{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T11:07:13Z","timestamp":1725534433870},"publisher-location":"Berlin, Heidelberg","reference-count":20,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642024566"},{"type":"electronic","value":"9783642024573"}],"license":[{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-02457-3_70","type":"book-chapter","created":{"date-parts":[[2009,7,7]],"date-time":"2009-07-07T13:54:56Z","timestamp":1246974896000},"page":"863-876","source":"Crossref","is-referenced-by-count":0,"title":["On a Construction of Short Digests for Authenticating Ad Hoc Networks"],"prefix":"10.1007","author":[{"given":"Khoongming","family":"Khoo","sequence":"first","affiliation":[]},{"given":"Ford Long","family":"Wong","sequence":"additional","affiliation":[]},{"given":"Chu-Wee","family":"Lim","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"70_CR1","unstructured":"Rijmen, V., Barreto, P.: The whirlpool hash function, \n                    \n                      http:\/\/www.larc.usp.br\/~pbarreto\/WhirlpoolPage.html"},{"key":"70_CR2","unstructured":"Balfanz, D., Smetters, D.K., Stewart, P., Wong, H.C.: Talking to strangers: authentication in ad-hoc wireless networks. In: Network and Distributed System Security Symposium, San Diego, CA, Internet Society (Feburary 2002)"},{"key":"70_CR3","doi-asserted-by":"crossref","unstructured":"Carlet, C.: Vectorial boolean functions for cryptography. In: Crama, Y., Hammer, P. (eds.) Boolean Methods and Models. Cambridge University Press, Cambridge (to appear)","DOI":"10.1017\/CBO9780511780448.012"},{"issue":"2","key":"70_CR4","doi-asserted-by":"publisher","first-page":"143","DOI":"10.1016\/0022-0000(79)90044-8","volume":"18","author":"J.L. Carter","year":"1979","unstructured":"Carter, J.L., Wegman, M.N.: Universal classes of hash functions. Journal of Computer and System Sciences\u00a018(2), 143\u2013154 (1979)","journal-title":"Journal of Computer and System Sciences"},{"key":"70_CR5","unstructured":"Chabaud, F.: Irreducible trinomials over GF(2). \n                    \n                      http:\/\/fchabaud.free.fr\/English\/default.php?COUNT=3&FILE0=Poly&FILE1=GF2&FILE2=Trinomials"},{"key":"70_CR6","volume-title":"The Design of Rijndael, AES - The Advanced Encryption Standard","author":"J. Daemen","year":"2002","unstructured":"Daemen, J., Rijmen, V.: The Design of Rijndael, AES - The Advanced Encryption Standard. Springer, Heidelberg (2002)"},{"key":"70_CR7","unstructured":"Dworkin, M.: NIST Special Publication 800-38C, Recommendation for Block Cipher Modes of Operation: The CCM Mode for Authentication and Confidentiality. National Institute of Standards and Technology, Washington DC (2004), \n                    \n                      http:\/\/csrc.nist.gov\/publications\/nistpubs\/800-38C\/SP800-38C.pdf"},{"issue":"1","key":"70_CR8","first-page":"29","volume":"7","author":"C. Gehrmann","year":"2004","unstructured":"Gehrmann, C., Mitchell, C.J., Nyberg, K.: Manual authentication for wireless devices. Cryptobytes\u00a07(1), 29\u201337 (2004)","journal-title":"Cryptobytes"},{"key":"70_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"212","DOI":"10.1007\/978-3-540-27809-2_22","volume-title":"Financial Cryptography","author":"J.-H. Hoepman","year":"2004","unstructured":"Hoepman, J.-H.: The ephemeral pairing problem. In: Juels, A. (ed.) FC 2004. LNCS, vol.\u00a03110, pp. 212\u2013226. Springer, Heidelberg (2004)"},{"key":"70_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"129","DOI":"10.1007\/3-540-48658-5_15","volume-title":"Advances in Cryptology - CRYPTO \u201994","author":"H. Krawczyk","year":"1994","unstructured":"Krawczyk, H.: Lfsr-based hashing and authentication. In: Desmedt, Y.G. (ed.) CRYPTO 1994. LNCS, vol.\u00a0839, pp. 129\u2013139. Springer, Heidelberg (1994)"},{"key":"70_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"90","DOI":"10.1007\/11935070_6","volume-title":"Cryptology and Network Security","author":"S. Laur","year":"2006","unstructured":"Laur, S., Nyberg, K.: Efficient mutual data authentication using manually authenticated strings. In: Pointcheval, D., Mu, Y., Chen, K. (eds.) CANS 2006. LNCS, vol.\u00a04301, pp. 90\u2013107. Springer, Heidelberg (2006)"},{"key":"70_CR12","doi-asserted-by":"publisher","DOI":"10.1201\/9781439821916","volume-title":"Handbook of Applied Cryptography","author":"A. Menezes","year":"1996","unstructured":"Menezes, A., van Oorshot, P.C., Vanstone, S.: Handbook of Applied Cryptography, ch.\u00a09. CRC Press, Boca Raton (1996)"},{"key":"70_CR13","unstructured":"Nguyen, L.H., Roscoe, A.W.: Efficient group authentication protocols based on human interaction. In: Proceedings of Foundation of Computer Security and Automated Reasoning for Security Protocol Analysis (FCS ARSPA), Seattle, pp. 9\u201333 (August 2006)"},{"issue":"2-4","key":"70_CR14","doi-asserted-by":"publisher","first-page":"250","DOI":"10.1016\/j.ic.2007.07.010","volume":"206","author":"L.H. Nguyen","year":"2008","unstructured":"Nguyen, L.H., Roscoe, A.W.: Authenticating ad hoc networks by comparison of short digests. Journal of Information and Computation\u00a0206(2-4), 250\u2013271 (2008)","journal-title":"Journal of Information and Computation"},{"key":"70_CR15","unstructured":"National\u00a0Institute of\u00a0Standards and Technology. Federal information processing standards publication 180-2 (+change notice to include sha-224) (2002), \n                    \n                      http:\/\/csrc.nist.gov\/publications\/fips\/fips180-2\/fips180-2withchangenotice.pdf"},{"key":"70_CR16","series-title":"Lecture Notes in Computer Science","volume-title":"Security Protocols","author":"F. Stajano","year":"2000","unstructured":"Stajano, F., Anderson, R.: The resurrecting duckling \u2014 security issues for ad-hoc wireless networks. In: Malcolm, J.A., Christianson, B., Crispo, B., Roe, M. (eds.) Security Protocols 1999. LNCS, vol.\u00a01796. Springer, Heidelberg (2000)"},{"key":"70_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"74","DOI":"10.1007\/3-540-46766-1_5","volume-title":"Advances in Cryptology - CRYPTO \u201991","author":"D.R. Stinson","year":"1992","unstructured":"Stinson, D.R.: Universal hashing and authentication codes. In: Feigenbaum, J. (ed.) CRYPTO 1991. LNCS, vol.\u00a0576, pp. 74\u201385. Springer, Heidelberg (1992)"},{"key":"70_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"309","DOI":"10.1007\/11535218_19","volume-title":"Advances in Cryptology \u2013 CRYPTO 2005","author":"S. Vaudenay","year":"2005","unstructured":"Vaudenay, S.: Secure communications over insecure channels based on short authenticated strings. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol.\u00a03621, pp. 309\u2013326. Springer, Heidelberg (2005)"},{"key":"70_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"112","DOI":"10.1007\/978-3-540-77156-2_14","volume-title":"Security Protocols","author":"F.-L. Wong","year":"2007","unstructured":"Wong, F.-L., Stajano, F.: Multi-channel protocols. In: Christianson, B., Crispo, B., Malcolm, J.A., Roe, M. (eds.) Security Protocols 2005. LNCS, vol.\u00a04631, pp. 112\u2013127. Springer, Heidelberg (2007)"},{"issue":"4","key":"70_CR20","first-page":"31","volume":"6","author":"F.L. Wong","year":"2007","unstructured":"Wong, F.L., Stajano, F.: Multichannel security protocols. IEEE Pervasive Computing, Special Issue on Security & Privacy\u00a06(4), 31\u201339 (2007)","journal-title":"IEEE Pervasive Computing, Special Issue on Security & Privacy"}],"container-title":["Lecture Notes in Computer Science","Computational Science and Its Applications \u2013 ICCSA 2009"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-02457-3_70","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,3,9]],"date-time":"2019-03-09T03:05:27Z","timestamp":1552100727000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-02457-3_70"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642024566","9783642024573"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-02457-3_70","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2009]]}}}