{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,22]],"date-time":"2026-01-22T05:32:00Z","timestamp":1769059920033,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":20,"publisher":"ACM","license":[{"start":{"date-parts":[[2008,3,18]],"date-time":"2008-03-18T00:00:00Z","timestamp":1205798400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2008,3,18]]},"DOI":"10.1145\/1368310.1368317","type":"proceedings-article","created":{"date-parts":[[2008,5,15]],"date-time":"2008-05-15T18:35:39Z","timestamp":1210876539000},"page":"21-32","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":21,"title":["HMAC is a randomness extractor and applications to TLS"],"prefix":"10.1145","author":[{"given":"Pierre-Alain","family":"Fouque","sequence":"first","affiliation":[{"name":"ENS -- CNRS -- INRIA, Paris, France"}]},{"given":"David","family":"Pointcheval","sequence":"additional","affiliation":[{"name":"CNRS -- ENS -- INRIA, Paris, France"}]},{"given":"S\u00e9bastien","family":"Zimmer","sequence":"additional","affiliation":[{"name":"ENS -- CNRS -- INRIA, Paris, France"}]}],"member":"320","published-online":{"date-parts":[[2008,3,18]]},"reference":[{"key":"e_1_3_2_1_1_1","series-title":"LNCS","first-page":"166","volume-title":"C. D. Walter, \u00c7etin Kaya Ko\u00e7, and C","author":"Barak B.","year":"2003"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1007\/11818175_36"},{"key":"e_1_3_2_1_3_1","volume-title":"Crypto '96, LNCS 1109","author":"Bellare M.","year":"1996"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"crossref","unstructured":"M. Bellare R. Canetti and H. Krawczyk. Message authentication using hash functions: the hmac construction. RSA Laboratories' Cryptobytes 2(1) Spring 1996.  M. Bellare R. Canetti and H. Krawczyk. Message authentication using hash functions: the hmac construction. RSA Laboratories' Cryptobytes 2(1) Spring 1996.","DOI":"10.1007\/3-540-68697-5_1"},{"key":"e_1_3_2_1_5_1","unstructured":"M. Bellare R. Cannetti and H. Krawczyk. HMAC: keyed-hashing for message authentication february 1997. RFC 2104 Available from http:\/\/www.ietf.org\/rfc.html.  M. Bellare R. Cannetti and H. Krawczyk. HMAC: keyed-hashing for message authentication february 1997. RFC 2104 Available from http:\/\/www.ietf.org\/rfc.html."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11856-000-1270-1"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1112\/S002461079900736X"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/11745853_27"},{"key":"e_1_3_2_1_9_1","unstructured":"Q. Dang and T. Polk. Hash-based key derivation function (hkd). draft-dang-nistkdf-01.txt June 2006.  Q. Dang and T. Polk. Hash-based key derivation function (hkd). draft-dang-nistkdf-01.txt June 2006."},{"key":"e_1_3_2_1_10_1","volume-title":"Internet Activities Board","author":"Dierks T.","year":"1999"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"crossref","unstructured":"T. Dierks and E. Rescorla. The Transport Layer Security (TLS) protocol version 1.2 July 2007. Internet Request for Comment RFC 4346 bis Internet Engineering Task Force.  T. Dierks and E. Rescorla. The Transport Layer Security (TLS) protocol version 1.2 July 2007. Internet Request for Comment RFC 4346 bis Internet Engineering Task Force.","DOI":"10.17487\/rfc5246"},{"key":"e_1_3_2_1_12_1","first-page":"494","volume-title":"Crypto '04, LNCS","author":"Dodis Y.","year":"2004"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/11787006_21"},{"key":"e_1_3_2_1_14_1","first-page":"361","volume-title":"Eurocrypt '04, LNCS 3027","author":"Gennaro R.","year":"2004"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1137\/S0097539793244708"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.1989.63486"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"crossref","unstructured":"J.\n       \n      Jonsson\n     and \n      \n      \n      B. S.\n       \n      Kaliski\n        \n      Jr\n      \n  \n  . \n  On the security of RSA encryption in TLS. In M. Yung editor CRYPTO\n   \n  2002 volume \n  2442\n   of \n  LNCS pages \n  127\n  --\n  142\n  . \n  Springer Aug. 2002.   J. Jonsson and B. S. Kaliski Jr. On the security of RSA encryption in TLS. In M. Yung editor CRYPTO 2002 volume 2442 of LNCS pages 127--142. Springer Aug. 2002.","DOI":"10.1007\/3-540-45708-9_9"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"crossref","unstructured":"C. Kaufman. RFC 4306: Internet Key Exchange (IKEv2) protocol Dec. 2005.  C. Kaufman. RFC 4306: Internet Key Exchange (IKEv2) protocol Dec. 2005.","DOI":"10.17487\/rfc4306"},{"key":"e_1_3_2_1_19_1","unstructured":"Recommendations for pair-wise key establishment schemes using discrete logarithm cryptography (revised). NIST Special Publications 800--56A Mar. 2007.  Recommendations for pair-wise key establishment schemes using discrete logarithm cryptography (revised). NIST Special Publications 800--56A Mar. 2007."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.5555\/1111205"}],"event":{"name":"Asia CCS '08: Asia CCS'08 ACM Symposium on Information, Computer and Communications Security","location":"Tokyo Japan","acronym":"Asia CCS '08","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2008 ACM symposium on Information, computer and communications security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1368310.1368317","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1368310.1368317","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T13:57:46Z","timestamp":1750255066000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1368310.1368317"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,3,18]]},"references-count":20,"alternative-id":["10.1145\/1368310.1368317","10.1145\/1368310"],"URL":"https:\/\/doi.org\/10.1145\/1368310.1368317","relation":{},"subject":[],"published":{"date-parts":[[2008,3,18]]},"assertion":[{"value":"2008-03-18","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}