{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T20:02:07Z","timestamp":1725480127277},"publisher-location":"Boston, MA","reference-count":17,"publisher":"Springer US","isbn-type":[{"type":"print","value":"9781475706048"},{"type":"electronic","value":"9781475706024"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1983]]},"DOI":"10.1007\/978-1-4757-0602-4_7","type":"book-chapter","created":{"date-parts":[[2013,4,16]],"date-time":"2013-04-16T21:14:41Z","timestamp":1366146881000},"page":"79-86","source":"Crossref","is-referenced-by-count":38,"title":["On Computationally Secure Authentication Tags Requiring Short Secret Shared Keys"],"prefix":"10.1007","author":[{"given":"Gilles","family":"Brassard","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"7_CR1","first-page":"265","volume":"22","author":"MN Wegman","year":"1981","unstructured":"M.N. Wegman and J.L. Carter, New Hash Functions and Their Use in Authentication and set Equality, JCSS, 22: 265 (1981).","journal-title":"New Hash Functions and Their Use in Authentication and set Equality, JCSS"},{"doi-asserted-by":"crossref","unstructured":"W. Diffie and M.E. Hellman, New Directions in Cryptography, IEEE Trans. Info. Th., IT-22: 644 (1976).","key":"7_CR2","DOI":"10.1109\/TIT.1976.1055638"},{"key":"7_CR3","first-page":"120","volume":"21","author":"RL Rivest","year":"1978","unstructured":"R.L. Rivest, A. Shamir and L. Adleman, On Digital Signature and Public-Key Cryptosystems, CACM, 21: 120 (1978).","journal-title":"On Digital Signature and Public-Key Cryptosystems, CACM"},{"key":"7_CR4","volume-title":"A Polynomial-Time Algorithm for Breaking the Basic Merkle-Hellman Cryptosystem, in: \u201cProc. of 23rd FOCS Symposium","author":"A Shamir","year":"1982","unstructured":"A. Shamir, A Polynomial-Time Algorithm for Breaking the Basic Merkle-Hellman Cryptosystem, in: \u201cProc. of 23rd FOCS Symposium, Chicago,\u201d IEEE, New York (1982)."},{"key":"7_CR5","volume-title":"On Breaking the Iterated Knapsack Public-Key Cryptosystem, presented at: \u201cAMS Workshop on Probabilistic Computational Com- plexity","author":"L Adleman","year":"1982","unstructured":"L. Adleman, On Breaking the Iterated Knapsack Public-Key Cryptosystem, presented at: \u201cAMS Workshop on Probabilistic Computational Com- plexity, Durham,\u201d A. Meyer, chair. (1982)."},{"doi-asserted-by":"crossref","unstructured":"R. Merkle and M.E. Hellman, Hiding Information and Receipts in Trap-Door Knapsacks, IEEE Trans. Info. th., IT-24: 525 (1978).","key":"7_CR6","DOI":"10.1109\/TIT.1978.1055927"},{"key":"7_CR7","volume-title":"Digitalized Signatures and Public-Key Functions as Intractable as Factorization MIT\/LCS\/TR-212","author":"MO Rabin","year":"1979","unstructured":"M.O. Rabin, Digitalized Signatures and Public-Key Functions as Intractable as Factorization, MIT\/LCS\/TR-212 (1979)."},{"key":"7_CR8","volume-title":"Probabilistic Encryption How to Play Mental Poker Keeping Secret all Partial Information, in: \u201cProc. of 14th STOC Symposium","author":"S Goldwasser","year":"1982","unstructured":"S. Goldwasser and S. Micali, Probabilistic Encryption How to Play Mental Poker Keeping Secret all Partial Information, in: \u201cProc. of 14th STOC Symposium, San Francisco,\u201d ACM, New York (1982)."},{"key":"7_CR9","volume-title":"On Authentication, Digital Signatures and Contracts in Presence of Meddler, in: \u201cAdvances in Cryptography: Proceedings of CRYPTO 82,\u201d R. Rivest, ed.","author":"S Goldwasser","year":"1983","unstructured":"S. Goldwasser, S. Micali and A. Yao, On Authentication, Digital Signatures and Contracts in Presence of Meddler, in: \u201cAdvances in Cryptography: Proceedings of CRYPTO 82,\u201d R. Rivest, ed., Plenum Press, New York (1983)."},{"unstructured":"National Bureau of Standards, Federal Information Processing Standards Publication no. 46.","key":"7_CR10"},{"key":"7_CR11","volume-title":"How to Generate Cryptographically Strong Sequences of Pseudo Random Bits, in: \u201cProc. of 23rd FOCS Symposium","author":"M Blum","year":"1982","unstructured":"M. Blum and S. Micali, How to Generate Cryptographically Strong Sequences of Pseudo Random Bits, in: \u201cProc. of 23rd FOCS Symposium, Chicago,\u201d IEEE, New York (1982)."},{"key":"7_CR12","volume-title":"Theory and Application of Trapdoor Functions, in: \u201cProc. of 23rd FOCS Symposium","author":"A Yao","year":"1982","unstructured":"A. Yao, Theory and Application of Trapdoor Functions, in: \u201cProc. of 23rd FOCS Symposium, Chicago,\u201d IEEE, New York (1982)."},{"key":"7_CR13","first-page":"100","volume":"14","author":"RR Coveyou","year":"1967","unstructured":"R.R. Coveyou and R.D. MacPherson, Fourier Analysis of Uniform Random Number Generators, JACM, 14: 100 (1967).","journal-title":"Fourier Analysis of Uniform Random Number Generators, JACM"},{"key":"7_CR14","first-page":"694","volume":"208","author":"GB Kolata","year":"1980","unstructured":"G.B. Kolata, New Codes Coming into Use, Science Magazine, 208: 694 (1980).","journal-title":"New Codes Coming into Use, Science Magazine"},{"key":"7_CR15","volume-title":"Quantum Cryptography, or Unforgeable Subway Tokens, in: \u201cAdvances in Cryptography: Proceedings of CRYPTO 82,\u201d R. Rivest, ed.","author":"CH Bennett","year":"1983","unstructured":"C.H. Bennett, G. Brassard, S. Breidbart and S. Weisner, Quantum Cryptography, or Unforgeable Subway Tokens, in: \u201cAdvances in Cryptography: Proceedings of CRYPTO 82,\u201d R. Rivest, ed., Plenum Press, New York (1983)."},{"key":"7_CR16","volume-title":"A Simple Secure Pseudo-Random Number Generator, in: \u201cAdvances in Cryptography: Proceedings of CRYPTO 82,\u201d R. Rivest, ed.","author":"L Blum","year":"1983","unstructured":"L. Blum, M. Blum and M. Shub, A Simple Secure Pseudo-Random Number Generator, in: \u201cAdvances in Cryptography: Proceedings of CRYPTO 82,\u201d R. Rivest, ed., Plenum Press, New York (1983)."},{"key":"7_CR17","volume-title":"How to Establish a Private Code on a Public Network, in: \u201cProc. of 23rd FOCS Symposium","author":"S Goldwasser","year":"1982","unstructured":"S. Goldwasser, S. Miceli and P. Tong, How to Establish a Private Code on a Public Network, in: \u201cProc. of 23rd FOCS Symposium, Chicago,\u201d IEEE, New York (1982)."}],"container-title":["Advances in Cryptology"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-1-4757-0602-4_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,7,12]],"date-time":"2019-07-12T17:06:22Z","timestamp":1562951182000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-1-4757-0602-4_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1983]]},"ISBN":["9781475706048","9781475706024"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-1-4757-0602-4_7","relation":{},"subject":[],"published":{"date-parts":[[1983]]}}}