{"id":"https://openalex.org/W2083681472","doi":"https://doi.org/10.1142/s1793830911001292","title":"BREAKING AND REPAIRING AN APPROXIMATE MESSAGE AUTHENTICATION SCHEME","display_name":"BREAKING AND REPAIRING AN APPROXIMATE MESSAGE AUTHENTICATION SCHEME","publication_year":2011,"publication_date":"2011-09-01","ids":{"openalex":"https://openalex.org/W2083681472","doi":"https://doi.org/10.1142/s1793830911001292","mag":"2083681472"},"language":"en","primary_location":{"id":"doi:10.1142/s1793830911001292","is_oa":false,"landing_page_url":"https://doi.org/10.1142/s1793830911001292","pdf_url":null,"source":{"id":"https://openalex.org/S178434951","display_name":"Discrete Mathematics Algorithms and Applications","issn_l":"1793-8309","issn":["1793-8309","1793-8317"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319815","host_organization_name":"World Scientific","host_organization_lineage":["https://openalex.org/P4310319815"],"host_organization_lineage_names":["World Scientific"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Discrete Mathematics, Algorithms and Applications","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":null,"display_name":"DONGVU TONIEN","orcid":null},"institutions":[{"id":"https://openalex.org/I118347636","display_name":"Australian National University","ror":"https://ror.org/019wvm592","country_code":"AU","type":"education","lineage":["https://openalex.org/I118347636"]},{"id":"https://openalex.org/I2802631561","display_name":"Australian Mathematical Sciences Institute","ror":"https://ror.org/00yn60108","country_code":"AU","type":"other","lineage":["https://openalex.org/I2802631561"]}],"countries":["AU"],"is_corresponding":true,"raw_author_name":"DONGVU TONIEN","raw_affiliation_strings":["Mathematical Sciences Institute, Australian National University, Canberra, Australia"],"affiliations":[{"raw_affiliation_string":"Mathematical Sciences Institute, Australian National University, Canberra, Australia","institution_ids":["https://openalex.org/I2802631561","https://openalex.org/I118347636"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5010447902","display_name":"Reihaneh Safavi\u2013Naini","orcid":"https://orcid.org/0000-0002-1697-3590"},"institutions":[{"id":"https://openalex.org/I168635309","display_name":"University of Calgary","ror":"https://ror.org/03yjb2x39","country_code":"CA","type":"education","lineage":["https://openalex.org/I168635309"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"REIHANEH SAFAVI-NAINI","raw_affiliation_strings":["Department of Computer Science, University of Calgary, Calgary, AB, Canada","Department of Computer Science University of Calgary Calgary, AB, Canada#TAB#"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, University of Calgary, Calgary, AB, Canada","institution_ids":["https://openalex.org/I168635309"]},{"raw_affiliation_string":"Department of Computer Science University of Calgary Calgary, AB, Canada#TAB#","institution_ids":["https://openalex.org/I168635309"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5022195537","display_name":"Peter Nickolas","orcid":"https://orcid.org/0000-0003-3211-0215"},"institutions":[{"id":"https://openalex.org/I204824540","display_name":"University of Wollongong","ror":"https://ror.org/00jtmb277","country_code":"AU","type":"education","lineage":["https://openalex.org/I204824540"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"PETER NICKOLAS","raw_affiliation_strings":["Faculty of Informatics, University of Wollongong, Wollongong, NSW, Australia"],"affiliations":[{"raw_affiliation_string":"Faculty of Informatics, University of Wollongong, Wollongong, NSW, Australia","institution_ids":["https://openalex.org/I204824540"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":[],"corresponding_institution_ids":["https://openalex.org/I118347636","https://openalex.org/I2802631561"],"apc_list":null,"apc_paid":null,"fwci":0.5232,"has_fulltext":false,"cited_by_count":9,"citation_normalized_percentile":{"value":0.69682474,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":"03","issue":"03","first_page":"393","last_page":"412"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9986000061035156,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11269","display_name":"Algorithms and Data Compression","score":0.9891999959945679,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/hash-function","display_name":"Hash function","score":0.8226967453956604},{"id":"https://openalex.org/keywords/hash-chain","display_name":"Hash chain","score":0.7386052012443542},{"id":"https://openalex.org/keywords/hash-based-message-authentication-code","display_name":"Hash-based message authentication code","score":0.693708062171936},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6535767912864685},{"id":"https://openalex.org/keywords/message-authentication-code","display_name":"Message authentication code","score":0.6260772943496704},{"id":"https://openalex.org/keywords/cryptographic-hash-function","display_name":"Cryptographic hash function","score":0.5814400315284729},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.5802698135375977},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.5238516330718994},{"id":"https://openalex.org/keywords/function","display_name":"Function (biology)","score":0.4545740783214569},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.43811625242233276},{"id":"https://openalex.org/keywords/collision-resistance","display_name":"Collision resistance","score":0.4202449917793274},{"id":"https://openalex.org/keywords/double-hashing","display_name":"Double hashing","score":0.351686954498291},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.29733526706695557},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.2934560775756836},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.29198455810546875},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.19361358880996704}],"concepts":[{"id":"https://openalex.org/C99138194","wikidata":"https://www.wikidata.org/wiki/Q183427","display_name":"Hash function","level":2,"score":0.8226967453956604},{"id":"https://openalex.org/C135783594","wikidata":"https://www.wikidata.org/wiki/Q5678864","display_name":"Hash chain","level":3,"score":0.7386052012443542},{"id":"https://openalex.org/C100485629","wikidata":"https://www.wikidata.org/wiki/Q1669397","display_name":"Hash-based message authentication code","level":4,"score":0.693708062171936},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6535767912864685},{"id":"https://openalex.org/C141492731","wikidata":"https://www.wikidata.org/wiki/Q1052621","display_name":"Message authentication code","level":3,"score":0.6260772943496704},{"id":"https://openalex.org/C7608002","wikidata":"https://www.wikidata.org/wiki/Q477202","display_name":"Cryptographic hash function","level":3,"score":0.5814400315284729},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.5802698135375977},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.5238516330718994},{"id":"https://openalex.org/C14036430","wikidata":"https://www.wikidata.org/wiki/Q3736076","display_name":"Function (biology)","level":2,"score":0.4545740783214569},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.43811625242233276},{"id":"https://openalex.org/C150909736","wikidata":"https://www.wikidata.org/wiki/Q1779448","display_name":"Collision resistance","level":5,"score":0.4202449917793274},{"id":"https://openalex.org/C138111711","wikidata":"https://www.wikidata.org/wiki/Q478351","display_name":"Double hashing","level":4,"score":0.351686954498291},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.29733526706695557},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.2934560775756836},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.29198455810546875},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.19361358880996704},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C78458016","wikidata":"https://www.wikidata.org/wiki/Q840400","display_name":"Evolutionary biology","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1142/s1793830911001292","is_oa":false,"landing_page_url":"https://doi.org/10.1142/s1793830911001292","pdf_url":null,"source":{"id":"https://openalex.org/S178434951","display_name":"Discrete Mathematics Algorithms and Applications","issn_l":"1793-8309","issn":["1793-8309","1793-8317"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319815","host_organization_name":"World Scientific","host_organization_lineage":["https://openalex.org/P4310319815"],"host_organization_lineage_names":["World Scientific"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Discrete Mathematics, Algorithms and Applications","raw_type":"journal-article"},{"id":"pmh:oai:ro.uow.edu.au:infopapers-9964","is_oa":false,"landing_page_url":"https://ro.uow.edu.au/infopapers/2628","pdf_url":null,"source":{"id":"https://openalex.org/S4306400510","display_name":"Research Online (University of Wollongong)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I204824540","host_organization_name":"University of Wollongong","host_organization_lineage":["https://openalex.org/I204824540"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Faculty of Informatics - Papers (Archive)","raw_type":"article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":16,"referenced_works":["https://openalex.org/W1799922503","https://openalex.org/W2001792341","https://openalex.org/W2050530804","https://openalex.org/W2099808581","https://openalex.org/W2109190643","https://openalex.org/W2110198045","https://openalex.org/W2115247187","https://openalex.org/W2116520451","https://openalex.org/W2127353419","https://openalex.org/W2141695971","https://openalex.org/W2151834701","https://openalex.org/W2153809950","https://openalex.org/W2164059205","https://openalex.org/W2164070648","https://openalex.org/W2166554499","https://openalex.org/W2535164079"],"related_works":["https://openalex.org/W3172393520","https://openalex.org/W1974544592","https://openalex.org/W179740592","https://openalex.org/W3142240164","https://openalex.org/W2748978416","https://openalex.org/W2291537859","https://openalex.org/W2121212524","https://openalex.org/W1767494015","https://openalex.org/W2361190260","https://openalex.org/W3090512720"],"abstract_inverted_index":{"Traditional":[0],"hash":[1,32,62,89,93,115],"functions":[2,63,90,116],"are":[3,73,117],"designed":[4,66],"to":[5,152,190,198],"protect":[6],"against":[7,216],"even":[8],"the":[9,69,77,84,113,120,145,174,192,199,209,217,227,231],"slightest":[10],"modification":[11],"of":[12,83,87,144,173,230],"a":[13,20,25,31,47,141,220],"message.":[14],"Thus,":[15],"one":[16,165],"bit":[17],"changed":[18],"in":[19,24,76],"message":[21,28,44,80,99,166,184],"would":[22],"result":[23],"totally":[26],"different":[27],"digest":[29,168,186],"when":[30],"function":[33],"is":[34,38,126,205,214],"applied.":[35],"This":[36,124],"feature":[37],"not":[39],"suitable":[40,127],"for":[41,102,128],"applications":[42],"whose":[43],"spaces":[45],"admit":[46],"certain":[48],"fuzziness,":[49],"such":[50],"as":[51,206,208],"multimedia":[52],"communications":[53],"or":[54],"biometric":[55],"authentication":[56,100],"applications.":[57],"In":[58,95,136,188],"these":[59],"applications,":[60],"approximate":[61,88,98,114],"must":[64],"be":[65],"so":[67],"that":[68,159],"distance":[70,78],"between":[71,79],"messages":[72,130],"proportionally":[74],"reflected":[75],"digests.":[81],"Most":[82],"previous":[85],"designs":[86],"employ":[91],"traditional":[92],"functions.":[94],"an":[96,103,160],"ingenious":[97],"scheme":[101,125,204,211],"N-ary":[104,129],"alphabet":[105,133],"recently":[106],"proposed":[107],"by":[108,162],"Ge,":[109],"Arce":[110],"and":[111,167,185,212],"Crescenzo,":[112],"based":[118],"on":[119],"majority":[121,146],"selection":[122,147],"function.":[123],"with":[131],"arbitrary":[132],"size":[134],"N.":[135],"this":[137,155],"paper,":[138],"we":[139,194,224],"show":[140,158],"hidden":[142],"property":[143],"function,":[148],"which":[149],"allows":[150],"us":[151],"successfully":[153],"break":[154],"scheme.":[156,233],"We":[157],"adversary,":[161],"observing":[163],"just":[164],"pair,":[169],"without":[170],"any":[171],"knowledge":[172],"secret":[175],"information,":[176],"can":[177],"generate":[178],"N":[179],"-":[180],"1":[181],"new":[182,221],"valid":[183],"pairs.":[187],"order":[189],"resist":[191],"attack,":[193],"propose":[195],"some":[196],"modifications":[197],"original":[200,210],"design.":[201],"The":[202],"corrected":[203,232],"efficient":[207],"it":[213],"secure":[215],"attack.":[218],"By":[219],"combinatorial":[222],"approach,":[223],"calculate":[225],"explicitly":[226],"security":[228],"parameters":[229]},"counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2018,"cited_by_count":1},{"year":2017,"cited_by_count":2},{"year":2016,"cited_by_count":1},{"year":2015,"cited_by_count":2},{"year":2014,"cited_by_count":1},{"year":2013,"cited_by_count":1}],"updated_date":"2026-04-21T08:09:41.155169","created_date":"2025-10-10T00:00:00"}
