{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,13]],"date-time":"2026-03-13T12:59:14Z","timestamp":1773406754237,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":53,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783642176494","type":"print"},{"value":"9783642176500","type":"electronic"}],"license":[{"start":{"date-parts":[[2010,1,1]],"date-time":"2010-01-01T00:00:00Z","timestamp":1262304000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-17650-0_14","type":"book-chapter","created":{"date-parts":[[2010,12,6]],"date-time":"2010-12-06T15:22:11Z","timestamp":1291648931000},"page":"186-202","source":"Crossref","is-referenced-by-count":9,"title":["Efficient Authentication for Mobile and Pervasive Computing"],"prefix":"10.1007","author":[{"given":"Basel","family":"Alomair","sequence":"first","affiliation":[]},{"given":"Radha","family":"Poovendran","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"14_CR1","doi-asserted-by":"crossref","unstructured":"Aloamir, B., Clark, A., Poovendran, R.: The Power of Primes: Security of Authentication Based on a Universal Hash-Function Family. Journal of Mathematical Cryptology\u00a04(2) (2010)","DOI":"10.1515\/jmc.2010.005"},{"key":"14_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"16","DOI":"10.1007\/3-540-68697-5_2","volume-title":"Advances in Cryptology - CRYPTO \u201996","author":"M. Atici","year":"1996","unstructured":"Atici, M., Stinson, D.: Universal Hashing and Multiple Authentication. In: Koblitz, N. (ed.) CRYPTO 1996. LNCS, vol.\u00a01109, pp. 16\u201330. Springer, Heidelberg (1996)"},{"key":"14_CR3","series-title":"Lecture Notes in Computer Science","first-page":"1","volume-title":"Advances in Cryptology - CRYPTO \u201996","author":"M. Bellare","year":"1996","unstructured":"Bellare, M., Canetti, R., Krawczyk, H.: Keying Hash Functions for Message Authentication. In: Koblitz, N. (ed.) CRYPTO 1996. LNCS, vol.\u00a01109, pp. 1\u201315. Springer, Heidelberg (1996)"},{"issue":"2","key":"14_CR4","doi-asserted-by":"publisher","first-page":"241","DOI":"10.1145\/996943.996945","volume":"7","author":"M. Bellare","year":"2004","unstructured":"Bellare, M., Kohno, T., Namprempre, C.: Breaking and Provably Repairing the SSH Authenticated Encryption Scheme: A Case Study of the Encode-then-Encrypt-and-MAC Paradigm. ACM Transactions on Information and System Security\u00a07(2), 241 (2004)","journal-title":"ACM Transactions on Information and System Security"},{"issue":"4","key":"14_CR5","doi-asserted-by":"publisher","first-page":"469","DOI":"10.1007\/s00145-008-9026-x","volume":"21","author":"M. Bellare","year":"2008","unstructured":"Bellare, M., Namprempre, C.: Authenticated Encryption: Relations Among Notions and Analysis of the Generic Composition Paradigm. Journal of Cryptology\u00a021(4), 469\u2013491 (2008)","journal-title":"Journal of Cryptology"},{"key":"14_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"389","DOI":"10.1007\/978-3-540-25937-4_25","volume-title":"Fast Software Encryption","author":"M. Bellare","year":"2004","unstructured":"Bellare, M., Rogaway, P., Wagner, D.: The EAX mode of operation. In: Roy, B., Meier, W. (eds.) FSE 2004. LNCS, vol.\u00a03017, pp. 389\u2013407. Springer, Heidelberg (2004)"},{"key":"14_CR7","unstructured":"Bernstein, D.: Floating-point arithmetic and message authentication (2004), http:\/\/cr.yp.to\/hash127.html"},{"key":"14_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"32","DOI":"10.1007\/11502760_3","volume-title":"Fast Software Encryption","author":"D. Bernstein","year":"2005","unstructured":"Bernstein, D.: The Poly1305-AES message-authentication code. In: Gilbert, H., Handschuh, H. (eds.) FSE 2005. LNCS, vol.\u00a03557, pp. 32\u201349. Springer, Heidelberg (2005)"},{"issue":"3","key":"14_CR9","doi-asserted-by":"publisher","first-page":"207","DOI":"10.1023\/A:1008226810363","volume":"11","author":"J. Bierbrauer","year":"1997","unstructured":"Bierbrauer, J.: Universal hashing and geometric codes. Designs, Codes and Cryptography\u00a011(3), 207\u2013221 (1997)","journal-title":"Designs, Codes and Cryptography"},{"key":"14_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"216","DOI":"10.1007\/3-540-48405-1_14","volume-title":"Advances in Cryptology - CRYPTO \u201999","author":"J. Black","year":"1999","unstructured":"Black, J., Halevi, S., Krawczyk, H., Krovetz, T., Rogaway, P.: UMAC: Fast and Secure Message Authentication. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol.\u00a01666, pp. 216\u2013233. Springer, Heidelberg (1999)"},{"key":"14_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"450","DOI":"10.1007\/978-3-540-74735-2_31","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2007","author":"A. Bogdanov","year":"2007","unstructured":"Bogdanov, A., Knudsen, L., Leander, G., Paar, C., Poschmann, A., Robshaw, M., Seurin, Y., Vikkelsoe, C.: PRESENT: An Ultra-Lightweight Block Cipher. In: Paillier, P., Verbauwhede, I. (eds.) CHES 2007. LNCS, vol.\u00a04727, pp. 450\u2013466. Springer, Heidelberg (2007)"},{"issue":"2 Part 2","key":"14_CR12","doi-asserted-by":"publisher","first-page":"793","DOI":"10.1109\/TSP.2004.839924","volume":"53","author":"S. Callegari","year":"2005","unstructured":"Callegari, S., Rovatti, R., Setti, G.: Embeddable ADC-based true random number generator for cryptographic applications exploiting nonlinear signal processing and chaos. IEEE Transactions on Signal Processing\u00a053(2 Part 2), 793\u2013805 (2005)","journal-title":"IEEE Transactions on Signal Processing"},{"key":"14_CR13","volume-title":"Introduction to Algorithms","author":"T. Cormen","year":"1999","unstructured":"Cormen, T., Leiserson, C., Rivest, R.: Introduction to Algorithms. McGraw-Hill, New York (1999)"},{"key":"14_CR14","doi-asserted-by":"crossref","unstructured":"Dierks, T., Rescorla, E.: The transport layer security (TLS) protocol version 1.2. Technical report, RFC 5246 (2008)","DOI":"10.17487\/rfc5246"},{"key":"14_CR15","volume-title":"IPSec: the new security standard for the Internet, intranets, and virtual private networks","author":"N. Doraswamy","year":"2003","unstructured":"Doraswamy, N., Harkins, D.: IPSec: the new security standard for the Internet, intranets, and virtual private networks. Prentice Hall, Englewood Cliffs (2003)"},{"key":"14_CR16","doi-asserted-by":"crossref","unstructured":"Dworkin, M.: Recommendation for block cipher modes of operation: The CMAC mode for authentication (2005)","DOI":"10.6028\/NIST.SP.800-38b-2005"},{"key":"14_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"234","DOI":"10.1007\/3-540-48405-1_15","volume-title":"Advances in Cryptology - CRYPTO \u201999","author":"M. Etzel","year":"1999","unstructured":"Etzel, M., Patel, S., Ramzan, Z.: Square hash: Fast message authentication via optimized universal hash functions. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol.\u00a01666, pp. 234\u2013251. Springer, Heidelberg (1999)"},{"key":"14_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"357","DOI":"10.1007\/978-3-540-28632-5_26","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2004","author":"M. Feldhofer","year":"2004","unstructured":"Feldhofer, M., Dominikus, S., Wolkerstorfer, J.: Strong Authentication for RFID Systems using the AES Algorithm. In: Joye, M., Quisquater, J.-J. (eds.) CHES 2004. LNCS, vol.\u00a03156, pp. 357\u2013370. Springer, Heidelberg (2004)"},{"key":"14_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"330","DOI":"10.1007\/978-3-540-39887-5_24","volume-title":"Fast Software Encryption","author":"N. Ferguson","year":"2003","unstructured":"Ferguson, N., Whiting, D., Schneier, B., Kelsey, J., Kohno, T.: Helix: Fast encryption and authentication in a single cryptographic primitive. In: Johansson, T. (ed.) FSE 2003. LNCS, vol.\u00a02887, pp. 330\u2013346. Springer, Heidelberg (2003)"},{"key":"14_CR20","unstructured":"FIPS 113. Computer Data Authentication. Federal Information Processing Standards Publication, 113 (1985)"},{"key":"14_CR21","unstructured":"FIPS 198. The Keyed-Hash Message Authentication Code (HMAC). Federal Information Processing Standards Publication, 198 (2002)"},{"key":"14_CR22","doi-asserted-by":"crossref","unstructured":"Francillon, A., Castelluccia, C., Inria, P.: TinyRNG: A cryptographic random number generator for wireless sensors network nodes. In: Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks\u2013WiOpt 2007, pp. 1\u20137. Citeseer (2007)","DOI":"10.1109\/WIOPT.2007.4480051"},{"key":"14_CR23","unstructured":"Freier, A., Karlton, P., Kocher, P.: The SSL Protocol Version 3.0 (1996)"},{"key":"14_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/3-540-45473-X_8","volume-title":"Fast Software Encryption","author":"V. Gligor","year":"2002","unstructured":"Gligor, V., Donescu, P.: Fast Encryption and Authentication: XCBC Encryption and XECB Authentication Modes. In: Matsui, M. (ed.) FSE 2001. LNCS, vol.\u00a02355, pp. 1\u201320. Springer, Heidelberg (2002)"},{"issue":"2","key":"14_CR25","doi-asserted-by":"publisher","first-page":"270","DOI":"10.1016\/0022-0000(84)90070-9","volume":"28","author":"S. Goldwasser","year":"1984","unstructured":"Goldwasser, S., Micali, S.: Probabilistic encryption. Journal of Computer and System Sciences\u00a028(2), 270\u2013299 (1984)","journal-title":"Journal of Computer and System Sciences"},{"key":"14_CR26","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"172","DOI":"10.1007\/BFb0052345","volume-title":"Fast Software Encryption","author":"S. Halevi","year":"1997","unstructured":"Halevi, S., Krawczyk, H.: MMH: Software message authentication in the Gbit\/second rates. In: Biham, E. (ed.) FSE 1997. LNCS, vol.\u00a01267, pp. 172\u2013189. Springer, Heidelberg (1997)"},{"key":"14_CR27","unstructured":"Holcom, D., Burleson, W., Fu, K.: Initial SRAM state as a Fingerprint and Source of True Random Numbers for RFID Tags. In: Workshop on RFID Security\u2013RFIDSec 2007 (2007)"},{"key":"14_CR28","doi-asserted-by":"crossref","unstructured":"Holcomb, D., Burleson, W., Fu, K.: Power-up SRAM State as an Identifying Fingerprint and Source of True Random Numbers. IEEE Transactions on Computers\u00a058(9) (2009)","DOI":"10.1109\/TC.2008.212"},{"key":"14_CR29","unstructured":"ISO\/IEC 9797-1. Information technology \u2013 Security techniques \u2013 Message Authentication Codes (MACs) \u2013 Part 1: Mechanisms using a block cipher (1999)"},{"key":"14_CR30","unstructured":"ISO\/IEC 9797-2. Information technology \u2013 Security techniques \u2013 Message Authentication Codes (MACs) \u2013 Part 2: Mechanisms using a dedicated hash-function (2002)"},{"key":"14_CR31","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"129","DOI":"10.1007\/978-3-540-39887-5_11","volume-title":"Fast Software Encryption","author":"T. Iwata","year":"2003","unstructured":"Iwata, T., Kurosawa, K.: Omac: One-key cbc mac. In: Johansson, T. (ed.) FSE 2003. LNCS, vol.\u00a02887, pp. 129\u2013153. Springer, Heidelberg (2003)"},{"issue":"4","key":"14_CR32","doi-asserted-by":"publisher","first-page":"547","DOI":"10.1007\/s00145-008-9024-z","volume":"21","author":"C. Jutla","year":"2008","unstructured":"Jutla, C.: Encryption modes with almost free message integrity. Journal of Cryptology\u00a021(4), 547\u2013578 (2008)","journal-title":"Journal of Cryptology"},{"key":"14_CR33","doi-asserted-by":"crossref","unstructured":"Katz, J., Lindell, Y.: Introduction to modern cryptography. Chapman & Hall\/CRC (2008)","DOI":"10.1201\/9781420010756"},{"key":"14_CR34","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"408","DOI":"10.1007\/978-3-540-25937-4_26","volume-title":"Fast Software Encryption","author":"T. Kohno","year":"2004","unstructured":"Kohno, T., Viega, J., Whiting, D.: CWC: A high-performance conventional authenticated encryption mode. In: Roy, B., Meier, W. (eds.) FSE 2004. LNCS, vol.\u00a03017, pp. 408\u2013426. Springer, Heidelberg (2004)"},{"key":"14_CR35","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"310","DOI":"10.1007\/3-540-44647-8_19","volume-title":"Advances in Cryptology - CRYPTO 2001","author":"H. Krawczyk","year":"2001","unstructured":"Krawczyk, H.: The order of encryption and authentication for protecting communications (or: How secure is SSL?). In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol.\u00a02139, pp. 310\u2013331. Springer, Heidelberg (2001)"},{"key":"14_CR36","unstructured":"Krovetz, T. (2006), http:\/\/fastcrypto.org\/umac\/"},{"key":"14_CR37","doi-asserted-by":"crossref","first-page":"620","DOI":"10.1109\/CCNC.2006.1593098","volume-title":"IEEE Consumer Communications and Networking Conference\u2013CCNS 2006","author":"Z. Liu","year":"2006","unstructured":"Liu, Z., Peng, D.: True Random Number Generator in RFID Systems Against Traceability. In: IEEE Consumer Communications and Networking Conference\u2013CCNS 2006, vol.\u00a01, pp. 620\u2013624. IEEE, Los Alamitos (2006)"},{"key":"14_CR38","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"94","DOI":"10.1007\/978-3-540-25937-4_7","volume-title":"Fast Software Encryption","author":"F. Muller","year":"2004","unstructured":"Muller, F.: Differential attacks against the Helix stream cipher. In: Roy, B., Meier, W. (eds.) FSE 2004. LNCS, vol.\u00a03017, pp. 94\u2013108. Springer, Heidelberg (2004)"},{"key":"14_CR39","unstructured":"O\u2019Neill (McLoone), M.: Low-Cost SHA-1 Hash Function Architecture for RFID Tags. In: Workshop on RFID Security\u2013RFIDSec 2008 (2008)"},{"key":"14_CR40","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"90","DOI":"10.1007\/11596219_8","volume-title":"Progress in Cryptology - INDOCRYPT 2005","author":"S. Paul","year":"2005","unstructured":"Paul, S., Preneel, B.: Near Optimal Algorithms for Solving Differential Equations of Addition with Batch Queries. In: Maitra, S., Veni Madhavan, C.E., Venkatesan, R. (eds.) INDOCRYPT 2005. LNCS, vol.\u00a03797, pp. 90\u2013103. Springer, Heidelberg (2005)"},{"key":"14_CR41","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"75","DOI":"10.1007\/11506157_7","volume-title":"Information Security and Privacy","author":"S. Paul","year":"2005","unstructured":"Paul, S., Preneel, B.: Solving systems of differential equations of addition. In: Boyd, C., Gonz\u00e1lez Nieto, J.M. (eds.) ACISP 2005. LNCS, vol.\u00a03574, pp. 75\u201388. Springer, Heidelberg (2005)"},{"issue":"5","key":"14_CR42","doi-asserted-by":"publisher","first-page":"615","DOI":"10.1109\/81.847868","volume":"47","author":"C. Petrie","year":"2000","unstructured":"Petrie, C., Connelly, J.: A noise-based IC random number generator for applications in cryptography. IEEE Transactions on Circuits and Systems I: Fundamental Theory and Applications\u00a047(5), 615\u2013621 (2000)","journal-title":"IEEE Transactions on Circuits and Systems I: Fundamental Theory and Applications"},{"key":"14_CR43","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/3-540-60590-8","volume-title":"Advances in Cryptology - CRYPTO \u201995","author":"B. Preneel","year":"1995","unstructured":"Preneel, B., Van Oorschot, P.: MDx-MAC and building fast MACs from hash functions. In: Coppersmith, D. (ed.) CRYPTO 1995. LNCS, vol.\u00a0963, pp. 1\u201314. Springer, Heidelberg (1995)"},{"issue":"3","key":"14_CR44","doi-asserted-by":"publisher","first-page":"365","DOI":"10.1145\/937527.937529","volume":"6","author":"P. Rogaway","year":"2003","unstructured":"Rogaway, P., Bellare, M., Black, J.: OCB: A Block-Cipher Mode of Operation for Efficient Authenticated Encryption. ACM Transactions on Information and System Security\u00a06(3), 365\u2013403 (2003)","journal-title":"ACM Transactions on Information and System Security"},{"issue":"4","key":"14_CR45","first-page":"369","volume":"31","author":"S. Schwarz","year":"1981","unstructured":"Schwarz, S.: The role of semigroups in the elementary theory of numbers. Math. Slovaca\u00a031(4), 369\u2013395 (1981)","journal-title":"Math. Slovaca"},{"key":"14_CR46","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"144","DOI":"10.1007\/978-3-540-71039-4_9","volume-title":"Fast Software Encryption","author":"A. Shamir","year":"2008","unstructured":"Shamir, A.: SQUASH\u2013A New MAC with Provable Security Properties for Highly Constrained Devices Such as RFID Tags. In: Nyberg, K. (ed.) FSE 2008. LNCS, vol.\u00a05086, pp. 144\u2013157. Springer, Heidelberg (2008)"},{"issue":"3","key":"14_CR47","doi-asserted-by":"publisher","first-page":"369","DOI":"10.1007\/BF01388651","volume":"4","author":"D. Stinson","year":"1994","unstructured":"Stinson, D.: Universal hashing and authentication codes. Designs, Codes and Cryptography\u00a04(3), 369\u2013380 (1994)","journal-title":"Designs, Codes and Cryptography"},{"key":"14_CR48","volume-title":"Cryptography: Theory and Practice","author":"D. Stinson","year":"2006","unstructured":"Stinson, D.: Cryptography: Theory and Practice. CRC Press, Boca Raton (2006)"},{"key":"14_CR49","doi-asserted-by":"publisher","DOI":"10.1007\/0-387-23483-7","volume-title":"Encyclopedia of Cryptography and Security","author":"H. Tilborg van","year":"2005","unstructured":"van Tilborg, H.: Encyclopedia of Cryptography and Security. Springer, Heidelberg (2005)"},{"issue":"3","key":"14_CR50","doi-asserted-by":"publisher","first-page":"265","DOI":"10.1016\/0022-0000(81)90033-7","volume":"22","author":"M. Wegman","year":"1981","unstructured":"Wegman, M., Carter, L.: New hash functions and their use in authentication and set equality. Journal of Computer and System Sciences\u00a022(3), 265\u2013279 (1981)","journal-title":"Journal of Computer and System Sciences"},{"key":"14_CR51","unstructured":"Whiting, D., Schneier, B., Lucks, S., Muller, F.: Phelix-fast encryption and authentication in a single cryptographic primitive, eSTREAM. ECRYPT Stream Cipher Project, Report 2005\/020 (2005), http:\/\/www.ecrypt.eu.org\/stream"},{"key":"14_CR52","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"87","DOI":"10.1007\/978-3-540-74619-5_6","volume-title":"Fast Software Encryption","author":"H. Wu","year":"2007","unstructured":"Wu, H., Preneel, B.: Differential-linear attacks against the stream cipher Phelix. In: Biryukov, A. (ed.) FSE 2007. LNCS, vol.\u00a04593, pp. 87\u2013100. Springer, Heidelberg (2007)"},{"key":"14_CR53","doi-asserted-by":"crossref","unstructured":"Ylonen, T., Lonvick, C.: The Secure Shell (SSH) Transport Layer Protocol. Technical report, RFC 4253 (2006)","DOI":"10.17487\/rfc4253"}],"container-title":["Lecture Notes in Computer Science","Information and Communications Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-17650-0_14","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,11,14]],"date-time":"2021-11-14T19:25:52Z","timestamp":1636917952000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-17650-0_14"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642176494","9783642176500"],"references-count":53,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-17650-0_14","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2010]]}}}