{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,26]],"date-time":"2026-03-26T11:16:22Z","timestamp":1774523782142,"version":"3.50.1"},"reference-count":21,"publisher":"Springer Science and Business Media LLC","issue":"11","license":[{"start":{"date-parts":[[2011,5,25]],"date-time":"2011-05-25T00:00:00Z","timestamp":1306281600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Sci. China Inf. Sci."],"published-print":{"date-parts":[[2011,11]]},"DOI":"10.1007\/s11432-011-4289-5","type":"journal-article","created":{"date-parts":[[2011,5,25]],"date-time":"2011-05-25T04:01:19Z","timestamp":1306296079000},"page":"2247-2255","source":"Crossref","is-referenced-by-count":3,"title":["CBCR: CBC MAC with rotating transformations"],"prefix":"10.1007","volume":"54","author":[{"given":"LiTing","family":"Zhang","sequence":"first","affiliation":[]},{"given":"WenLing","family":"Wu","sequence":"additional","affiliation":[]},{"given":"Lei","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Peng","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2011,5,25]]},"reference":[{"key":"4289_CR1","unstructured":"ANSI X9.19, Financial Institution Retail Message Authentication. American Bankers Association, August 13, 1986"},{"key":"4289_CR2","doi-asserted-by":"crossref","unstructured":"Kent S. IP Authentication Header. RFC 4302, standards track, the Internet Society. 2005","DOI":"10.17487\/rfc4302"},{"key":"4289_CR3","doi-asserted-by":"crossref","first-page":"567","DOI":"10.1007\/s11432-010-0056-2","volume":"53","author":"J. W. Zhang","year":"2010","unstructured":"Zhang J W, Ma J F, Moon S J. Universally composable one-time signature and broadcast authentication. Sci China Inf Sci, 2010, 53: 567\u2013580","journal-title":"Sci China Inf Sci"},{"key":"4289_CR4","unstructured":"Special Publication 800-38B. Recommendation for Block Cipher Modes of Operation: The CMAC Mode for Authentication. National Institute of Standards and Technology, 2005"},{"key":"4289_CR5","series-title":"LNCS","first-page":"1","volume-title":"CRYPTO 96","author":"M. Bellare","year":"1996","unstructured":"Bellare M, Canetti R, Krawczyk H. Keying hash functions for message authentication. In: Koblitz N, ed. CRYPTO 96. LNCS 1109. Berlin: Springer, 1996. 1\u201315"},{"key":"4289_CR6","series-title":"LNCS","first-page":"216","volume-title":"CRYPTO 99","author":"J. Black","year":"1999","unstructured":"Black J, Halevi S, Krawczyk H, et al. UMAC: Fast and secure message authentication. In: Wiener M J, ed. CRYPTO 99, LNCS 1666. Berlin: Springer, 1999. 216\u2013233"},{"key":"4289_CR7","series-title":"LNCS","first-page":"32","volume-title":"FSE 05","author":"D. J. Bernstein","year":"2005","unstructured":"Bernstein D J. The Poly1305-AES message-authentication code. In: Gilbert H, Handschuh H, eds. FSE 05, LNCS 3557. Berlin: Springer, 2005. 32\u201349"},{"key":"4289_CR8","unstructured":"ISO 8731-2. Banking\u2014Approved Algorithms for Message Authentication-Part 2: Message Authenticator Algorithm. Second Edition [Replaced by: ISO 16609 2004]"},{"key":"4289_CR9","unstructured":"FIPS 113. Computer Data Authentication. National Institute of Standards and Technology, 1985"},{"key":"4289_CR10","series-title":"LNCS","first-page":"341","volume-title":"CRYPTO 94","author":"M. Bellare","year":"1994","unstructured":"Bellare M, Kilian J, Rogaway P. The security of cipher block chaining. In: Desmedt Y, ed. CRYPTO 94, LNCS 839. Berlin: Springer, 1994. 341\u2013358"},{"key":"4289_CR11","doi-asserted-by":"crossref","first-page":"315","DOI":"10.1007\/s001450010009","volume":"13","author":"E. Petrank","year":"2000","unstructured":"Petrank E, Rackoff C. CBC MAC for real-time data sources. J Crypt, 2000, 13: 315\u2013338","journal-title":"J Crypt"},{"key":"4289_CR12","series-title":"LNCS","first-page":"197","volume-title":"CRYPTO 00","author":"J. Black","year":"2000","unstructured":"Black J, Rogaway P. CBC MACs for arbitrary-length messages: the three-key constructions. In: Bellare M, ed. CRYPTO 00, LNCS 1880. Berlin: Springer, 2000. 197\u2013215"},{"key":"4289_CR13","series-title":"LNCS","first-page":"33","volume-title":"CT-RSA 03","author":"K. Kurosawa","year":"2003","unstructured":"Kurosawa K, Iwata T. TMAC: Two-key CBC MAC. In: Joye M, ed. CT-RSA 03, LNCS 2612. Berlin: Springer, 2003. 33\u201349"},{"key":"4289_CR14","series-title":"LNCS","first-page":"129","volume-title":"FSE 03","author":"T. Iwata","year":"2003","unstructured":"Iwata T, Kurosawa K. OMAC: One-key CBC MAC. In: Johansson T, ed. FSE 03, LNCS 2887. Berlin: Springer, 2003. 129\u2013153"},{"key":"4289_CR15","series-title":"LNCS","first-page":"375","volume-title":"FSE 09","author":"M. Nandi","year":"2009","unstructured":"Nandi M. Fast and secure CBC-type MAC algorithms. In: Dunkelman O, ed. FSE 09, LNCS 5665. Berlin: Springer, 2009. 375\u2013393"},{"key":"4289_CR16","unstructured":"3GPP TS 35.201. Specification of the 3GPP Confidentiality and Integrity Algorithms; Document 1: f8 and f9 Specifications, available at http:\/\/www.3gpp.org\/specifications , 2009"},{"key":"4289_CR17","doi-asserted-by":"crossref","first-page":"423","DOI":"10.1016\/S1389-1286(01)00164-5","volume":"36","author":"J. Borst","year":"2001","unstructured":"Borst J, Preneel B, Rijmen V. Cryptography on smart cards. Comput Netw, 2001, 36: 423\u2013435","journal-title":"Comput Netw"},{"key":"4289_CR18","series-title":"LNCS","first-page":"472","volume-title":"ICALP 05","author":"U. M. Maurer","year":"2005","unstructured":"Maurer U M, Sj\u00f6din J. Single-key AIL-MACs from any FIL-MAC. In: Caires L, Italiano G F, Monteiro L, et al., eds. ICALP 05, LNCS 3580. Berlin: Springer, 2005. 472\u2013484"},{"key":"4289_CR19","doi-asserted-by":"crossref","unstructured":"Bellare M, Desai A, Jokipii E, et al. A concrete security treatment of symmetric encryption. In: Proceedings of the 38th Annual Symposium on Foundations of Computer Science, 1997. 394\u2013403","DOI":"10.1109\/SFCS.1997.646128"},{"key":"4289_CR20","series-title":"LNCS","first-page":"409","volume-title":"EUROCRYPT 06","author":"M. Bellare","year":"2006","unstructured":"Bellare M, Rogaway P. The security of triple encryption and a framework for code-based game-playing proofs. In: Vaudenay S, ed. EUROCRYPT 06, LNCS 4004. Berlin: Springer, 2006. 409\u2013426"},{"key":"4289_CR21","unstructured":"Shoup V. Sequences of games: A tool for taming complexity in security proofs. Cryptology ePrint Archive, Report 2004\/332, 2004"}],"container-title":["Science China Information Sciences"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11432-011-4289-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11432-011-4289-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11432-011-4289-5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,5]],"date-time":"2025-03-05T20:08:32Z","timestamp":1741205312000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11432-011-4289-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,5,25]]},"references-count":21,"journal-issue":{"issue":"11","published-print":{"date-parts":[[2011,11]]}},"alternative-id":["4289"],"URL":"https:\/\/doi.org\/10.1007\/s11432-011-4289-5","relation":{},"ISSN":["1674-733X","1869-1919"],"issn-type":[{"value":"1674-733X","type":"print"},{"value":"1869-1919","type":"electronic"}],"subject":[],"published":{"date-parts":[[2011,5,25]]}}}