{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T21:21:40Z","timestamp":1740172900586,"version":"3.37.3"},"reference-count":9,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2023,3,21]],"date-time":"2023-03-21T00:00:00Z","timestamp":1679356800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,3,21]],"date-time":"2023-03-21T00:00:00Z","timestamp":1679356800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Comput Virol Hack Tech"],"DOI":"10.1007\/s11416-023-00475-0","type":"journal-article","created":{"date-parts":[[2023,3,21]],"date-time":"2023-03-21T18:02:59Z","timestamp":1679421779000},"page":"231-235","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["MGM beyond the birthday bound"],"prefix":"10.1007","volume":"20","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-1473-2195","authenticated-orcid":false,"given":"Alexey","family":"Kurochkin","sequence":"first","affiliation":[]},{"given":"Denis","family":"Fomin","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,3,21]]},"reference":[{"key":"475_CR1","first-page":"36","volume":"2017","author":"V Nozdrunov","year":"2017","unstructured":"Nozdrunov, V.: Parallel and double block cipher mode of operation (PD-mode) for authenticated encryption. CTCrypt Pre-proc. 2017, 36\u201345 (2017)","journal-title":"CTCrypt Pre-proc."},{"key":"475_CR2","unstructured":"Nozdrunov, V., Shishkin, V.: Multilinear galois mode (MGM), CFRG draft (2018). https:\/\/datatracker.ietf.org\/doc\/draft-smyshlyaev-mgm"},{"key":"475_CR3","unstructured":"Federal Agency on Technical Regulating and Metrology, Recommendations for standardization P 1323565.1.026-2019. Cryptographic protection of information. Authentication encryption modes of block ciphers (2019). (in Russian)"},{"key":"475_CR4","unstructured":"Akhmetzyanova, L., Alekseev, E., Karpunin, G., Nozdrunov, V.: Security of multilinear galois mode (MGM), cryptology ePrint archive, 2019\/123 (2019). https:\/\/eprint.iacr.org\/2019\/123"},{"key":"475_CR5","doi-asserted-by":"crossref","unstructured":"Datta, N., Dutta, A., Nandi, M., Paul, G., Zhang, L.: Single key variant of PMAC_Plus. IACR Trans. Symm. Cryptol. 268\u2013305 (2017)","DOI":"10.46586\/tosc.v2017.i4.268-305"},{"key":"475_CR6","doi-asserted-by":"crossref","unstructured":"Iwata, T., Minematsu, K.: Stronger security variants of GCM-SIV.ACR Trans. Symm. Cryptol. 134\u2013157 (2016). http:\/\/tosc.iacr.org\/index.php\/ToSC\/article\/view\/539","DOI":"10.46586\/tosc.v2016.i1.134-157"},{"key":"475_CR7","doi-asserted-by":"crossref","unstructured":"Yasuda, K.: The sum of CBC MACs is a secure PRF. In: Pieprzyk, J. (ed.) LNCS, RSA, vol. 5985, pp. 366\u2013381 (2010)","DOI":"10.1007\/978-3-642-11925-5_25"},{"key":"475_CR8","doi-asserted-by":"crossref","unstructured":"Yasuda, K.: A new variant of PMAC: beyond the birthday bound. In: Rogaway, P. (ed.) LNCS, CRYPTO, vol. 6841, pp. 596\u2013609 (2011)","DOI":"10.1007\/978-3-642-22792-9_34"},{"key":"475_CR9","doi-asserted-by":"crossref","unstructured":"Zhang, L., Wu, W., Sui, H., Wang, P.: Enhancing 3GPP-MAC beyond the birthday bound. In: Wang, X., Sako, K. (eds.) LNCS, ASIACRYPT, vol. 7658, pp. 296\u2013312 (2012)","DOI":"10.1007\/978-3-642-34961-4_19"}],"container-title":["Journal of Computer Virology and Hacking Techniques"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11416-023-00475-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11416-023-00475-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11416-023-00475-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,4,18]],"date-time":"2024-04-18T18:11:33Z","timestamp":1713463893000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11416-023-00475-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,3,21]]},"references-count":9,"journal-issue":{"issue":"2","published-online":{"date-parts":[[2024,6]]}},"alternative-id":["475"],"URL":"https:\/\/doi.org\/10.1007\/s11416-023-00475-0","relation":{},"ISSN":["2263-8733"],"issn-type":[{"type":"electronic","value":"2263-8733"}],"subject":[],"published":{"date-parts":[[2023,3,21]]},"assertion":[{"value":"14 July 2022","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"26 February 2023","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"21 March 2023","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"Not applicable.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}