{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,31]],"date-time":"2025-10-31T20:48:46Z","timestamp":1761943726475,"version":"build-2065373602"},"publisher-location":"Berlin, Heidelberg","reference-count":25,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540648925"},{"type":"electronic","value":"9783540684626"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1998]]},"DOI":"10.1007\/bfb0055719","type":"book-chapter","created":{"date-parts":[[2006,7,27]],"date-time":"2006-07-27T21:12:36Z","timestamp":1154034756000},"page":"46-55","source":"Crossref","is-referenced-by-count":3,"title":["Cryptography and the internet"],"prefix":"10.1007","author":[{"given":"Steven M.","family":"Bellovin","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2006,5,28]]},"reference":[{"key":"4_CR1","doi-asserted-by":"crossref","unstructured":"Matt Blaze, G. Bleumer, and Martin Strauss. Divertible protocols and atomic proxy cryptography. In Proceedings of Eurocrypt '98, 1998. to appear.","DOI":"10.1007\/BFb0054122"},{"key":"4_CR2","doi-asserted-by":"crossref","unstructured":"M. Bellare, R. Canetti, and H. Krawczyk. Keying hash functions for message authentication. In Advances in Cryptology: Proceedings of CRYPTO '96, pages 1\u201315. Springer-Verlag, 1996.","DOI":"10.1007\/3-540-68697-5_1"},{"key":"4_CR3","unstructured":"Steven M. Bellovin. Using the domain name system for system breakins. In Proceedings of the Fifth Usenix Unix Security Symposium, pages 199\u2013208, Salt Lake City, UT, June 1995."},{"key":"4_CR4","unstructured":"Steven M. Bellovin. Problem areas for the IP security protocols. In Proceedings of the Sixth Usenix Unix Security Symposium, pages 205\u2013214, July 1996."},{"key":"4_CR5","unstructured":"Steven M. Bellovin. Probable plaintext cryptanalysis of the IP security protocols. In Proceedings of the Symposium on Network and Distributed System Security, pages 155\u2013160, 1997."},{"key":"4_CR6","doi-asserted-by":"crossref","unstructured":"Matt Blaze, Joan Feigenbaum, and Jack Lacy. Decentralized trust management. In IEEE Symposium on Security and Privacy, pages 164\u2013173, 1996.","DOI":"10.1109\/SECPRI.1996.502679"},{"key":"4_CR7","doi-asserted-by":"crossref","unstructured":"Matt Blaze, Joan Feigenbaum, and Martin Strauss. Compliance checking in the PolicyMaker trust management system. In Proceedings of the 2nd Financial Crypto Conference, 1998. to appear.","DOI":"10.1007\/BFb0055488"},{"key":"4_CR8","unstructured":"J. Bound, Y. Rekhter, S. Thomson, and P. Vixie. Dynamic updates in the domain name system (DNS UPDATE). Request for Comments (Proposed Standard) 2136, Internet Engineering Task Force, April 1997. (Obsoletes RFC1035)."},{"key":"4_CR9","doi-asserted-by":"crossref","unstructured":"W. Diffie, P.C. van Oorschot, and M.J. Wiener. Authentication and authenticated key exchange. Designs, Codes and Cryptography, page 107, 1992.","DOI":"10.1007\/BF00124891"},{"key":"4_CR10","doi-asserted-by":"crossref","unstructured":"D. Eastlake and C. Kaufman. Domain name system security extensions. Request for Comments (Proposed Standard) 2065, Internet Engineering Task Force, January 1997. (Obsoletes RFC1034).","DOI":"10.17487\/rfc2065"},{"key":"4_CR11","doi-asserted-by":"crossref","unstructured":"Ralf Hauser, Tony Przgienda, and Gene Tsudik. Reducing the cost of security in link-state routing. In Proceedings of the Symposium on Network and Distributed System Security, pages 93\u201399, 1997.","DOI":"10.1109\/NDSS.1997.579226"},{"key":"4_CR12","unstructured":"Laurent Joncheray. A simple active attack against TCP. In Proceedings of the Fifth Usenix Unix Security Symposium, Salt Lake City, UT, 1995."},{"key":"4_CR13","doi-asserted-by":"crossref","unstructured":"Hugo Krawczyk. SKEME: A versatile secure key exchange mechanism for internet. In Proceedings of the Internet Society Symposium on Network and Distributed System Security, pages 114\u2013127, February 1996.","DOI":"10.1109\/NDSS.1996.492418"},{"key":"4_CR14","doi-asserted-by":"crossref","unstructured":"S.L. Murphy and M.R. Badger. Digital signature protection of the OSPf routing protocol. In Proceedings of the Symposium on Network and Distributed System Security, pages 93\u2013102, 1996.","DOI":"10.1109\/NDSS.1996.492416"},{"key":"4_CR15","doi-asserted-by":"crossref","unstructured":"P. Mockapetris. Domain names: Concepts and facilities. RFC 882, Internet Engineering Task Force, November 1983. (Obsoleted by RFC1034); (Updated by RFC973).","DOI":"10.17487\/rfc0882"},{"key":"4_CR16","unstructured":"NIST. Secure hash standard (SHS), April 1995. Federal Information Processing Standards Publication 180-1."},{"key":"4_CR17","doi-asserted-by":"crossref","unstructured":"B. Preneel and Paul C. van Oorschot. MDx-MAC and building fast MACs from hash functions. In Proceedings of CRYPTO '95, pages 1\u201314, 1995.","DOI":"10.1007\/3-540-44750-4_1"},{"key":"4_CR18","doi-asserted-by":"crossref","unstructured":"B. Preneel and Paul C. van Oorschot. On the security of two mac algorithms. In Proceedings of Eurocrypt '96, pages 19\u201332, 1996.","DOI":"10.1007\/3-540-68339-9_3"},{"key":"4_CR19","doi-asserted-by":"crossref","unstructured":"R. Rivest. The MD5 message-digest algorithm. Request for Comments (Informational) 1321, Internet Engineering Task Force, April 1992.","DOI":"10.17487\/rfc1321"},{"key":"4_CR20","doi-asserted-by":"crossref","unstructured":"Ronald Rivest. All-or-nothing encryption and the package transform. In Proceedings of the Fast Software Encryption Conference, 1997. To appear.","DOI":"10.1007\/BFb0052348"},{"key":"4_CR21","unstructured":"Ronald Rivest and Butler Lampson, 1996. Several papers can be found at http:\/\/theory.lcs.mit.edu\/~cis\/sdsi.html."},{"key":"4_CR22","doi-asserted-by":"crossref","unstructured":"K.E. Sirois and S.T. Kent. Securing the nimrod routing architecture. In Proceedings of the Symposium on Network and Distributed System Security, pages 74\u201384, 1997.","DOI":"10.1109\/NDSS.1997.579223"},{"key":"4_CR23","doi-asserted-by":"crossref","unstructured":"Bruce Schneier and P. Mudge. Cryptanalysis of Microsoft's Point-to-Point Tunneling Protocol (PPTP), November 1998. 5th ACM Conference on Computer and Communications Security, to appear.","DOI":"10.1145\/288090.288119"},{"key":"4_CR24","doi-asserted-by":"crossref","unstructured":"B.R. Smith, S. Murthy, and J.J. Garcia-Luna-Aceves. Securing distance-vector routing protocols. In Proceedings of the Symposium on Network and Distributed System Security, pages 85\u201392, 1997.","DOI":"10.1109\/NDSS.1997.579225"},{"key":"4_CR25","doi-asserted-by":"crossref","unstructured":"Joseph D. Touch. Performance analysis of MD5. In Proceedings of ACM SIGCOMM '95, pages 77\u201386, 1996.","DOI":"10.1145\/217391.217414"}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2014 CRYPTO '98"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/BFb0055719","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,10]],"date-time":"2025-01-10T03:51:51Z","timestamp":1736481111000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/BFb0055719"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1998]]},"ISBN":["9783540648925","9783540684626"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/bfb0055719","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[1998]]}}}