{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,2]],"date-time":"2025-12-02T18:30:40Z","timestamp":1764700240859},"publisher-location":"Berlin, Heidelberg","reference-count":13,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540710387"},{"type":"electronic","value":"9783540710394"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-71039-4_9","type":"book-chapter","created":{"date-parts":[[2008,7,18]],"date-time":"2008-07-18T14:09:52Z","timestamp":1216390192000},"page":"144-157","source":"Crossref","is-referenced-by-count":70,"title":["SQUASH \u2013 A New MAC with Provable Security Properties for Highly Constrained Devices Such as RFID Tags"],"prefix":"10.1007","author":[{"given":"Adi","family":"Shamir","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"9_CR1","unstructured":"Aoki, K., Franke, J., Kleinjung, T., Lenstra, A.K., Osvik, D.A.: Research announcement, http:\/\/actualites.epfl.ch\/presseinfo-com?id=441"},{"key":"9_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"109","DOI":"10.1007\/11761679_8","volume-title":"Advances in Cryptology - EUROCRYPT 2006","author":"C. Berbain","year":"2006","unstructured":"Berbain, C., Gilbert, H., Patarin, J.: QUAD: A Practical Stream Cipher with Provable Security. In: Vaudenay, S. (ed.) EUROCRYPT 2006. LNCS, vol.\u00a04004, pp. 109\u2013128. Springer, Heidelberg (2006)"},{"key":"9_CR3","unstructured":"Bringer, J., Chabanne, H., Dottax, E.: HB++: a Lightweight Authentication Protocol Secure Against Some Attacks. In: Workshop on Security, Privacy and Trust in pervasive and Ubiquitous Computing - SecPerU (2006)"},{"key":"9_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"48","DOI":"10.1007\/11941378_5","volume-title":"Progress in Cryptology - INDOCRYPT 2006","author":"M.P.C. Fossorier","year":"2006","unstructured":"Fossorier, M.P.C., Mihaljevi\u0107, M.J., Imai, H., Cui, Y., Matsuura, K.: An Algorithm for Solving the LPN Problem and Its Application to Security Evaluation of the HB Protocols for RFID Authentication. In: Barua, R., Lange, T. (eds.) INDOCRYPT 2006. LNCS, vol.\u00a04329, pp. 48\u201362. Springer, Heidelberg (2006)"},{"key":"9_CR5","unstructured":"Hell, M., Johansson, T., Maximov, A., Meier, W.: A Stream Cipher Proposal: Grain-128, http:\/\/www.it.lth.se\/martin\/Grain128.pdf"},{"key":"9_CR6","doi-asserted-by":"crossref","unstructured":"Hopper, N.J., Blum, M.: A Secure Human-Computer Authentication Scheme, CMU-CS-00-139 (2000)","DOI":"10.21236\/ADA382135"},{"key":"9_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"293","DOI":"10.1007\/11535218_18","volume-title":"Advances in Cryptology \u2013 CRYPTO 2005","author":"A. Juels","year":"2005","unstructured":"Juels, A., Weis, S.A.: Authenticating Pervasive Devices with Human Protocols. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol.\u00a03621, pp. 293\u2013308. Springer, Heidelberg (2005)"},{"key":"9_CR8","doi-asserted-by":"crossref","unstructured":"Levieil, E., Fouque, P.-A.: An Improved LPN Algorithm, Security and Cryptography for Networks (2006)","DOI":"10.1007\/11832072_24"},{"key":"9_CR9","doi-asserted-by":"crossref","unstructured":"Gilbert, H., Robshaw, M., Silbert, H.: An active attack against HB+ \u2013 a provable secure lightweight authentication protocol, Cryptology ePrint Archive number 2005\/237","DOI":"10.1049\/el:20052622"},{"key":"9_CR10","unstructured":"Leyland, P., http:\/\/www.leyland.vispa.com\/numth\/factorization\/cunningham\/2-.txt"},{"key":"9_CR11","doi-asserted-by":"publisher","first-page":"2262","DOI":"10.1016\/j.comnet.2007.01.011","volume":"51","author":"J. Munilla","year":"2007","unstructured":"Munilla, J., Peinado, A.: HB-MP: A further step in the HB-family of lightweight authentication protocols. Computer Networks\u00a051, 2262\u20132267 (2007)","journal-title":"Computer Networks"},{"key":"9_CR12","unstructured":"Rabin, M.O.: Digitalized Signatures and Public-Key Functions as Intractable as Factorization, MIT LCS\/TR-212 (1979)"},{"key":"9_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"445","DOI":"10.1007\/BFb0053461","volume-title":"Advances in Cryptology - EUROCRYPT \u201994","author":"A. Shamir","year":"1995","unstructured":"Shamir, A.: Memory Efficient Variants of Public-Key Schemes for Smart Card Applications. In: De Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol.\u00a0950, pp. 445\u2013449. Springer, Heidelberg (1995)"}],"container-title":["Lecture Notes in Computer Science","Fast Software Encryption"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-71039-4_9.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,3]],"date-time":"2021-05-03T04:35:28Z","timestamp":1620016528000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-71039-4_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540710387","9783540710394"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-71039-4_9","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[]}}