOI":"10.1007\/3-540-45473-X_8","volume-title":"Fast Software Encryption","author":"V.D. Gligor","year":"2002","unstructured":"Gligor, V.D., Donescu, P.: Fast Encryption and Authentication: XCBC Encryption and XECB Authentication Modes. In: Matsui, M. (ed.) FSE 2001. LNCS, vol.\u00a02355, pp. 92\u2013108. Springer, Heidelberg (2002)"},{"key":"38_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"529","DOI":"10.1007\/3-540-44987-6_32","volume-title":"Advances in Cryptology - EUROCRYPT 2001","author":"C. Jutla","year":"2001","unstructured":"Jutla, C.: Encryption Modes with Almost Free Message Integrity. In: Pfitzmann, B. (ed.) EUROCRYPT 2001. LNCS, vol.\u00a02045, p. 529. Springer, Heidelberg (2001)"},{"issue":"3","key":"38_CR12","doi-asserted-by":"publisher","first-page":"207","DOI":"10.1007\/s00145-002-9839-y","volume":"15","author":"L. Knudsen","year":"2002","unstructured":"Knudsen, L.: The Security of Feistel Ciphers with Six Rounds or Less. J. of Cryptology\u00a015(3), 207\u2013222 (2002)","journal-title":"J. of Cryptology"},{"key":"38_CR13","doi-asserted-by":"crossref","unstructured":"Krawczyk, H., Bellare, M., Canetti, R.: HMAC: Keyed hashing for message authentication. Internet RFC 2104 (February 1997)","DOI":"10.17487\/rfc2104"},{"key":"38_CR14","unstructured":"Lim, C.H.: Message Encryption and Authentication Using One-Way Hash Functions. In: Proc. of 3rd Annual Workshop on Selected Areas in Cryptology (SAC 1996), Queens University, Kingston, Ontario, Canada, pp. 117\u2013131 (1996)"},{"issue":"2","key":"38_CR15","doi-asserted-by":"publisher","first-page":"373","DOI":"10.1137\/0217022","volume":"17","author":"M. Luby","year":"1988","unstructured":"Luby, M., Rackoff, C.: How to Construct Pseudorandom Permutations from Pseudorandom Functions. SIAM Journal of Computing\u00a017(2), 373\u2013386 (1988)","journal-title":"SIAM Journal of Computing"},{"key":"38_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"189","DOI":"10.1007\/3-540-60865-6_53","volume-title":"Fast Software Encryption","author":"S. Lucks","year":"1996","unstructured":"Lucks, S.: Faster Luby-Rackoff Ciphers. In: Gollmann, D. (ed.) FSE 1996. LNCS, vol.\u00a01039, pp. 189\u2013203. Springer, Heidelberg (1996)"},{"key":"38_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"239","DOI":"10.1007\/3-540-47555-9_21","volume-title":"Advances in Cryptology - EUROCRYPT \u201992","author":"U.M. Maurer","year":"1993","unstructured":"Maurer, U.M.: A Simplified and Generalized treatment of Luby-Rackoff Pseudorandom Permutation Generators. In: Rueppel, R.A. (ed.) EUROCRYPT 1992. LNCS, vol.\u00a0658, pp. 239\u2013255. Springer, Heidelberg (1993)"},{"issue":"1","key":"38_CR18","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1007\/PL00003817","volume":"12","author":"M. Naor","year":"1999","unstructured":"Naor, M., Reingold, O.: On the Construction of Pseudo-Random Permutations: Luby-Rackoff revisited. J. of Cryptology\u00a012(1), 29\u201366 (1999)","journal-title":"J. of Cryptology"},{"key":"38_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"171","DOI":"10.1007\/3-540-48519-8_13","volume-title":"Fast Software Encryption","author":"S. Patel","year":"1999","unstructured":"Patel, S., Ramzan, Z., Sundaram, G.S.: Towards Making Luby-Rackoff Ciphers Optimal and Practical. In: Knudsen, L.R. (ed.) FSE 1999. LNCS, vol.\u00a01636, pp. 171\u2013185. Springer, Heidelberg (1999)"},{"key":"38_CR20","unstructured":"Patel, S., Ramzan, Z., Sundaram, G.S.: Sha-zam: A Block Cipher. Fast as DES, Secure as SHA. Contribution for the Third-Generation Partnership Project (3GPP) (December 6, 1999)"},{"key":"38_CR21","doi-asserted-by":"crossref","unstructured":"Rivest, R.: The MD5 message digest algorithm. IETF Network Working Group, RFC 1321 (April 1992)","DOI":"10.17487\/rfc1321"},{"key":"38_CR22","volume-title":"8th ACM Conf. on Computer and Communications Security","author":"P. Rogaway","year":"2001","unstructured":"Rogaway, P., Bellare, M., Black, J., Krovetz, T.: OCB: A Block-Cipher Mode of Operation for Efficient Authenticated Encryption. In: 8th ACM Conf. on Computer and Communications Security, ACM Press, New York (2001)"},{"key":"38_CR23","doi-asserted-by":"crossref","unstructured":"Whiting, D., Housley, R., Ferguson, N.: Counter with CBC-MAC (CCM) (June 2002), http:\/\/csrc.nist.gov\/encryption\/modes\/proposedmodes\/","DOI":"10.17487\/rfc3610"}],"container-title":["Lecture Notes in Computer Science","Information Security and Privacy"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-27800-9_38.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,18]],"date-time":"2020-11-18T23:21:22Z","timestamp":1605741682000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-27800-9_38"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004]]},"ISBN":["9783540223795","9783540278009"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-27800-9_38","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2004]]}}}