{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,6]],"date-time":"2025-12-06T04:53:57Z","timestamp":1764996837993},"reference-count":32,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2008,5,24]],"date-time":"2008-05-24T00:00:00Z","timestamp":1211587200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Cryptol"],"published-print":{"date-parts":[[2008,10]]},"DOI":"10.1007\/s00145-008-9024-z","type":"journal-article","created":{"date-parts":[[2008,5,23]],"date-time":"2008-05-23T16:54:45Z","timestamp":1211561685000},"page":"547-578","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":23,"title":["Encryption Modes with Almost Free Message Integrity"],"prefix":"10.1007","volume":"21","author":[{"given":"Charanjit S.","family":"Jutla","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2008,5,24]]},"reference":[{"key":"9024_CR1","unstructured":"Advanced Encryption Standard, National Institute of Standards and Technology, U.S. Department of Commerce, FIPS 197 (2001)"},{"key":"9024_CR2","unstructured":"ANSI X3.106, American national standard for information systems\u2014data encryption algorithm\u2014modes of operation. In American National Standards Institute (1983)"},{"key":"9024_CR3","doi-asserted-by":"crossref","unstructured":"M. Bellare, C. Namprempre, Authenticated encryption: relations among notions and analysis of the generic composition paradigm. In Proc. Asiacrypt. LNCS, vol. 1976 (2000)","DOI":"10.1007\/3-540-44448-3_41"},{"key":"9024_CR4","volume-title":"Proc. Asiacrypt 2000","author":"M. Bellare","year":"2000","unstructured":"M. Bellare, C. Namprempre, Authenticated encryption: relations among notions and analysis of the generic composition paradigm. In Proc. Asiacrypt 2000, ed. by T. Okamoto (Springer, Berlin, 2000)"},{"key":"9024_CR5","unstructured":"M. Bellare, A. Desai, E. Jokipii, P. Rogaway, A concrete security treatment of symmetric encryption: analysis of the DES modes of operation. In Proc. 38th IEEE FOCS (1997)"},{"issue":"3","key":"9024_CR6","first-page":"362","volume":"61","author":"M. Bellare","year":"2000","unstructured":"M. Bellare, J. Kilian, P. Rogaway, The security of cipher block chaining. JCSS 61(3), 362\u2013399 (2000)","journal-title":"JCSS"},{"key":"9024_CR7","doi-asserted-by":"crossref","unstructured":"J. Black, S. Halevi, H. Krawczyk, T. Krovetz, P. Rogaway, UMAC: Fast and secure message authentication. In Proc. Advances in Cryptology-CRYPTO 99. LNCS, vol. 1666 (1999)","DOI":"10.1007\/3-540-48405-1_14"},{"key":"9024_CR8","first-page":"143","volume":"18","author":"J. Carter","year":"1979","unstructured":"J. Carter, M. Wegman, Universal classes of hash functions. JCSS 18, 143\u2013154 (1979)","journal-title":"JCSS"},{"key":"9024_CR9","doi-asserted-by":"crossref","unstructured":"V.D. Gligor, P. Donescu, Integrity aware PCBC encryption schemes. In Proc. 7th Intl. Work. on Security Protocols. LNCS, vol. 1796 (Cambridge, 1999), pp. 153\u2013171","DOI":"10.1007\/10720107_22"},{"key":"9024_CR10","unstructured":"V.D. Gligor, P. Donescu, Fast encryption authentication: XCBC encryption and XECB authentication modes. \n                    http:\/\/csrc.nist.gov\/encryption\/modes\/workshop1"},{"key":"9024_CR11","unstructured":"O. Goldreich, H. Krawczyk, M. Luby, On the existence of pseudorandom generators. In Proc. FOCS (1988), pp. 12\u201314. Also in SIAM J. Comput. 22(6), 1163\u20131175"},{"key":"9024_CR12","unstructured":"S. Halevi, An observation regarding Jutla\u2019s modes of operation. \n                    http:\/\/eprint.iacr.org\/2001\/015\/"},{"key":"9024_CR13","unstructured":"J. H\u00e5stad, Message integrity of IAPM and IACBC. \n                    http:\/\/csrc.nist.gov\/CryptoToolkit\/modes\/proposedmodes\/iapm\/integrityproofs.pdf"},{"key":"9024_CR14","unstructured":"ISO\/IEC 9797, Data cryptographic techniques\u2014data integrity mechanism using a cryptographic check function employing a block cipher algorithm. In International Organization for Standardization, Geneva, Switzerland (1989)"},{"key":"9024_CR15","unstructured":"C.S. Jutla, Encryption modes with almost free message integrity. \n                    http:\/\/csrc.nist.gov\/groups\/ST\/toolkit\/BCM\/workshops.html"},{"key":"9024_CR16","doi-asserted-by":"crossref","unstructured":"C.S. Jutla, Encryption modes with almost free message integrity. In Proc. Eurocrypt 2001. LNCS, vol.\u00a02045 (2001)","DOI":"10.1007\/3-540-44987-6_32"},{"key":"9024_CR17","doi-asserted-by":"crossref","unstructured":"C.S. Jutla, Tight lower bound on linear authenticated encryption. In Proc. Selected Areas in Cryptography 2003. LNCS, vol. 3006 (2003)","DOI":"10.1007\/978-3-540-24654-1_25"},{"key":"9024_CR18","doi-asserted-by":"crossref","unstructured":"J. Katz, M. Yung, Unforgeable encryption and adaptively secure modes of operation. In Proc. Fast Software Encryption. LNCS, vol.\u00a01978 (2000)","DOI":"10.1007\/3-540-44706-7_20"},{"key":"9024_CR19","unstructured":"H. Krawczyk, LFSR-based hashing and authentication. In Proc. Crypto 94. LNCS, vol. 839 (1994)"},{"key":"9024_CR20","series-title":"Annals of Mathematical Studies","volume-title":"Contributions to the Theory of Games II","author":"H.W. Kuhn","year":"1950","unstructured":"H.W. Kuhn, Extensive games and the problem of information. In Contributions to the Theory of Games II, ed. by H.W. Kuhn, A.W. Tucker. Annals of Mathematical Studies, vol. 28 (Princeton Univ. Press, Princeton, 1950)"},{"issue":"4","key":"9024_CR21","doi-asserted-by":"publisher","first-page":"1036","DOI":"10.1137\/0215074","volume":"15","author":"M. Luby","year":"1986","unstructured":"M. Luby, A simple parallel algorithm for the maximal independent set problem. SIAM J. Comput. 15(4), 1036\u201355 (1986)","journal-title":"SIAM J. Comput."},{"key":"9024_CR22","volume-title":"Princeton Computer Science Notes","author":"M. Luby","year":"1996","unstructured":"M. Luby, Pseudorandomness and cryptographic applications. In Princeton Computer Science Notes (Princeton Univ. Press, Princeton, 1996)"},{"key":"9024_CR23","volume-title":"Cryptography: A New Dimension in Computer Data Security","author":"C.H. Meyer","year":"1982","unstructured":"C.H. Meyer, S.M. Matyas, Cryptography: A New Dimension in Computer Data Security (Wiley, New York, 1982)"},{"key":"9024_CR24","unstructured":"M. Naor, O. Reingold, On the construction of pseudo-random permutations: Luby\u2013Rackoff revisited. In Proc. 29th ACM STOC (1997), pp. 189\u2013199"},{"key":"9024_CR25","unstructured":"M. Naor, M. Yung, Universal Hash functions and their cryptographic applications. In Proc. STOC, (1989), pp. 33\u201343"},{"key":"9024_CR26","unstructured":"National Bureau of Standards, Data encryption standard, U.S. Department of Commerce, FIPS 46 (1977)"},{"key":"9024_CR27","unstructured":"National Bureau of Standards, DES modes of operation, U.S. Department of Commerce, FIPS 81 (1980)"},{"key":"9024_CR28","unstructured":"RFC 1510, The Kerberos network authentication service (V5), J. Kohl and B.C. Neuman (Sept. 1993)"},{"key":"9024_CR29","unstructured":"RFC 2401, Security architecture for the Internet protocol. \n                    http:\/\/www.ietf.org\/rfc\/rfc2401.txt"},{"key":"9024_CR30","unstructured":"RFC 2246, The TLS protocol. \n                    http:\/\/www.ietf.org\/rfc\/rfc2246.txt"},{"key":"9024_CR31","doi-asserted-by":"crossref","unstructured":"P. Rogaway, M. Bellare, J. Black, T. Krovetz, OCB: A block-cipher mode of operation for efficient authenticated encryption. In Proc. 8th ACM Conf. Comp. and Comm. Security (CCS), ACM (2001)","DOI":"10.1145\/501983.502011"},{"key":"9024_CR32","unstructured":"S.G. Stubblebine, V.D. Gligor, On message integrity in cryptographic protocols. In Proc. 1992 IEEE Comp. Soc. Symp. on Research in Security and Privacy (1992)"}],"container-title":["Journal of Cryptology"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00145-008-9024-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s00145-008-9024-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00145-008-9024-z","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00145-008-9024-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,4,8]],"date-time":"2020-04-08T08:39:01Z","timestamp":1586335141000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s00145-008-9024-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,5,24]]},"references-count":32,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2008,10]]}},"alternative-id":["9024"],"URL":"https:\/\/doi.org\/10.1007\/s00145-008-9024-z","relation":{},"ISSN":["0933-2790","1432-1378"],"issn-type":[{"type":"print","value":"0933-2790"},{"type":"electronic","value":"1432-1378"}],"subject":[],"published":{"date-parts":[[2008,5,24]]},"assertion":[{"value":"24 December 2003","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"8 April 2008","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"24 May 2008","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}