{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,2]],"date-time":"2025-08-02T19:06:14Z","timestamp":1754161574535,"version":"3.41.2"},"reference-count":23,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[1998,10,1]],"date-time":"1998-10-01T00:00:00Z","timestamp":907200000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[1998,10,1]],"date-time":"1998-10-01T00:00:00Z","timestamp":907200000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Designs, Codes and Cryptography"],"published-print":{"date-parts":[[1998,10]]},"DOI":"10.1023\/a:1008277509057","type":"journal-article","created":{"date-parts":[[2002,12,22]],"date-time":"2002-12-22T08:47:34Z","timestamp":1040546854000},"page":"67-86","source":"Crossref","is-referenced-by-count":6,"title":["Multiround Unconditionally Secure Authentication"],"prefix":"10.1007","volume":"15","author":[{"given":"Christian","family":"Gehrmann","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"168582_CR1","unstructured":"G.J. Simmons, A survey of Information Authentication, Contemporary Cryptology, The Science of Information Integrity, IEEE Press (1992)."},{"key":"168582_CR2","series-title":"Lecture Notes on Computer Science","doi-asserted-by":"crossref","first-page":"411","DOI":"10.1007\/3-540-39568-7_32","volume-title":"Proceedings ofCRY PTO 3'84","author":"G.J. Simmons","year":"1985","unstructured":"G.J. Simmons, Authentication theory\/coding theory, Proceedings ofCRY PTO\n3'84, Springer-Verlag, New York, Lecture Notes on Computer Science, 196, (1985) pp. 411-431."},{"issue":"4","key":"168582_CR3","doi-asserted-by":"crossref","first-page":"1181","DOI":"10.1109\/18.86970","volume":"37","author":"R. Johannesson","year":"1991","unstructured":"R. Johannesson and A. Sgarro, A strengthening of Simmons\u2019 bound on impersonation, IEEE Trans. on Information Theory, Vol. 37, No.4 (1991) pp. 1181-1185.","journal-title":"IEEE Trans. on Information Theory"},{"key":"168582_CR4","first-page":"141","volume":"43","author":"E.F. Brickell","year":"1984","unstructured":"E.F. Brickell, A few results in message authentication, Congresus Numerantium, Vol. 43 (1984) pp. 141-154.","journal-title":"Congresus Numerantium"},{"issue":"2","key":"168582_CR5","doi-asserted-by":"crossref","first-page":"566","DOI":"10.1109\/18.485725","volume":"42","author":"G. Kabatianskii","year":"1996","unstructured":"G. Kabatianskii, B. Smeets, T. Johansson, On the cardinality of systematic A-codes via error correcting codes, IEEE Trans. on Information Theory, Vol. 42, No.2 (1996) pp. 566-578.","journal-title":"IEEE Trans. on Information Theory"},{"issue":"3","key":"168582_CR6","doi-asserted-by":"crossref","first-page":"405","DOI":"10.1002\/j.1538-7305.1974.tb02751.x","volume":"53","author":"E. Gilbert","year":"1974","unstructured":"E. Gilbert, F.J. MacWilliams, N. Sloane, Codes Which Detect Deception, Bell System Technical Journal, Vol. 53, No.3 (1974) pp. 405-424.","journal-title":"Bell System Technical Journal"},{"key":"168582_CR7","doi-asserted-by":"crossref","first-page":"265","DOI":"10.1016\/0022-0000(81)90033-7","volume":"22","author":"J.L. Carter","year":"1981","unstructured":"J.L. Carter, M.N. Wegman, New hash functions and their use in authentication and set equality, J. Computer and System Sci., Vol 22, (1981) pp. 265-279.","journal-title":"J. Computer and System Sci."},{"issue":"4","key":"168582_CR8","doi-asserted-by":"crossref","first-page":"369","DOI":"10.1007\/BF01388651","volume":"4","author":"D.R. Stinson","year":"1994","unstructured":"D.R. Stinson, Universal hashing and authentication codes, Designs, Codes and Cryptography, Vol. 4, No.4 (1994) pp. 369-380.","journal-title":"Designs, Codes and Cryptography"},{"key":"168582_CR9","series-title":"Lecture Notes in Computer Science","first-page":"331","volume-title":"Proceedings of CRYPTO\u2019 93","author":"J. Bierbrauer","year":"1993","unstructured":"J. Bierbrauer, T. Johansson, G. Kabatianskii, B. Smeets, On Families of Hash Functions via Geometric Codes and Concatenation, Proceedings of CRYPTO\u2019 93, Springer Verlag, New York, Lecture Notes in Computer Science 839, (1993) pp. 331-342."},{"key":"168582_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"31","DOI":"10.1007\/3-540-68697-5_3","volume-title":"Proceedings of CRYPTO\u2019 96","author":"T. Helleseth","year":"1996","unstructured":"T. Helleseth, T. Johansson, Universal Hash Functions from Exponential Sums over Finite Fields and Galois Rings, Proceedings of CRYPTO\u2019 96, Springer Verlag, New York, Lecture Notes in Computer Science 1109 (1996) pp. 31-44."},{"key":"168582_CR11","series-title":"Lecture Notes in Computer Science","first-page":"355","volume-title":"Proceedings of CRYPTO\u2019 93","author":"P. Gemmell","year":"1993","unstructured":"P. Gemmell, M. Naor, Codes for interactive authentication, Proceedings of CRYPTO\u2019 93, Springer Verlag, New York, Lecture Notes in Computer Science 773 (1993) pp. 355-367."},{"key":"168582_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"121","DOI":"10.1007\/3-540-48658-5_14","volume-title":"Proceedings of CRYPTO\u2019 94","author":"C. Gehrmann","year":"1994","unstructured":"C. Gehrmann, Cryptanalysis of the Gemmell and Naor Multiround Authentication Protocol, Proceedings of CRYPTO\u2019 94, Springer Verlag, New York, Lecture Notes in Computer Science 839 (1994) pp. 121-128."},{"key":"168582_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"158","DOI":"10.1007\/3-540-49264-X_13","volume-title":"Proceedings of Eurocrypt\u2019 95","author":"C. Gehrmann","year":"1995","unstructured":"C. Gehrmann, Secure multiround authentication protocols, Proceedings of Eurocrypt\u2019 95, Springer Verlag, New York, Lecture Notes in Computer Science 921 (1995) pp. 158-167."},{"key":"168582_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"341","DOI":"10.1007\/3-540-48658-5_32","volume-title":"Proceedings of CRYPTO\u2019 94","author":"M. Bellare","year":"1994","unstructured":"M. Bellare, J. Kilian, and P. Rogaway, The security of cipher block chaining, Proceedings of CRYPTO\u2019 94, Springer Verlag, New York, Lecture Notes in Computer Science 839 (1994) pp. 341-358."},{"key":"168582_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"29","DOI":"10.1007\/3-540-44750-4_3","volume-title":"Proceedings of CRYPTO\u2019 95","author":"P. Rogaway","year":"1995","unstructured":"P. Rogaway, Bucket Hashing and its Application to Fast Message Authentication, Proceedings of CRYPTO\u2019 95, Springer Verlag, New York, Lecture Notes in Computer Science 963 (1995) pp. 29-42, 1995."},{"key":"168582_CR16","first-page":"65","volume":"2","author":"B. den Boer","year":"1993","unstructured":"B. den Boer, A simple and key-economical unconditionally secure authentication scheme, Journal fo Computer Security, Vol. 2 (1993) pp. 65-71.","journal-title":"Journal fo Computer Security"},{"key":"168582_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"190","DOI":"10.1007\/BFb0052346","volume-title":"Proceedings of FSE4","author":"V. Afanassiev","year":"1997","unstructured":"V. Afanassiev, C. Gehrmann, B. Smeets, Low Complexity Polynomial Evaluation for Fast Message Authentication, Proceedings of FSE4, Springer Verlag, New York, Lecture Notes in Computer Science 1267 (1997) pp. 190-204."},{"key":"168582_CR18","series-title":"Lecture Notes in Computer Science","first-page":"1","volume-title":"Proceedings of Eurocrypt\u2019 93","author":"T. Johansson","year":"1993","unstructured":"T. Johansson, G. Kabatianskii, B. Smeets, On the relation between A-codes and codes correcting independent errors, Proceedings of Eurocrypt\u2019 93, Springer Verlag, New York, Lecture Notes in Computer Science 765 (1993) pp. 1-11."},{"key":"168582_CR19","doi-asserted-by":"crossref","unstructured":"T. Johansson, Contribution to Unconditionally Secure Authentication, Ph. D. thesis, Lund, (1994).","DOI":"10.1007\/BF01388561"},{"key":"168582_CR20","doi-asserted-by":"crossref","first-page":"300","DOI":"10.1137\/0108018","volume":"8","author":"I.S. Reed","year":"1960","unstructured":"I.S. Reed, G. Solomon, Polynomial Codes over certain Finite Fields, J. Soc. Ind. Appl. Math., Vol. 8 (1960) pp. 300-304.","journal-title":"J. Soc. Ind. Appl. Math."},{"issue":"1\/2","key":"168582_CR21","doi-asserted-by":"crossref","first-page":"83","DOI":"10.1023\/A:1018048713377","volume":"7","author":"R. Safavi-Naini","year":"1996","unstructured":"R. Safavi-Naini and L. Tombak, Authentication Codes in Plaintext and Chosen-Content Attacks, Designs, Codes and Cryptography, Vol. 7, No.1\/2 (1996) pp. 83-99.","journal-title":"Designs, Codes and Cryptography"},{"key":"168582_CR22","unstructured":"F.J. Mac Williams, N. Sloane The Theory of Error-Correcting Codes, North-Holland, (1977)."},{"key":"168582_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"16","DOI":"10.1007\/3-540-68697-5_2","volume-title":"Proceedings of CRYPTO\u2019 96","author":"M. Atici","year":"1996","unstructured":"M. Atici and D. R. Stinson Universal Hashing and Multiple Authentication, Proceedings of CRYPTO\u2019 96, Springer Verlag, New York, Lecture Notes in Computer Science 1109 (1996) pp. 16-30."}],"container-title":["Designs, Codes and Cryptography"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1023\/A:1008277509057.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1023\/A:1008277509057\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1023\/A:1008277509057.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,29]],"date-time":"2025-07-29T03:05:42Z","timestamp":1753758342000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1023\/A:1008277509057"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1998,10]]},"references-count":23,"journal-issue":{"issue":"1","published-print":{"date-parts":[[1998,10]]}},"alternative-id":["168582"],"URL":"https:\/\/doi.org\/10.1023\/a:1008277509057","relation":{},"ISSN":["0925-1022","1573-7586"],"issn-type":[{"type":"print","value":"0925-1022"},{"type":"electronic","value":"1573-7586"}],"subject":[],"published":{"date-parts":[[1998,10]]}}}