{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,30]],"date-time":"2025-05-30T05:44:58Z","timestamp":1748583898000,"version":"3.37.3"},"reference-count":12,"publisher":"Springer Science and Business Media LLC","issue":"2-3","license":[{"start":{"date-parts":[[2018,10,4]],"date-time":"2018-10-04T00:00:00Z","timestamp":1538611200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Des. Codes Cryptogr."],"published-print":{"date-parts":[[2019,3]]},"DOI":"10.1007\/s10623-018-0561-7","type":"journal-article","created":{"date-parts":[[2018,10,4]],"date-time":"2018-10-04T10:52:06Z","timestamp":1538650326000},"page":"527-546","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Evaluating Bernstein\u2013Rabin\u2013Winograd polynomials"],"prefix":"10.1007","volume":"87","author":[{"given":"Sebati","family":"Ghosh","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5346-2650","authenticated-orcid":false,"given":"Palash","family":"Sarkar","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,10,4]]},"reference":[{"key":"561_CR1","first-page":"32","volume-title":"FSE, Lecture Notes in Computer Science","author":"DJ Bernstein","year":"2005","unstructured":"Bernstein D.J.: The Poly1305-AES message-authentication code. In: Gilbert H., Handschuh H. (eds.) FSE, Lecture Notes in Computer Science, vol. 3557, pp. 32\u201349. Springer, Berlin (2005)."},{"key":"561_CR2","unstructured":"Bernstein D.J.: Polynomial evaluation and message authentication (2007). http:\/\/cr.yp.to\/papers.html#pema ."},{"issue":"2","key":"561_CR3","doi-asserted-by":"publisher","first-page":"143","DOI":"10.1016\/0022-0000(79)90044-8","volume":"18","author":"L Carter","year":"1979","unstructured":"Carter L., Wegman M.N.: Universal classes of hash functions. J. Comput. Syst. Sci. 18(2), 143\u2013154 (1979).","journal-title":"J. Comput. Syst. Sci."},{"issue":"1","key":"561_CR4","doi-asserted-by":"crossref","first-page":"106","DOI":"10.46586\/tosc.v2017.i1.106-128","volume":"2017","author":"D Chakraborty","year":"2017","unstructured":"Chakraborty D., Ghosh S., Sarkar P.: A fast single-key two-level universal hash function. IACR Trans. Symmetric Cryptol. 2017(1), 106\u2013128 (2017).","journal-title":"IACR Trans. Symmetric Cryptol."},{"issue":"2","key":"561_CR5","doi-asserted-by":"publisher","first-page":"279","DOI":"10.1109\/TC.2011.227","volume":"62","author":"D Chakraborty","year":"2013","unstructured":"Chakraborty D., Mancillas-L\u00f3pez C., Rodr\u00edguez-Henr\u00edquez F., Sarkar P.: Efficient hardware implementations of BRW polynomials and tweakable enciphering schemes. IEEE Trans. Comput. 62(2), 279\u2013294 (2013).","journal-title":"IEEE Trans. Comput."},{"issue":"14\u201315","key":"561_CR6","doi-asserted-by":"publisher","first-page":"549","DOI":"10.1016\/j.ipl.2010.04.011","volume":"110","author":"S Gueron","year":"2010","unstructured":"Gueron S., Kounavis M.E.: Efficient implementation of the Galois Counter Mode using a carry-less multiplier and a fast reduction algorithm. Inf. Process. Lett. 110(14\u201315), 549\u2013553 (2010).","journal-title":"Inf. Process. Lett."},{"key":"561_CR7","first-page":"168","volume":"2017","author":"S Gueron","year":"2017","unstructured":"Gueron S., Langley A., Lindell Y.: AES-GCM-SIV: specification and analysis. IACR Cryptol. 2017, 168 (2017).","journal-title":"IACR Cryptol."},{"key":"561_CR8","unstructured":"Krovetz T., Rogaway P.: The software performance of authenticated-encryption modes. In: Joux A. (ed.) Fast Software Encryption\u201418th International Workshop, FSE 2011, Lyngby, Denmark, 13\u201316 February, 2011, Revised Selected Papers, vol. 6733 of Lecture Notes in Computer Science, pp. 306\u2013327. Springer, Berlin (2011)."},{"key":"561_CR9","doi-asserted-by":"publisher","first-page":"433","DOI":"10.1002\/cpa.3160250405","volume":"25","author":"MO Rabin","year":"1972","unstructured":"Rabin M.O., Winograd S.: Fast evaluation of polynomials by rational preparation. Commun. Pure Appl. Math. 25, 433\u2013458 (1972).","journal-title":"Commun. Pure Appl. Math."},{"issue":"10","key":"561_CR10","doi-asserted-by":"publisher","first-page":"4749","DOI":"10.1109\/TIT.2009.2027487","volume":"55","author":"P Sarkar","year":"2009","unstructured":"Sarkar P.: Efficient tweakable enciphering schemes from (block-wise) universal hash functions. IEEE Trans. Inf. Theory 55(10), 4749\u20134760 (2009).","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"3","key":"561_CR11","doi-asserted-by":"publisher","first-page":"351","DOI":"10.1007\/s10623-012-9672-8","volume":"69","author":"P Sarkar","year":"2013","unstructured":"Sarkar P.: A new multi-linear universal hash family. Des. Codes Cryptogr. 69(3), 351\u2013367 (2013).","journal-title":"Des. Codes Cryptogr."},{"issue":"3","key":"561_CR12","doi-asserted-by":"publisher","first-page":"265","DOI":"10.1016\/0022-0000(81)90033-7","volume":"22","author":"MN Wegman","year":"1981","unstructured":"Wegman M.N., Carter L.: New hash functions and their use in authentication and set equality. J. Comput. Syst. Sci. 22(3), 265\u2013279 (1981).","journal-title":"J. Comput. Syst. Sci."}],"container-title":["Designs, Codes and Cryptography"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10623-018-0561-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-018-0561-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-018-0561-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,12]],"date-time":"2020-11-12T01:01:25Z","timestamp":1605142885000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10623-018-0561-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,10,4]]},"references-count":12,"journal-issue":{"issue":"2-3","published-print":{"date-parts":[[2019,3]]}},"alternative-id":["561"],"URL":"https:\/\/doi.org\/10.1007\/s10623-018-0561-7","relation":{},"ISSN":["0925-1022","1573-7586"],"issn-type":[{"type":"print","value":"0925-1022"},{"type":"electronic","value":"1573-7586"}],"subject":[],"published":{"date-parts":[[2018,10,4]]},"assertion":[{"value":"3 December 2017","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"5 July 2018","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"20 September 2018","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"4 October 2018","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}