{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T16:25:23Z","timestamp":1725899123979},"publisher-location":"Berlin, Heidelberg","reference-count":9,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642385186"},{"type":"electronic","value":"9783642385193"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-38519-3_13","type":"book-chapter","created":{"date-parts":[[2013,5,2]],"date-time":"2013-05-02T07:59:28Z","timestamp":1367481568000},"page":"198-215","source":"Crossref","is-referenced-by-count":0,"title":["A General Model for MAC Generation Using Direct Injection"],"prefix":"10.1007","author":[{"given":"Harry","family":"Bartlett","sequence":"first","affiliation":[]},{"given":"Mufeed","family":"AlMashrafi","sequence":"additional","affiliation":[]},{"given":"Leonie","family":"Simpson","sequence":"additional","affiliation":[]},{"given":"Ed","family":"Dawson","sequence":"additional","affiliation":[]},{"given":"Kenneth Koon-Ho","family":"Wong","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"13_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"138","DOI":"10.1007\/978-3-642-31448-3_11","volume-title":"Information Security and Privacy","author":"M. AlMashrafi","year":"2012","unstructured":"AlMashrafi, M., Bartlett, H., Simpson, L., Dawson, E., Wong, K.K.-H.: Analysis of indirect message injection for MAC generation using stream ciphers. In: Susilo, W., Mu, Y., Seberry, J. (eds.) ACISP 2012. LNCS, vol.\u00a07372, pp. 138\u2013151. Springer, Heidelberg (2012)"},{"key":"13_CR2","unstructured":"Hawkes, P., Paddon, M., Rose, G.G.: Primitive specification for SOBER-128. IACR ePrint Archive, 473:476 (2003), \n                  \n                    http:\/\/eprint.iacr.org\/2003\/81"},{"key":"13_CR3","unstructured":"Hawkes, P., Paddon, M., Rose, G.G., de Vries, M.W.: Primitive Specification for SSS"},{"key":"13_CR4","unstructured":"Hawkes, P., Paddon, M., Rose, G.G., de Vries, M.W.: Primitive Specification for NLSv2. eSTREAM, ECRYPT Stream Cipher Project, Report 2006\/036 (2006), \n                  \n                    http:\/\/www.ecrypt.eu.org\/stream"},{"key":"13_CR5","unstructured":"Lidl, R., Niederreiter, H.: Finite fields. Encyclopedia of Mathematics and its Applications, vol.\u00a020. Cambridge University Press (1997)"},{"key":"13_CR6","unstructured":"Menezes, A.J., van Oorschot, P.C., Vanstone, S.A.: Handbook of Applied Cryptography. CRC Press (1997)"},{"key":"13_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"498","DOI":"10.1007\/978-3-642-21554-4_29","volume-title":"Applied Cryptography and Network Security","author":"Y. Nakano","year":"2011","unstructured":"Nakano, Y., Cid, C., Fukushima, K., Kiyomoto, S.: Analysis of Message Injection in Stream Cipher-Based Hash Functions. In: Lopez, J., Tsudik, G. (eds.) ACNS 2011. LNCS, vol.\u00a06715, pp. 498\u2013513. Springer, Heidelberg (2011)"},{"key":"13_CR8","doi-asserted-by":"crossref","unstructured":"Wardlaw, W.P.: A matrix model for the linear feedback shift register. Dtic Document, Naval Research Lab, Washington, DC (1989)","DOI":"10.21236\/ADA212351"},{"key":"13_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"472","DOI":"10.1007\/978-3-540-25937-4_30","volume-title":"Fast Software Encryption","author":"D. Watanabe","year":"2004","unstructured":"Watanabe, D., Furuya, S.: A MAC forgery attack on SOBER-128. In: Roy, B., Meier, W. (eds.) FSE 2004. LNCS, vol.\u00a03017, pp. 472\u2013482. Springer, Heidelberg (2004)"}],"container-title":["Lecture Notes in Computer Science","Information Security and Cryptology"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-38519-3_13","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,12]],"date-time":"2019-05-12T19:17:12Z","timestamp":1557688632000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-38519-3_13"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642385186","9783642385193"],"references-count":9,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-38519-3_13","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2013]]}}}