{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T09:45:41Z","timestamp":1725529541666},"publisher-location":"Berlin, Heidelberg","reference-count":15,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642007293"},{"type":"electronic","value":"9783642007309"}],"license":[{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-00730-9_18","type":"book-chapter","created":{"date-parts":[[2009,3,17]],"date-time":"2009-03-17T07:22:23Z","timestamp":1237274543000},"page":"286-301","source":"Crossref","is-referenced-by-count":2,"title":["Extended Models for Message Authentication"],"prefix":"10.1007","author":[{"given":"Liting","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Wenling","family":"Wu","sequence":"additional","affiliation":[]},{"given":"Peng","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"18_CR1","unstructured":"Bellare, M., Goldreich, O., Mityagin, A.: The Power of Verification Queries in Message Authentication and Authenticated Encryption. Cryptology ePrint Archive: Report 2004\/309"},{"key":"18_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"427","DOI":"10.1007\/978-3-540-25937-4_27","volume-title":"Fast Software Encryption","author":"T. Iwata","year":"2004","unstructured":"Iwata, T., Kohno, T.: New Security Proofs for the 3GPP Confidentiality and Integrity Algorithms. In: Roy, B., Meier, W. (eds.) FSE 2004. LNCS, vol.\u00a03017, pp. 427\u2013445. Springer, Heidelberg (2004)"},{"issue":"1","key":"18_CR3","doi-asserted-by":"publisher","first-page":"188","DOI":"10.1109\/18.746787","volume":"45","author":"B. Preneel","year":"1999","unstructured":"Preneel, B., van Oorschot, P.: On the Security of Iterated Message Authentication Codes. IEEE Transactions on Information Theory\u00a045(1), 188\u2013199 (1999)","journal-title":"IEEE Transactions on Information Theory"},{"issue":"1","key":"18_CR4","doi-asserted-by":"publisher","first-page":"181","DOI":"10.1016\/S0166-218X(02)00444-4","volume":"128","author":"L.R. Knudsen","year":"2003","unstructured":"Knudsen, L.R., Mitchell, C.J.: Analysis of 3GPP-MAC and Two-Key 3GPP-MAC. Discrete Applied Mathematics\u00a0128(1), 181\u2013191 (2003)","journal-title":"Discrete Applied Mathematics"},{"key":"18_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"205","DOI":"10.1007\/11601494_17","volume-title":"Security and Privacy in Ad-hoc and Sensor Networks","author":"K. Okeya","year":"2005","unstructured":"Okeya, K., Iwata, T.: Side Channel Attacks on Message Authentication Codes. In: Molva, R., Tsudik, G., Westhoff, D. (eds.) ESAS 2005. LNCS, vol.\u00a03813, pp. 205\u2013217. Springer, Heidelberg (2005)"},{"key":"18_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"432","DOI":"10.1007\/11780656_36","volume-title":"Information Security and Privacy","author":"K. Okeya","year":"2006","unstructured":"Okeya, K.: Side Channel Attacks against HMACs based on Block-Cipher based Hash Functions. In: Batten, L.M., Safavi-Naini, R. (eds.) ACISP 2006. LNCS, vol.\u00a04058, pp. 432\u2013443. Springer, Heidelberg (2006)"},{"key":"18_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"393","DOI":"10.1007\/978-3-540-77026-8_31","volume-title":"Progress in Cryptology \u2013 INDOCRYPT 2007","author":"P. Gauravaram","year":"2007","unstructured":"Gauravaram, P., Okeya, K.: An Update on the Side Channel Cryptanalysis of MACs based on Cryptographic Hash Functions. In: Srinathan, K., Rangan, C.P., Yung, M. (eds.) INDOCRYPT 2007. LNCS, vol.\u00a04859, pp. 393\u2013403. Springer, Heidelberg (2007)"},{"key":"18_CR8","unstructured":"ETSI TS 35.202 V7.0.0: Specification of the 3GPP Confidentiality and Integrity Algorithms; Document 2: KASUMI Specification, \n                    \n                      http:\/\/www.3gpp.org\/tb\/other\/algorithms.htm"},{"key":"18_CR9","unstructured":"ETSI TS 35.201 V7.0.0: Specification of the 3GPP Confidentiality and Integrity Algorithms; Document 1: f8 and f9 Specification, \n                    \n                      http:\/\/www.3gpp.org\/tb\/other\/algorithms.htm"},{"key":"18_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"341","DOI":"10.1007\/3-540-48658-5_32","volume-title":"Advances in Cryptology - CRYPTO \u201994","author":"M. Bellare","year":"1994","unstructured":"Bellare, M., Kilian, J., Rogaway, P.: The Security of Cipher Block Chaining. In: Desmedt, Y.G. (ed.) CRYPTO 1994. LNCS, vol.\u00a0839, pp. 341\u2013358. Springer, Heidelberg (1994)"},{"key":"18_CR11","unstructured":"Patarin, J.: A Proof of Security in O (2^ n) for the Xor of Two Random Permutations. Cryptology ePrint Archive: Report 2008\/010"},{"key":"18_CR12","unstructured":"Zhang, L., Wu, W., Wang, P.: Extended Models for Message Authentication (full vision), available from the authors"},{"key":"18_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"443","DOI":"10.1007\/11593447_24","volume-title":"Advances in Cryptology - ASIACRYPT 2005","author":"E. Biham","year":"2005","unstructured":"Biham, E., Dunkelman, O., Keller, N.: A Related-Key Rectangle Attack on the Full KASUMI. In: Roy, B. (ed.) ASIACRYPT 2005. LNCS, vol.\u00a03788, pp. 443\u2013461. Springer, Heidelberg (2005)"},{"issue":"4","key":"18_CR14","doi-asserted-by":"publisher","first-page":"483","DOI":"10.1002\/wcm.367","volume":"7","author":"P. Kitsos","year":"2007","unstructured":"Kitsos, P., Sklavos, N., Koufopavlou, O.: UMTS Security: System Architecture and Hardware Implementation. Wireless Communications and Mobile Computing\u00a07(4), 483\u2013494 (2007)","journal-title":"Wireless Communications and Mobile Computing"},{"key":"18_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"248","DOI":"10.1007\/3-540-45439-X_17","volume-title":"Information Security","author":"K. Marinis","year":"2001","unstructured":"Marinis, K., Moshopoulos, N.K., Karoubalis, F., Pekmestzi, K.Z.: On the Hardware Implementation of the 3GPP Confidentiality and Integrity Algorithms. In: Davida, G.I., Frankel, Y. (eds.) ISC 2001. LNCS, vol.\u00a02200, pp. 248\u2013265. Springer, Heidelberg (2001)"}],"container-title":["Lecture Notes in Computer Science","Information Security and Cryptology \u2013 ICISC 2008"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-00730-9_18","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,3,6]],"date-time":"2019-03-06T23:01:42Z","timestamp":1551913302000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-00730-9_18"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642007293","9783642007309"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-00730-9_18","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2009]]}}}