{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,26]],"date-time":"2026-03-26T15:54:42Z","timestamp":1774540482678,"version":"3.50.1"},"reference-count":25,"publisher":"Springer Science and Business Media LLC","issue":"10","license":[{"start":{"date-parts":[[2013,9,20]],"date-time":"2013-09-20T00:00:00Z","timestamp":1379635200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Quantum Inf Process"],"published-print":{"date-parts":[[2014,10]]},"DOI":"10.1007\/s11128-013-0641-6","type":"journal-article","created":{"date-parts":[[2013,9,19]],"date-time":"2013-09-19T05:53:53Z","timestamp":1379570033000},"page":"2155-2170","source":"Crossref","is-referenced-by-count":19,"title":["Direct proof of security of Wegman\u2013Carter authentication with partially known key"],"prefix":"10.1007","volume":"13","author":[{"given":"Aysajan","family":"Abidin","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Jan-\u00c5ke","family":"Larsson","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2013,9,20]]},"reference":[{"key":"641_CR1","unstructured":"Abidin, A.: Weaknesses of Authentication in Quantum Cryptography and Strongly Universal Hash Functions. Link\u00f6ping Studies in Science and Technology. Licentiate Thesis, Applied Mathematics, The Institute of Technology, Link\u00f6ping University, (2010)"},{"issue":"5","key":"641_CR2","doi-asserted-by":"crossref","first-page":"1047","DOI":"10.1142\/S0219749909005754","volume":"7","author":"A Abidin","year":"2009","unstructured":"Abidin, A., Larsson, J.\u00c5.: Vulnerability of \u201cA novel protocol-authentication algorithm ruling out a man-in-the-middle attack in quantum cryptography\u201d. Int. J. Quantum Inf. 7(5), 1047\u20131052 (2009)","journal-title":"Int. J. Quantum Inf."},{"key":"641_CR3","doi-asserted-by":"crossref","unstructured":"Abidin, A., Larsson, J.\u00c5.: New universal hash functions. In: Lucks, S., Armknecht, F. (eds.) WEWoRC 2011. LNCS, vol. 7242, pp. 99\u2013108. Springer, Berlin (2012)","DOI":"10.1007\/978-3-642-34159-5_7"},{"key":"641_CR4","doi-asserted-by":"crossref","unstructured":"Atici, M., Stinson, D.R.: Universal hashing and multiple authentication. In: Koblitz, N. (ed.) CRYPTO \u201996. LNCS, vol. 1109, pp. 16\u201330 (1996)","DOI":"10.1007\/3-540-68697-5_2"},{"key":"641_CR5","unstructured":"Bennett, C.H., Brassard, G.: Quantum cryptography: public key distribution and coin tossing. In: Proceedings of IEEE International Conference on Computers, Systems and Signal Processing, pp. 175\u2013179. Bangalore, India (1984)"},{"key":"641_CR6","doi-asserted-by":"crossref","unstructured":"Bierbrauer, J., Johansson, T., Kabatianskii, G., Smeets, B.: On families of hash functions via geometric codes and concatenation. In: Stinson, D. (ed.) CRYPTO \u201993. LNCS, vol. 773, pp. 331\u2013342 (1994)","DOI":"10.1007\/3-540-48329-2_28"},{"key":"641_CR7","doi-asserted-by":"crossref","unstructured":"Canetti, R.: Universally composable security: a new paradigm for cryptographic protocols. In: Annual Symposium on Foundations of Computer Science\u2014Proceedings, pp. 136\u2013145 (2001)","DOI":"10.1109\/SFCS.2001.959888"},{"key":"641_CR8","doi-asserted-by":"crossref","first-page":"143","DOI":"10.1016\/0022-0000(79)90044-8","volume":"18","author":"L Carter","year":"1979","unstructured":"Carter, L., Wegman, M.N.: Universal classes of hash functions. J. Comput. Syst. Sci. 18, 143\u2013154 (1979)","journal-title":"J. Comput. Syst. Sci."},{"issue":"4","key":"641_CR9","doi-asserted-by":"crossref","first-page":"1735","DOI":"10.1109\/TIT.2008.917697","volume":"54","author":"J Cederl\u00f6f","year":"2008","unstructured":"Cederl\u00f6f, J., Larsson, J.\u00c5.: Security aspects of the authentication used in quantum cryptography. IEEE Trans. Inf. Theory 54(4), 1735\u20131741 (2008)","journal-title":"IEEE Trans. Inf. Theory"},{"key":"641_CR10","first-page":"65","volume":"2","author":"B Boer den","year":"1993","unstructured":"den Boer, B.: A simple and key-economical unconditional authentication scheme. J. Comput. Secur. 2, 65\u201372 (1993)","journal-title":"J. Comput. Secur."},{"key":"641_CR11","doi-asserted-by":"crossref","first-page":"661","DOI":"10.1103\/PhysRevLett.67.661","volume":"67","author":"AK Ekert","year":"1991","unstructured":"Ekert, A.K.: Quantum cryptography based on Bell\u2019s theorem. Phys. Rev. Lett. 67, 661\u2013663 (1991)","journal-title":"Phys. Rev. Lett."},{"key":"641_CR12","doi-asserted-by":"crossref","unstructured":"Feige, U., Shamir, A.: Witness indistinguishability and witness hiding protocols. In: Proceedings of the 22nd ACM Symposium on Theory of Computing, pp. 416\u2013426 (1990)","DOI":"10.1145\/100216.100272"},{"key":"641_CR13","doi-asserted-by":"crossref","unstructured":"Hirota, O.: Incompleteness and limit of quantum key distribution theory. arXiv:1208.2106v2 (2012)","DOI":"10.1117\/12.929185"},{"key":"641_CR14","doi-asserted-by":"crossref","unstructured":"Johansson, T., Kabatianskii, G., Smeets, B.: On the relations between A-codes and codes correcting independent errors. In: Stinson, D. (ed.) EUROCRYPT \u201993. T. Helleseth, vol. 765, pp. 1\u201311 (1994)","DOI":"10.1007\/3-540-48285-7_1"},{"key":"641_CR15","doi-asserted-by":"crossref","unstructured":"Krawczyk, H.: LFSR-based hashing and authentication. In: Desmedt, Y. (ed.) CRYPTO \u201994. LNCS, vol. 839, pp. 129\u2013139 (1994)","DOI":"10.1007\/3-540-48658-5_15"},{"key":"641_CR16","doi-asserted-by":"crossref","unstructured":"Krawczyk, H.: New hash functions for message authentication. In: Guillou, L.C., Quisquater, J.J. (eds.) EUROCRYPT \u201995. LNCS, vol. 921, pp. 301\u2013310 (1995)","DOI":"10.1007\/3-540-49264-X_24"},{"key":"641_CR17","unstructured":"Pacher, C., Abidin, A., Lornser, T., Peev, M., Ursin, R., Zeilinger, A., Larsson, J.\u00c5.: Attacks on quantum key distribution protocols that employ non-its authentication. arXiv:1209.0365 (2012)"},{"key":"641_CR18","unstructured":"Portmann, C.: Key recycling in authentication. arXiv:1202.1229v1 (2012)"},{"key":"641_CR19","doi-asserted-by":"crossref","unstructured":"Renner, R.: Reply to recent scepticism about the foundations of quantum cryptography. arXiv:1209.2423 (2012)","DOI":"10.1364\/CLEO_QELS.2013.QTu2C.1"},{"key":"641_CR20","doi-asserted-by":"crossref","unstructured":"Stinson, D.R.: Combinatorial techniques for universal hashing. J. Comput. Syst. Sci. 48(2), 337\u2013346 (1994). doi: 10.1016\/S0022-0000(05)80007-8","DOI":"10.1016\/S0022-0000(05)80007-8"},{"key":"641_CR21","doi-asserted-by":"crossref","unstructured":"Stinson, D.R.: Universal hashing and authentication codes. In: Feigenbaum, J. (ed.) CRYPTO \u201991. LNCS, vol. 576, pp. 74\u201385 (1992)","DOI":"10.1007\/3-540-46766-1_5"},{"key":"641_CR22","first-page":"7","volume":"114","author":"DR Stinson","year":"1996","unstructured":"Stinson, D.R.: On the connections between universal hashing, combinatorial designs and error-correcting codes. Congr. Numer. 114, 7\u201327 (1996)","journal-title":"Congr. Numer."},{"key":"641_CR23","first-page":"3","volume":"42","author":"DR Stinson","year":"2002","unstructured":"Stinson, D.R.: Universal hash families and the leftover hash lemma, and applications to cryptography and computing. J. Combin. Math. Combin. Comput. 42, 3\u201331 (2002)","journal-title":"J. Combin. Math. Combin. Comput."},{"key":"641_CR24","doi-asserted-by":"crossref","first-page":"265","DOI":"10.1016\/0022-0000(81)90033-7","volume":"22","author":"MN Wegman","year":"1981","unstructured":"Wegman, M.N., Carter, L.: New hash functions and their use in authentication and set equality. J. Comput. Syst. Sci. 22, 265\u2013279 (1981)","journal-title":"J. Comput. Syst. Sci."},{"key":"641_CR25","unstructured":"Yuen, H.: On the foundations of quantum key distribution\u2014reply to Renner and beyond. arXiv:1210.2804v1 (2012)"}],"container-title":["Quantum Information Processing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11128-013-0641-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11128-013-0641-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11128-013-0641-6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,7,24]],"date-time":"2019-07-24T02:57:51Z","timestamp":1563937071000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11128-013-0641-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,9,20]]},"references-count":25,"journal-issue":{"issue":"10","published-print":{"date-parts":[[2014,10]]}},"alternative-id":["641"],"URL":"https:\/\/doi.org\/10.1007\/s11128-013-0641-6","relation":{},"ISSN":["1570-0755","1573-1332"],"issn-type":[{"value":"1570-0755","type":"print"},{"value":"1573-1332","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013,9,20]]}}}