{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T17:55:01Z","timestamp":1725558901226},"publisher-location":"Berlin, Heidelberg","reference-count":9,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540243021"},{"type":"electronic","value":"9783540305774"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005]]},"DOI":"10.1007\/978-3-540-30577-4_32","type":"book-chapter","created":{"date-parts":[[2010,7,4]],"date-time":"2010-07-04T19:48:39Z","timestamp":1278272919000},"page":"288-297","source":"Crossref","is-referenced-by-count":8,"title":["On the Security and Composability of the One Time Pad"],"prefix":"10.1007","author":[{"given":"Dominik","family":"Raub","sequence":"first","affiliation":[]},{"given":"Rainer","family":"Steinwandt","sequence":"additional","affiliation":[]},{"given":"J\u00f6rn","family":"M\u00fcller-Quade","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"32_CR1","doi-asserted-by":"crossref","unstructured":"Poppe, A., Fedrizzi, A., Loruenser, T., Maurhardt, O., Ursin, R., Boehm, H.R., Peev, M., Suda, M., Kurtsiefer, C., Weinfurter, H., Jennewein, T., Zeilinger, A.: Practical Quantum Key Distribution with Polarization-Entangled Photons. lanl.arXiv.org e-Print archive, quant-ph\/0404115 (2004)","DOI":"10.1364\/OPEX.12.003865"},{"key":"32_CR2","unstructured":"Backes, M., Pfitzmann, B., Waidner, M.: Secure Asynchronous Reactive Systems. Cryptology ePrint Archive, Report 2004\/082 (2004), http:\/\/eprint.iacr.org\/2004\/082\/"},{"key":"32_CR3","series-title":"Information Security and Cryptography","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-662-09527-0","volume-title":"Protocols for Authentication and Key Establishment","author":"C. Boyd","year":"2003","unstructured":"Boyd, C., Mathuria, A.: Protocols for Authentication and Key Establishment. Information Security and Cryptography. Springer, Heidelberg (2003)"},{"key":"32_CR4","volume-title":"42nd Annual Symposium on Foundations of Computer Science, FOCS 2001","author":"R. Canetti","year":"2001","unstructured":"Canetti, R.: Universally Composable Security: A New Paradigm for Cryptographic Protocols. In: 42nd Annual Symposium on Foundations of Computer Science, FOCS 2001. IEEE Computer Society, Los Alamitos (2001); Full version available at Cryptology ePrint Archive, Report 2000\/067, http:\/\/eprint.iacr.org\/2000\/067\/"},{"key":"32_CR5","volume-title":"Cryptography \u2013 Theory and Practice","author":"D.R. Stinson","year":"1995","unstructured":"Stinson, D.R.: Cryptography \u2013 Theory and Practice. CRC Press, Boca Raton (1995)"},{"key":"32_CR6","unstructured":"Canetti, R., Krawczyk, H.: Universally Composable Notions of Key Exchange and Secure Channels. Cryptology ePrint Archive, Report 2002\/059 (2002), Extended version of [9], http:\/\/eprint.iacr.org\/2002\/059\/"},{"key":"32_CR7","unstructured":"Pfitzmann, B., Waidner, M.: A Model for Asynchronous Reactive Systems and its Application to Secure Message Transmission. Cryptology ePrint Archive, Report 2000\/066 (2000), http:\/\/eprint.iacr.org\/2000\/066\/"},{"key":"32_CR8","unstructured":"Raub, D., Steinwandt, R., M\u00fcller-Quade, J.: On the Security and Composability of the One Time Pad. Cryptology ePrint Archive, Report 2004\/113 (2004), http:\/\/eprint.iacr.org\/2004\/113\/"},{"key":"32_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"337","DOI":"10.1007\/3-540-46035-7_22","volume-title":"Advances in Cryptology - EUROCRYPT 2002","author":"R. Canetti","year":"2002","unstructured":"Canetti, R., Krawczyk, H.: Universally Composable Notions of Key Exchange and Secure Channels. In: Knudsen, L.R. (ed.) EUROCRYPT 2002. LNCS, vol.\u00a02332, pp. 337\u2013351. Springer, Heidelberg (2002)"}],"container-title":["Lecture Notes in Computer Science","SOFSEM 2005: Theory and Practice of Computer Science"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-30577-4_32.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,19]],"date-time":"2020-11-19T04:24:03Z","timestamp":1605759843000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-30577-4_32"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005]]},"ISBN":["9783540243021","9783540305774"],"references-count":9,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-30577-4_32","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2005]]}}}