{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T12:41:13Z","timestamp":1725540073549},"publisher-location":"Berlin, Heidelberg","reference-count":14,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642102295"},{"type":"electronic","value":"9783642102301"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-10230-1_1","type":"book-chapter","created":{"date-parts":[[2009,10,31]],"date-time":"2009-10-31T08:41:06Z","timestamp":1256978466000},"page":"1-22","source":"Crossref","is-referenced-by-count":0,"title":["Commitment and Authentication Systems"],"prefix":"10.1007","author":[{"given":"Alexandre","family":"Pinto","sequence":"first","affiliation":[]},{"given":"Andr\u00e9","family":"Souto","sequence":"additional","affiliation":[]},{"given":"Armando","family":"Matos","sequence":"additional","affiliation":[]},{"given":"Lu\u00eds","family":"Antunes","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"1_CR1","unstructured":"Anderson, I., Honkala, I.: A Short Course in Combinatorial Designs (Spring 1997), http:\/\/www.utu.fi\/~honkala\/designs.ps"},{"key":"1_CR2","first-page":"133","volume-title":"24th IEEE Spring Computer Conference","author":"M. Blum","year":"1982","unstructured":"Blum, M.: Coin flipping by telephone: a protocol for solving impossible problems. In: 24th IEEE Spring Computer Conference, pp. 133\u2013137. IEEE Press, Los Alamitos (1982)"},{"key":"1_CR3","doi-asserted-by":"crossref","unstructured":"Blundo, C., Masucci, B., Stinson, D.R., Wei, R.: Constructions and Bounds for Unconditionally Secure Non-Interactive Commitment Schemes. Designs, Codes and Cryptography\u00a026 (2002)","DOI":"10.1023\/A:1016501125022"},{"key":"1_CR4","doi-asserted-by":"publisher","DOI":"10.1002\/0471200611","volume-title":"Elements of Information Theory","author":"T.M. Cover","year":"1991","unstructured":"Cover, T.M., Thomas, J.A.: Elements of Information Theory. John Wiley & Sons, Chichester (1991)"},{"key":"1_CR5","first-page":"50","volume-title":"Finite Fields","author":"R. Lidl","year":"1983","unstructured":"Lidl, R., Niederreiter, H.: Finite Fields, pp. 50\u201351, 89\u201391. Cambridge University Press, Cambridge (1983)"},{"issue":"4","key":"1_CR6","doi-asserted-by":"publisher","first-page":"1350","DOI":"10.1109\/18.850674","volume":"46","author":"U. Maurer","year":"2000","unstructured":"Maurer, U.: Authentication theory and hypothesis testing. IEEE Transactions on Information Theory\u00a046(4), 1350\u20131356 (2000)","journal-title":"IEEE Transactions on Information Theory"},{"key":"1_CR7","unstructured":"McGrew, D., Viega, J.: The Galois\/Counter Mode of Operation (GCM). Submission to NIST Modes of Operation Process (January 2004)"},{"key":"1_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"87","DOI":"10.1007\/3-540-44828-4_11","volume-title":"Applied Algebra, Algebraic Algorithms and Error-Correcting Codes","author":"A.C.A. Nascimento","year":"2003","unstructured":"Nascimento, A.C.A., Otsuka, A., Imai, H., M\u00fcller-Quade, J.: Unconditionally Secure Homomorphic Pre-distributed Commitments. In: Fossorier, M.P.C., H\u00f8holdt, T., Poli, A. (eds.) AAECC 2003. LNCS, vol.\u00a02643, pp. 87\u201397. Springer, Heidelberg (2003)"},{"key":"1_CR9","unstructured":"Rivest, R.L. (ed.): Unconditionally Secure Commitment and Oblivious Transfer Schemes Using Private Channels and a Trusted Initializer (unpublished manuscript) (November 1999), http:\/\/citeseer.ifi.unizh.ch\/rivest99unconditionally.html"},{"key":"1_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"411","DOI":"10.1007\/3-540-39568-7_32","volume-title":"Advances in Cryptology","author":"G.J. Simmons","year":"1985","unstructured":"Simmons, G.J.: Authentication Theory \/ Coding Theory. In: Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol.\u00a0196, pp. 411\u2013431. Springer, Heidelberg (1985)"},{"key":"1_CR11","first-page":"161","volume":"45","author":"G.J. Simmons","year":"1984","unstructured":"Simmons, G.J.: Message authentication: a game on hypergraphs. Congressus Numerantium\u00a045, 161\u2013192 (1984)","journal-title":"Congressus Numerantium"},{"key":"1_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"269","DOI":"10.1007\/3-540-48184-2_25","volume-title":"Advances in Cryptology - CRYPTO \u201987","author":"G.J. Simmons","year":"1988","unstructured":"Simmons, G.J.: A Natural Taxonomy for Digital Information Authentication Schemes. In: Pomerance, C. (ed.) CRYPTO 1987. LNCS, vol.\u00a0293, pp. 269\u2013288. Springer, Heidelberg (1988)"},{"key":"1_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"62","DOI":"10.1007\/3-540-46766-1_4","volume-title":"Advances in Cryptology - CRYPTO \u201991","author":"D.R. Stinson","year":"1992","unstructured":"Stinson, D.R.: Combinatorial Characterization of Authentication Codes. In: Feigenbaum, J. (ed.) CRYPTO 1991. LNCS, vol.\u00a0576, pp. 62\u201373. Springer, Heidelberg (1992)"},{"key":"1_CR14","series-title":"Lecture Notes in Computer Science","first-page":"418","volume-title":"Advances in Cryptology - CRYPTO \u201986","author":"D.R. Stinson","year":"1987","unstructured":"Stinson, D.R.: Some Constructions and Bounds for Authentication Codes. In: Odlyzko, A.M. (ed.) CRYPTO 1986. LNCS, vol.\u00a0263, pp. 418\u2013425. Springer, Heidelberg (1987)"}],"container-title":["Lecture Notes in Computer Science","Information Theoretic Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-10230-1_1.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,23]],"date-time":"2020-11-23T21:52:25Z","timestamp":1606168345000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-10230-1_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642102295","9783642102301"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-10230-1_1","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2009]]}}}