{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,1]],"date-time":"2025-10-01T16:31:50Z","timestamp":1759336310100,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":26,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642181771"},{"type":"electronic","value":"9783642181788"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-18178-8_7","type":"book-chapter","created":{"date-parts":[[2011,1,15]],"date-time":"2011-01-15T16:09:47Z","timestamp":1295107787000},"page":"69-83","source":"Crossref","is-referenced-by-count":3,"title":["Revisiting the Security of the Alred Design"],"prefix":"10.1007","author":[{"suffix":"Jr.","given":"Marcos A.","family":"Simpl\u00edcio","sequence":"first","affiliation":[]},{"given":"Paulo S. L. M.","family":"Barreto","sequence":"additional","affiliation":[]},{"given":"Tereza C. M. B.","family":"Carvalho","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"3","key":"7_CR1","doi-asserted-by":"publisher","first-page":"362","DOI":"10.1006\/jcss.1999.1694","volume":"61","author":"M. Bellare","year":"2000","unstructured":"Bellare, M., Kilian, J., Rogaway, P.: The security of the cipher block chaining message authentication code. Journal of Computer and System Sciences\u00a061(3), 362\u2013399 (2000)","journal-title":"Journal of Computer and System Sciences"},{"key":"7_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"163","DOI":"10.1007\/3-540-69053-0_13","volume-title":"Advances in Cryptology - EUROCRYPT \u201997","author":"M. Bellare","year":"1997","unstructured":"Bellare, M., Micciancio, D.: A new paradigm for collision-free hashing: Incrementality at reduced cost. In: Fumy, W. (ed.) EUROCRYPT 1997. LNCS, vol.\u00a01233, pp. 163\u2013192. Springer, Heidelberg (1997)"},{"key":"7_CR3","unstructured":"Bellare, M., Rogaway, P.: Code-based game-playing proofs and the security of triple encryption. Cryptology ePrint Archive, Report 2004\/331 (2004), http:\/\/eprint.iacr.org\/2004\/331"},{"key":"7_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"166","DOI":"10.1007\/978-3-540-74735-2_12","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2007","author":"A. Biryukov","year":"2007","unstructured":"Biryukov, A., Bogdanov, A., Khovratovich, D., Kasper, T.: Collision attacks on AES-based MAC: Alpha-MAC. In: Paillier, P., Verbauwhede, I. (eds.) CHES 2007. LNCS, vol.\u00a04727, pp. 166\u2013180. Springer, Heidelberg (2007)"},{"key":"7_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"149","DOI":"10.1007\/BFb0052343","volume-title":"Fast Software Encryption","author":"J. Daemen","year":"1997","unstructured":"Daemen, J., Knudsen, L.R., Rijmen, V.: The block cipher Square. In: Biham, E. (ed.) FSE 1997. LNCS, vol.\u00a01267, pp. 149\u2013165. Springer, Heidelberg (1997)"},{"key":"7_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/11502760_1","volume-title":"Fast Software Encryption","author":"J. Daemen","year":"2005","unstructured":"Daemen, J., Rijmen, V.: A new MAC construction alred and a specific instance alpha-mac. In: Gilbert, H., Handschuh, H. (eds.) FSE 2005. LNCS, vol.\u00a03557, pp. 1\u201317. Springer, Heidelberg (2005)"},{"key":"7_CR7","unstructured":"Daemen, J., Rijmen, V.: The Pelican MAC Function. Cryptology ePrint Archive, Report 2005\/088 (2005), http:\/\/eprint.iacr.org\/"},{"issue":"4","key":"7_CR8","doi-asserted-by":"publisher","first-page":"792","DOI":"10.1145\/6490.6503","volume":"33","author":"O. Goldreich","year":"1986","unstructured":"Goldreich, O., Goldwasser, S., Micali, S.: How to construct random functions. Journal of the ACM (JACM)\u00a033(4), 792\u2013807 (1986)","journal-title":"Journal of the ACM (JACM)"},{"issue":"3","key":"7_CR9","doi-asserted-by":"publisher","first-page":"189","DOI":"10.1080\/0161-110291890885","volume":"26","author":"H.M. Heys","year":"2002","unstructured":"Heys, H.M.: A tutorial on linear and differential cryptanalysis. Cryptologia\u00a026(3), 189\u2013221 (2002), http:\/\/citeseer.ist.psu.edu\/443539.html","journal-title":"Cryptologia"},{"key":"7_CR10","doi-asserted-by":"crossref","unstructured":"Jia, K., Wang, X., Yuan, Z., Xu, G.: Distinguishing attack and second-preimage attack on the CBC-like MACs. Cryptology ePrint Archive, Report 2008\/542 (2008), http:\/\/eprint.iacr.org\/","DOI":"10.1007\/978-3-642-10433-6_23"},{"key":"7_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"42","DOI":"10.1007\/11506447_5","volume-title":"Advanced Encryption Standard \u2013 AES","author":"L. Keliher","year":"2005","unstructured":"Keliher, L.: Refined analysis of bounds related to linear and differential cryptanalysis for the AES. In: Dobbertin, H., Rijmen, V., Sowa, A. (eds.) AES 2005. LNCS, vol.\u00a03373, pp. 42\u201357. Springer, Heidelberg (2005)"},{"issue":"2","key":"7_CR12","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1049\/iet-ifs:20060161","volume":"1","author":"L. Keliher","year":"2007","unstructured":"Keliher, L., Sui, J.: Exact maximum expected differential and linear probability for 2-round advanced encryption standard. Information Security, IET\u00a01(2), 53\u201357 (2007), http:\/\/citeseer.ist.psu.edu\/738374.html","journal-title":"Information Security, IET"},{"key":"7_CR13","unstructured":"McGrew, D., Viega, J.: The galois\/counter mode of operation (GCM). Submission to NIST Modes of Operation Process (May 2005), http:\/\/www.cryptobarn.com\/papers\/gcm-spec.pdf"},{"issue":"12","key":"7_CR14","doi-asserted-by":"publisher","first-page":"2908","DOI":"10.1093\/ietfec\/e90-a.12.2908","volume":"E90-A","author":"K. Minematsu","year":"2007","unstructured":"Minematsu, K., Matsushima, T.: Improved MACs from differentially-uniform permutations. IEICE Trans. Fundam. Electron. Commun. Comput. Sci.\u00a0E90-A(12), 2908\u20132915 (2007)","journal-title":"IEICE Trans. Fundam. Electron. Commun. Comput. Sci."},{"key":"7_CR15","unstructured":"NIST. Federal Information Processing Standard (FIPS 197) \u2013 Advanced Encryption Standard (AES). National Institute of Standards and Technology (November 2001), http:\/\/csrc.nist.gov\/publications\/fips\/fips197\/fips-197.pdf"},{"key":"7_CR16","unstructured":"NIST. Special Publication 800-38B Recommendation for Block Cipher Modes of Operation: the CMAC Mode for Authentication. National Institute of Standards and Technology, U.S. Department of Commerce (May 2005), http:\/\/csrc.nist.gov\/publications\/PubsSPs.html"},{"key":"7_CR17","unstructured":"NIST. Special Publication 800-38D \u2013 Recommendation for Block Cipher Modes of Operation: Galois\/Counter Mode (GCM) and GMAC. National Institute of Standards and Technology, U.S. Department of Commerce (November 2007), http:\/\/csrc.nist.gov\/publications\/nistpubs\/800-38D\/SP-800-38D.pdf"},{"key":"7_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"247","DOI":"10.1007\/978-3-540-39887-5_19","volume-title":"Fast Software Encryption","author":"S. Park","year":"2003","unstructured":"Park, S., Sung, S., Lee, S., Lim, J.: Improving the upper bound on the maximum differential and the maximum linear hull probability for SPN structures and AES. In: Johansson, T. (ed.) FSE 2003. LNCS, vol.\u00a02887, pp. 247\u2013260. Springer, Heidelberg (2003)"},{"key":"7_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"99","DOI":"10.1007\/3-540-60865-6_47","volume-title":"Fast Software Encryption","author":"V. Rijmen","year":"1996","unstructured":"Rijmen, V., Daemen, J., Preneel, B., Bosselaers, A., De Win, E.: The cipher Shark. In: Gollmann, D. (ed.) FSE 1996. LNCS, vol.\u00a01039, pp. 99\u2013111. Springer, Heidelberg (1996)"},{"key":"7_CR20","unstructured":"Sandia. Submission to NIST: Cipher-state (CS) mode of operation for AES (2004), http:\/\/csrc.nist.gov\/groups\/ST\/toolkit\/BCM\/documents\/proposedmodes\/cs\/cs-spec.pdf"},{"key":"7_CR21","unstructured":"Shoup, V.: Sequences of games: a tool for taming complexity in security proofs. Cryptology ePrint Archive, Report 2004\/332 (November 2004), http:\/\/eprint.iacr.org\/2004\/332"},{"key":"7_CR22","doi-asserted-by":"publisher","first-page":"165","DOI":"10.1002\/sec.66","volume":"2","author":"M. Simplicio","year":"2009","unstructured":"Simplicio, M., Barbuda, P., Barreto, P., Carvalho, T., Margi, C.: The marvin message authentication code and the lettersoup authenticated encryption scheme. Security and Communication Networks\u00a02, 165\u2013180 (2009)","journal-title":"Security and Communication Networks"},{"key":"7_CR23","volume-title":"Cryptography: Theory and Practice","author":"D.R. Stinson","year":"2002","unstructured":"Stinson, D.R.: Cryptography: Theory and Practice, 2nd edn. Chapman & Hall\/CRC Press, Boca Raton (2002)","edition":"2"},{"key":"7_CR24","unstructured":"Wang, W., Wang, X., Xu, G.: Impossible differential cryptanalysis of Pelican, MT-MAC-AES and PC-MAC-AES. Cryptology ePrint Archive, Report 2009\/005 (2009), http:\/\/eprint.iacr.org\/"},{"key":"7_CR25","doi-asserted-by":"publisher","first-page":"265","DOI":"10.1016\/0022-0000(81)90033-7","volume":"22","author":"M. Wegman","year":"1981","unstructured":"Wegman, M., Carter, J.: New hash functions and their use in authentication and set equality. Journal of Computer and System Sciences\u00a022, 265\u2013279 (1981)","journal-title":"Journal of Computer and System Sciences"},{"key":"7_CR26","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"209","DOI":"10.1007\/978-3-642-03356-8_13","volume-title":"Advances in Cryptology - CRYPTO 2009","author":"Z. Yuan","year":"2009","unstructured":"Yuan, Z., Wang, W., Jia, K., Xu, G., Wang, X.: New birthday attacks on some mACs based on block ciphers. In: Halevi, S. (ed.) CRYPTO 2009. LNCS, vol.\u00a05677, pp. 209\u2013230. Springer, Heidelberg (2009)"}],"container-title":["Lecture Notes in Computer Science","Information Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-18178-8_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,11,17]],"date-time":"2021-11-17T13:20:47Z","timestamp":1637155247000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-18178-8_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642181771","9783642181788"],"references-count":26,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-18178-8_7","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2011]]}}}