{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,29]],"date-time":"2026-01-29T21:09:31Z","timestamp":1769720971037,"version":"3.49.0"},"reference-count":9,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2017,4,7]],"date-time":"2017-04-07T00:00:00Z","timestamp":1491523200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Cryptol"],"published-print":{"date-parts":[[2018,1]]},"DOI":"10.1007\/s00145-017-9253-0","type":"journal-article","created":{"date-parts":[[2017,4,7]],"date-time":"2017-04-07T19:57:14Z","timestamp":1491595034000},"page":"162-171","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":17,"title":["How Many Queries are Needed to Distinguish a Truncated Random Permutation from a Random Function?"],"prefix":"10.1007","volume":"31","author":[{"given":"Shoni","family":"Gilboa","sequence":"first","affiliation":[]},{"given":"Shay","family":"Gueron","sequence":"additional","affiliation":[]},{"given":"Ben","family":"Morris","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,4,7]]},"reference":[{"key":"9253_CR1","unstructured":"M. Bellare, R. Impagliazzo, A tool for obtaining tighter security analyses of pseudorandom function based constructions, with applications to PRP to PRF conversion. ePrint 1999\/024. \n                    http:\/\/eprint.iacr.org\/1999\/024\n                    \n                  ."},{"key":"9253_CR2","unstructured":"I. Csisz\u00e1r, Information-type measures of difference of probability distributions and indirect observations, Stud. Sci. Math. Hung. 2 (1967), 299\u2013318."},{"key":"9253_CR3","first-page":"299","volume":"2","author":"I Csisz\u00e1r","year":"1967","unstructured":"S. Gilboa, S. Gueron, Distinguishing a truncated random permutation from a random function. ePrint 2015\/773. \n                    http:\/\/eprint.iacr.org\/2015\/773\n                    \n                  .","journal-title":"Stud. Sci. Math. Hung."},{"key":"9253_CR4","unstructured":"S. Gilboa, S. Gueron, The Advantage of Truncated Permutations. Available at \n                    arXiv:1610.02518\n                    \n                  ."},{"key":"9253_CR5","doi-asserted-by":"crossref","unstructured":"C. Hall, D. Wagner, J. Kelsey, B. Schneier, Building PRFs from PRPs, in: Proceedings of CRYPTO-98: Advances in Cryptography (Springer, Berlin, 1998), pp. 370\u2013389.","DOI":"10.1007\/BFb0055742"},{"key":"9253_CR6","doi-asserted-by":"crossref","unstructured":"J. H. B. Kemperman, On the optimum rate of transmitting information, in Probability and Information Theory (Proc. Int. Symp., McMaster Univ., Hamilton, Ont.), (Springer, Berlin, 1968), pp. 126\u2013169.","DOI":"10.1007\/BFb0079123"},{"key":"9253_CR7","doi-asserted-by":"publisher","first-page":"126","DOI":"10.1109\/TIT.1967.1053968","volume":"13","author":"S Kullback","year":"1967","unstructured":"S. Kullback, A lower bound for discrimination information in terms of variation, IEEE Trans. Inf. Theory 13 (1967), 126\u2013127.","journal-title":"IEEE Trans. Inf. Theory"},{"key":"9253_CR8","unstructured":"M. S. Pinsker, Information and informational stability of random variables and processes (Russian), Problemy Pereda\u010di Informacii, Vyp. 7, Akad. Nauk SSSR, Moscow (1960)."},{"issue":"2","key":"9253_CR9","doi-asserted-by":"publisher","first-page":"81","DOI":"10.1111\/j.1467-9574.1978.tb01387.x","volume":"32","author":"AJ Stam","year":"1978","unstructured":"A. J. Stam, Distance between sampling with and without replacement, Stat. Neerlandica 32 (1978), no.\u00a02, 81\u201391.","journal-title":"Stat. Neerlandica"}],"container-title":["Journal of Cryptology"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s00145-017-9253-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00145-017-9253-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00145-017-9253-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,4,8]],"date-time":"2020-04-08T08:23:36Z","timestamp":1586334216000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s00145-017-9253-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,4,7]]},"references-count":9,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2018,1]]}},"alternative-id":["9253"],"URL":"https:\/\/doi.org\/10.1007\/s00145-017-9253-0","relation":{},"ISSN":["0933-2790","1432-1378"],"issn-type":[{"value":"0933-2790","type":"print"},{"value":"1432-1378","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,4,7]]},"assertion":[{"value":"30 September 2014","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"30 January 2017","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"7 April 2017","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}