<?xml version="1.0" encoding="ISO-8859-1"?><article xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance">
<front>
<journal-meta>
<journal-id>1405-5546</journal-id>
<journal-title><![CDATA[Computación y Sistemas]]></journal-title>
<abbrev-journal-title><![CDATA[Comp. y Sist.]]></abbrev-journal-title>
<issn>1405-5546</issn>
<publisher>
<publisher-name><![CDATA[Instituto Politécnico Nacional, Centro de Investigación en Computación]]></publisher-name>
</publisher>
</journal-meta>
<article-meta>
<article-id>S1405-55462009000100004</article-id>
<title-group>
<article-title xml:lang="en"><![CDATA[A Generic Method to Extend Message Space of a Strong Pseudorandom Permutation]]></article-title>
<article-title xml:lang="es"><![CDATA[Método Genérico para Extender el Espacio del Mensaje de una Permutación Pseudo-aleatoria Fuerte]]></article-title>
</title-group>
<contrib-group>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Nandi]]></surname>
<given-names><![CDATA[Mridul]]></given-names>
</name>
</contrib>
</contrib-group>
<aff id="A01">
<institution><![CDATA[,Indian Statistical Institute  ]]></institution>
<addr-line><![CDATA[ ]]></addr-line>
</aff>
<pub-date pub-type="pub">
<day>00</day>
<month>03</month>
<year>2009</year>
</pub-date>
<pub-date pub-type="epub">
<day>00</day>
<month>03</month>
<year>2009</year>
</pub-date>
<volume>12</volume>
<numero>3</numero>
<fpage>285</fpage>
<lpage>296</lpage>
<copyright-statement/>
<copyright-year/>
<self-uri xlink:href="http://www.scielo.org.mx/scielo.php?script=sci_arttext&amp;pid=S1405-55462009000100004&amp;lng=en&amp;nrm=iso"></self-uri><self-uri xlink:href="http://www.scielo.org.mx/scielo.php?script=sci_abstract&amp;pid=S1405-55462009000100004&amp;lng=en&amp;nrm=iso"></self-uri><self-uri xlink:href="http://www.scielo.org.mx/scielo.php?script=sci_pdf&amp;pid=S1405-55462009000100004&amp;lng=en&amp;nrm=iso"></self-uri><abstract abstract-type="short" xml:lang="en"><p><![CDATA[Let E be a strong pseudorandom permutation (or SPRP) secure enciphering scheme (i.e., a length-preserving encryption scheme) which can only encrypt messages of size multiple of n, the block size of the underlying block cipher. There are several such constructions, e.g., CBC mode or cipher block chaining mode. In this paper we present how a secure enciphering scheme <img border=0 src="../../../../../img/revistas/cys/v12n3/a4s1.jpg">can be obtained which can encrypt any messages of size at least n based on E and some other cryptographic objects such as weak pseudorandom function (or WPRF) and a universal hash function. So <img border=0 src="../../../../../img/revistas/cys/v12n3/a4s1.jpg">can encrypt messages which might contain incomplete message blocks. Since an enciphering scheme is a length preserving encryption algorithm, one can not use a padding rule to handle the incomplete message block. In 2007, Ristenpart and Rogaway first proposed a secure method known as XLS (eXtension by Latin Squares). It needs two invocations of a block cipher e whose key is chosen independently of the key of E. The SPRP security of XLS is based on the SPRP security of the block cipher e. Our proposed enciphering scheme is SPRP and it needs only one invocation of a WPRF and two invocations of a universal hash function. Any SPRP construction, e.g., a secure block cipher, is a WPRF. Moreover, there are other several efficient constructions for universal hash functions and WPRF which are not SPRP. Thus, we are able to replace SPRP security by two weaker security notions to extend the domain of a secure enciphering scheme.]]></p></abstract>
<abstract abstract-type="short" xml:lang="es"><p><![CDATA[Sea E un esquema seguro de cifrado que preserva la longitud del texto en claro y que se comporta como una permutación pseudo-aleatoria fuerte (SPRP por sus siglas en inglés), el cual únicamente puede cifrar mensajes con longitudes que sean múltiplos de n, donde n es el tamaño del bloque utilizado por el esquema de cifrado. Existen varios ejemplos de construcciones de este tipo, por ejemplo, el modo de cifrado por bloque encadenado (CBC por sus siglas en inglés). En este artículo describimos cómo construir un esquema de cifrado seguro <img border=0 src="../../../../../img/revistas/cys/v12n3/a4s1.jpg">, capaz de cifrar cualquier mensaje de tamaño mayor o igual que n. Mostramos que <img border=0 src="../../../../../img/revistas/cys/v12n3/a4s1.jpg">puede ser construido con E y algunos otros objetos criptográficos tales como una función pseudo-aleatoria débil (WPRF por sus siglas en inglés) y una función picadillo universal. El esquema <img border=0 src="../../../../../img/revistas/cys/v12n3/a4s1.jpg">así obtenido puede cifrar mensajes con longitudes que no son múltiplos de n. Un esquema de cifrado que preserva la longitud del texto en claro no puede rellenar el último bloque de mensaje cuando éste está incompleto. En 2007, Ristenpart y Rogaway fuernos los primeros en proponer un método seguro conocido como extensión de cuadrados latinos (XLS por sus siglas en inglés). XLS utiliza dos invocaciones al cifrador por bloques e, cuya llave es escogida independientemente de la llave de E. La seguridad SPRP de XLS se basa en la seguridad SPRP del cifrador por bloques e. El esquema de cifrado propuesto aquí es SPRP y necesita únicamente una invocación de una WPRF y dos invocaciones a una función picadillo universal. Cualquier construcción SPRP, esto es, un cifrador por bloques seguro, es un WPRF. Por otro lado, existen construcciones eficientes para funciones picadillo universales y para WPRF que no son SPRP. Estas dos últimas observaciones implican que en este artículo logramos obtener seguridad del tipo SPRP al utilizar dos nociones de seguridad más débiles, al tiempo que extendemos el dominio original del esquema de cifrado seguro.]]></p></abstract>
<kwd-group>
<kwd lng="en"><![CDATA[strong pseudorandom permutation]]></kwd>
<kwd lng="en"><![CDATA[weak pseudorandom function]]></kwd>
<kwd lng="en"><![CDATA[universal hash function]]></kwd>
<kwd lng="en"><![CDATA[modes of operations]]></kwd>
<kwd lng="es"><![CDATA[Permutación pseudo-aleatoria fuerte]]></kwd>
<kwd lng="es"><![CDATA[función pseudo-aleatoria débil]]></kwd>
<kwd lng="es"><![CDATA[función picadillo universal]]></kwd>
<kwd lng="es"><![CDATA[modos de operación]]></kwd>
</kwd-group>
</article-meta>
</front><body><![CDATA[ <p align="justify"><font face="verdana" size="4">Art&iacute;culos</font></p>     <p align="justify"><font face="verdana" size="2">&nbsp;</font></p>     <p align="center"><font face="verdana" size="4"><b>A Generic Method to Extend Message Space of a Strong Pseudorandom Permutation</b></font></p>     <p align="center"><font face="verdana" size="2">&nbsp;</font></p>     <p align="center"><font face="verdana" size="3"><b><i>M&eacute;todo Gen&eacute;rico para Extender el Espacio del Mensaje de una Permutaci&oacute;n Pseudo&#150;aleatoria Fuerte</i></b></font></p>     <p align="center"><font face="verdana" size="2">&nbsp;</font></p>     <p align="center"><font face="verdana" size="2"><b>Mridul Nandi</b></font></p>     <p align="justify"><font face="verdana" size="2">&nbsp;</font></p>     <p align="justify"><font face="verdana" size="2"><i>Indian Statistical Institute.  </i>E&#150;mail: <a href="mailto:mridul.nandi@gmail.com">mridul.nandi@gmail.com</a></font></p>     <p align="justify"><font face="verdana" size="2">&nbsp;</font></p>     ]]></body>
<body><![CDATA[<p align="justify"><font face="verdana" size="2">Article received on March 1, 2008    <br> Accepted on October 30, 2008</font></p>     <p align="justify"><font face="verdana" size="2">&nbsp;</font></p>     <p align="justify"><font face="verdana" size="2"><b>Abstract</b></font></p>     <p align="justify"><font face="verdana" size="2">Let <b>E </b>be a strong pseudorandom permutation (or SPRP) secure enciphering scheme (i.e., a length&#150;preserving encryption scheme) which can only encrypt messages of size multiple of <i>n, </i>the block size of the underlying block cipher. There are several such constructions, e.g., CBC mode or cipher block chaining mode. In this paper we present how a secure enciphering scheme  <img src="/img/revistas/cys/v12n3/a4s1.jpg"> can be obtained which can encrypt any messages of size at least <i>n </i>based on <b>E</b> and some other cryptographic objects such as weak pseudorandom function (or WPRF) and a universal hash function. So  <img src="/img/revistas/cys/v12n3/a4s1.jpg">can encrypt messages which might contain incomplete message blocks. Since an enciphering scheme is a length preserving encryption algorithm, one can not use a padding rule to handle the incomplete message block. In 2007, Ristenpart and Rogaway first proposed a secure method known as XLS (eXtension by Latin Squares). It needs two invocations of a block cipher e whose key is chosen independently of the key of <b>E</b>. The SPRP security of XLS is based on the SPRP security of the block cipher <i>e</i>. Our proposed enciphering scheme is SPRP and it needs only one invocation of a WPRF and two invocations of a universal hash function. Any SPRP construction, e.g., a secure block cipher, is a WPRF. Moreover, there are other several efficient constructions for universal hash functions and WPRF which are not SPRP. Thus, we are able to replace SPRP security by two weaker security notions to extend the domain of a secure enciphering scheme.</font></p>     <p align="justify"><font face="verdana" size="2"><b>Keywords: </b>strong pseudorandom permutation, weak pseudorandom function, universal hash function, modes of operations.</font></p>     <p align="justify"><font face="verdana" size="2">&nbsp;</font></p>     <p align="justify"><font face="verdana" size="2"><b>Resumen</b></font></p>     <p align="justify"><font face="verdana" size="2">Sea <b>E </b>un esquema seguro de cifrado que preserva la longitud del texto en claro y que se comporta como una permutaci&oacute;n pseudo&#150;aleatoria fuerte (SPRP por sus siglas en ingl&eacute;s), el cual &uacute;nicamente puede cifrar mensajes con longitudes que sean m&uacute;ltiplos de <i>n, </i>donde <i>n </i>es el tama&ntilde;o del bloque utilizado por el esquema de cifrado. Existen varios ejemplos de construcciones de este tipo, por ejemplo, el modo de cifrado por bloque encadenado (CBC por sus siglas en ingl&eacute;s). En este art&iacute;culo describimos c&oacute;mo construir un esquema de cifrado seguro <img src="/img/revistas/cys/v12n3/a4s1.jpg">, capaz de cifrar cualquier mensaje de tama&ntilde;o mayor o igual que <i>n. </i>Mostramos que <img src="/img/revistas/cys/v12n3/a4s1.jpg"> puede ser construido con <b>E</b> y algunos otros objetos criptogr&aacute;ficos tales como una funci&oacute;n pseudo&#150;aleatoria d&eacute;bil (WPRF por sus siglas en ingl&eacute;s) y una funci&oacute;n picadillo universal. El esquema <img src="/img/revistas/cys/v12n3/a4s1.jpg"> as&iacute; obtenido puede cifrar mensajes con longitudes que no son m&uacute;ltiplos de <i>n. </i>Un esquema de cifrado que preserva la longitud del texto en claro no puede rellenar el &uacute;ltimo bloque de mensaje cuando &eacute;ste est&aacute; incompleto. En 2007, Ristenpart y Rogaway fuernos los primeros en proponer un m&eacute;todo seguro conocido como extensi&oacute;n de cuadrados latinos (XLS por sus siglas en ingl&eacute;s). XLS utiliza dos invocaciones al cifrador por bloques e, cuya llave es escogida independientemente de la llave de E. La seguridad SPRP de XLS se basa en la seguridad SPRP del cifrador por bloques e. El esquema de cifrado propuesto aqu&iacute; es SPRP y necesita &uacute;nicamente una invocaci&oacute;n de una WPRF y dos invocaciones a una funci&oacute;n picadillo universal. Cualquier construcci&oacute;n SPRP, esto es, un cifrador por bloques seguro, es un WPRF. Por otro lado, existen construcciones eficientes para funciones picadillo universales y para WPRF que no son SPRP. Estas dos &uacute;ltimas observaciones implican que en este art&iacute;culo logramos obtener seguridad del tipo SPRP al utilizar dos nociones de seguridad m&aacute;s d&eacute;biles, al tiempo que extendemos el dominio original del esquema de cifrado seguro.</font></p>     <p align="justify"><font face="verdana" size="2"><b>Palabras Claves: </b>Permutaci&oacute;n pseudo&#150;aleatoria fuerte, funci&oacute;n pseudo&#150;aleatoria d&eacute;bil, funci&oacute;n picadillo universal, modos de operaci&oacute;n.</font></p>     ]]></body>
<body><![CDATA[<p align="justify"><font face="verdana" size="2">&nbsp;</font></p>     <p align="justify"><font face="verdana" size="2"><a href="/pdf/cys/v12n3/v12n3a4.pdf" target="_blank">DESCARGAR ART&Iacute;CULO EN FORMATO PDF</a></font></p>     <p align="justify"><font face="verdana" size="2">&nbsp;</font></p>     <p align="justify"><font face="verdana" size="2"><b>References</b></font></p>     <!-- ref --><p align="justify"><font face="verdana" size="2">1.<b> Bellare, M., J. Kilian, and P. Rogaway </b>(1994). The security of cipher block chaining. In Y. Desmedt (Ed.), <i>CRYPTO, </i>Volume 839 of <i>Lecture Notes in Computer Science, </i>pp. 341&#150;358. Springer.</font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=2053412&pid=S1405-5546200900010000400001&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2">2.<b> Bernstein., D. J. </b>(2005). The poly 1305&#150;aes message&#150;authentication code. In H. Gilbert and H. Handschuh (Eds.), <i>FSE, </i>Volume 3557 of <i>Lecture Notes in Computer Science, </i>pp. 32&#150;49. Springer.</font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=2053413&pid=S1405-5546200900010000400002&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2">3.<b> Blum, A., M. L. Furst, M. J. Kearns, and R. J. Lipton </b>(1993). Cryptographic primitives based on hard learning problems. In D. R. Stinson (Ed.), <i>CRYPTO, </i>Volume 773 of <i>Lecture Notes in Computer Science, </i>pp. 278&#150;291. Springer.</font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=2053414&pid=S1405-5546200900010000400003&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2">4.<b> Chakraborty, D. and P. Sarkar </b>(2006). HCH: A new tweakable enciphering scheme using the hash&#150;encrypt&#150;hash approach. In R. Barua and T. Lange (Eds.), <i>INDOCRYPT, </i>Volume 4329 of <i>Lecture Notes in Computer Science, </i>pp. 287&#150;302. Springer.</font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=2053415&pid=S1405-5546200900010000400004&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2">5.<b> D. Cook, M. Y.  and A. Keromytis. </b>(2004a). Elastic aes. Cryptology ePrint Archive, Report 2004/141. <a href="http://eprint.iacr.org/" target="_blank">http://eprint.iacr.org/</A></a>.</font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=2053416&pid=S1405-5546200900010000400005&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2">6.<b> D. Cook, M. Y. and A. Keromytis. </b>(2004b). Elastic block ciphers. Cryptology ePrint Archive, Report 2004/128. <a href="http://eprint.iacr.org/" target="_blank">http://eprint.iacr.org/</A></a>.</font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=2053417&pid=S1405-5546200900010000400006&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2">7.<b> Daemen,    J.    and   V.   Rijmen </b>(2002).   AES       the   advanced   encryption   standard.    Springer   2002. <a href="http://csrc.nist.gov/" target="_blank">http://csrc.nist.gov/CryptoToolkit/aes/rijndael/Rijndael&#150;ammended.pdf</a>.</font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=2053418&pid=S1405-5546200900010000400007&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2">8.<b> Halevi, S.</b> Invertible universal hashing and the tet encryption mode.</font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=2053419&pid=S1405-5546200900010000400008&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2">9.<b> Halevi, S. </b>(2004). EME* : Extending EME to handle arbitrary&#150;length messages with associated data. In A. Canteaut and K. Viswanathan (Eds.), <i>INDOCRYPT, </i>Volume 3348 of <i>Lecture Notes in Computer Science, </i>pp. 315&#150;327. Springer.</font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=2053420&pid=S1405-5546200900010000400009&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2">10.<b> Halevi, S. and P. Rogaway </b>(2003). A tweakable enciphering mode. In D. Boneh (Ed.), <i>CRYPTO, </i>Volume 2729 of <i>Lecture Notes in Computer Science, </i>pp. 482&#150;499. Springer.</font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=2053421&pid=S1405-5546200900010000400010&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2">11. <b>Halevi, S. and P. Rogaway </b>(2004). A parallelizable enciphering mode. In T. Okamoto (Ed.), <i>CT&#150;RSA, </i>Volume 2964 of <i>Lecture Notes in Computer Science, </i>pp. 292&#150;304. Springer.</font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=2053422&pid=S1405-5546200900010000400011&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2">12.<b> Karatsuba, A. and Y. Ofman. </b>Multiplication of multidigit numbers by automata. Soviet Physics&#150;Doklady, 7:595596, 1963.</font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=2053423&pid=S1405-5546200900010000400012&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2">13.<b> Liskov, M., R. L. Rivest, and D. Wagner </b>(2002). Tweakable block ciphers. In M. Yung (Ed.), <i>CRYPTO, </i>Volume 2442 <i>of Lecture Notes in Computer Science, </i>pp. 31&#150;46. Springer.</font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=2053424&pid=S1405-5546200900010000400013&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2">14.<b> Luby, M. and C. Rackoff </b>(1988). How to construct pseudorandom permutations from pseudorandom functions. <i>SIAM J. Comput. 17(2), </i>373&#150;386.</font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=2053425&pid=S1405-5546200900010000400014&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2">15.<b> Maurer, U. and J. Sjdin </b>(2007). A fast and key&#150;efficient reduction of chosen&#150;ciphertextto known&#150;plaintext security. In <i>EUROCRYPT, </i>Volume 4515 of <i>Lecture Notes in Computer Science, </i>pp. 498&#150;516. Springer.</font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=2053426&pid=S1405-5546200900010000400015&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2">16.<b> McGrew, D. A. and S. R. Fluhrer </b>(2004). The extended codebook (XCB) mode of operation. Cryptology ePrint Archive, Report 2004/278. <a href="http://eprint.iacr.org/" target="_blank">http://eprint.iacr.org/</a>.</font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=2053427&pid=S1405-5546200900010000400016&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2">17.<b> Meyer, C. and M. Matyas. </b>(1982). <i>Cryptography: A New Dimension in Data Security. </i>John Wiley &amp; 23 Sons, New York.</font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=2053428&pid=S1405-5546200900010000400017&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2">18.<b> Naor, M. and O. Reingold </b>(1999). Synthesizers and their application to the parallel construction of pseudo&#150;random functions. J. <i>Comput. Syst. Sci. 58(2), </i>336&#150;375.</font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=2053429&pid=S1405-5546200900010000400018&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2">19.<b> Nevelsteen, W. and B. Preneel </b>(1999). Software performance of universal hash functions. In <i>EUROCRYPT, </i>Volume 1592 <i>of Lecture Notes in Computer Science, </i>pp. 24&#150;41. Springer.</font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=2053430&pid=S1405-5546200900010000400019&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2">20.<b> Ristenpart, T. and P. Rogaway. </b>(2007). How to enrich the message space of a cipher. In <i>FSE, </i>Volume 4593 of <i>Lecture Notes in Computer Science, </i>pp. 101&#150;118. Springer.</font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=2053431&pid=S1405-5546200900010000400020&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2">21.<b> Sarkar., P. </b>(2007). Improving upon the tet mode of operation. <i>In ICISC, </i>Volume 4817 of<i> Lecture Notes in Computer Science, </i>pp. 180&#150;192. Springer.</font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=2053432&pid=S1405-5546200900010000400021&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2">22.<b> Wang, P., D. Feng, and W. Wu </b>(2005). HCTR: A variable&#150;input&#150;length enciphering mode. In D. Feng, D. Lin, and M. Yung (Eds.), <i>CISC, </i>Volume 3822 <i>of Lecture Notes in Computer Science, </i>pp. 175&#150;188. Springer.</font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=2053433&pid=S1405-5546200900010000400022&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --> ]]></body><back>
<ref-list>
<ref id="B1">
<label>1</label><nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Bellare]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Kilian]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Rogaway]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[The security of cipher block chaining]]></article-title>
<person-group person-group-type="editor">
<name>
<surname><![CDATA[Desmedt]]></surname>
<given-names><![CDATA[Y.]]></given-names>
</name>
</person-group>
<source><![CDATA[CRYPTO]]></source>
<year>1994</year>
<volume>839</volume>
<page-range>341-358</page-range><publisher-name><![CDATA[Springer]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B2">
<label>2</label><nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Bernstein]]></surname>
<given-names><![CDATA[D. J.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[The poly 1305-aes message-authentication code]]></article-title>
<person-group person-group-type="editor">
<name>
<surname><![CDATA[Gilbert]]></surname>
<given-names><![CDATA[H.]]></given-names>
</name>
<name>
<surname><![CDATA[Handschuh]]></surname>
<given-names><![CDATA[H.]]></given-names>
</name>
</person-group>
<source><![CDATA[FSE]]></source>
<year>2005</year>
<volume>3557</volume>
<page-range>32-49</page-range><publisher-name><![CDATA[Springer]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B3">
<label>3</label><nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Blum]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Furst]]></surname>
<given-names><![CDATA[M. L.]]></given-names>
</name>
<name>
<surname><![CDATA[Kearns]]></surname>
<given-names><![CDATA[M. J.]]></given-names>
</name>
<name>
<surname><![CDATA[Lipton]]></surname>
<given-names><![CDATA[R. J.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[Cryptographic primitives based on hard learning problems]]></article-title>
<person-group person-group-type="editor">
<name>
<surname><![CDATA[Stinson]]></surname>
<given-names><![CDATA[D. R.]]></given-names>
</name>
</person-group>
<source><![CDATA[CRYPTO]]></source>
<year>1993</year>
<volume>773</volume>
<page-range>278-291</page-range><publisher-name><![CDATA[Springer]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B4">
<label>4</label><nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Chakraborty]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
<name>
<surname><![CDATA[Sarkar]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[HCH: A new tweakable enciphering scheme using the hash-encrypt-hash approach]]></article-title>
<person-group person-group-type="editor">
<name>
<surname><![CDATA[Barua]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
<name>
<surname><![CDATA[Lange]]></surname>
<given-names><![CDATA[T.]]></given-names>
</name>
</person-group>
<source><![CDATA[INDOCRYPT]]></source>
<year>2006</year>
<volume>4329</volume>
<page-range>287-302</page-range><publisher-name><![CDATA[Springer]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B5">
<label>5</label><nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[D. Cook]]></surname>
<given-names><![CDATA[M. Y.]]></given-names>
</name>
<name>
<surname><![CDATA[Keromytis]]></surname>
<given-names><![CDATA[A]]></given-names>
</name>
</person-group>
<source><![CDATA[Elastic aes.]]></source>
<year>2004</year>
<month>a</month>
<volume>2004/141</volume>
</nlm-citation>
</ref>
<ref id="B6">
<label>6</label><nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[D. Cook]]></surname>
<given-names><![CDATA[M. Y.]]></given-names>
</name>
<name>
<surname><![CDATA[Keromytis]]></surname>
<given-names><![CDATA[A]]></given-names>
</name>
</person-group>
<source><![CDATA[Elastic block ciphers]]></source>
<year>2004</year>
<month>b</month>
<volume>2004/128</volume>
</nlm-citation>
</ref>
<ref id="B7">
<label>7</label><nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Daemen]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Rijmen]]></surname>
<given-names><![CDATA[V.]]></given-names>
</name>
</person-group>
<source><![CDATA[AES the advanced encryption standard]]></source>
<year>2002</year>
<publisher-name><![CDATA[Springer]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B8">
<label>8</label><nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Halevi]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
</person-group>
<source><![CDATA[Invertible universal hashing and the tet encryption mode]]></source>
<year></year>
</nlm-citation>
</ref>
<ref id="B9">
<label>9</label><nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Halevi]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[EME: Extending EME to handle arbitrary-length messages with associated data]]></article-title>
<person-group person-group-type="editor">
<name>
<surname><![CDATA[Canteaut]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Viswanathan]]></surname>
<given-names><![CDATA[K.]]></given-names>
</name>
</person-group>
<source><![CDATA[INDOCRYPT]]></source>
<year>2004</year>
<volume>3348</volume>
<page-range>315-327</page-range></nlm-citation>
</ref>
<ref id="B10">
<label>10</label><nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Halevi]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Rogaway]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[A tweakable enciphering mode]]></article-title>
<person-group person-group-type="editor">
<name>
<surname><![CDATA[Boneh]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
</person-group>
<source><![CDATA[CRYPTO]]></source>
<year>2003</year>
<volume>2729</volume>
<page-range>482-499</page-range><publisher-name><![CDATA[Springer]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B11">
<label>11</label><nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Halevi]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Rogaway]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[A parallelizable enciphering mode]]></article-title>
<person-group person-group-type="editor">
<name>
<surname><![CDATA[Okamoto]]></surname>
<given-names><![CDATA[T.]]></given-names>
</name>
</person-group>
<source><![CDATA[CT-RSA]]></source>
<year>2004</year>
<volume>2964</volume>
<page-range>292-304</page-range><publisher-name><![CDATA[Springer]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B12">
<label>12</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Karatsuba]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Ofman]]></surname>
<given-names><![CDATA[Y.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[Multiplication of multidigit numbers by automata]]></article-title>
<source><![CDATA[Soviet Physics-Doklady]]></source>
<year>1963</year>
<numero>7</numero>
<issue>7</issue>
<page-range>595596</page-range></nlm-citation>
</ref>
<ref id="B13">
<label>13</label><nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Liskov]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Rivest]]></surname>
<given-names><![CDATA[R. L.]]></given-names>
</name>
<name>
<surname><![CDATA[Wagner]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[Tweakable block ciphers]]></article-title>
<person-group person-group-type="editor">
<name>
<surname><![CDATA[Yung]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
</person-group>
<source><![CDATA[CRYPTO]]></source>
<year>2002</year>
<volume>2442</volume>
<page-range>31-46</page-range><publisher-name><![CDATA[Springer]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B14">
<label>14</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Luby]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Rackoff]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[How to construct pseudorandom permutations from pseudorandom functions]]></article-title>
<source><![CDATA[SIAM J. Comput.]]></source>
<year>1988</year>
<volume>17</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>373-386</page-range></nlm-citation>
</ref>
<ref id="B15">
<label>15</label><nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Maurer]]></surname>
<given-names><![CDATA[U.]]></given-names>
</name>
<name>
<surname><![CDATA[Sjdin]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[A fast and key-efficient reduction of chosen-ciphertextto known-plaintext secur]]></article-title>
<source><![CDATA[EUROCRYPT]]></source>
<year>2007</year>
<volume>4515</volume>
<page-range>498-516</page-range><publisher-name><![CDATA[Springer]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B16">
<label>16</label><nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[McGrew]]></surname>
<given-names><![CDATA[D. A.]]></given-names>
</name>
<name>
<surname><![CDATA[Fluhrer]]></surname>
<given-names><![CDATA[S. R.]]></given-names>
</name>
</person-group>
<source><![CDATA[The extended codebook (XCB) mode of operation: Cryptology ePrint Archive]]></source>
<year>2004</year>
</nlm-citation>
</ref>
<ref id="B17">
<label>17</label><nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Meyer]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
<name>
<surname><![CDATA[Matyas]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
</person-group>
<source><![CDATA[Cryptography: A New Dimension in Data Security]]></source>
<year>1982</year>
<publisher-loc><![CDATA[New York ]]></publisher-loc>
<publisher-name><![CDATA[John Wiley]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B18">
<label>18</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Naor]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Reingold]]></surname>
<given-names><![CDATA[O.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[Synthesizers and their application to the parallel construction of pseudo-random functions]]></article-title>
<source><![CDATA[J. Comput. Syst. Sci.]]></source>
<year>1999</year>
<volume>58</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>336-375</page-range></nlm-citation>
</ref>
<ref id="B19">
<label>19</label><nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Nevelsteen]]></surname>
<given-names><![CDATA[W.]]></given-names>
</name>
<name>
<surname><![CDATA[Preneel]]></surname>
<given-names><![CDATA[B.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[Software performance of universal hash functions]]></article-title>
<source><![CDATA[EUROCRYPT]]></source>
<year>1999</year>
<volume>1592</volume>
<page-range>24-41</page-range><publisher-name><![CDATA[Springer]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B20">
<label>20</label><nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Ristenpart]]></surname>
<given-names><![CDATA[T.]]></given-names>
</name>
<name>
<surname><![CDATA[Rogaway]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[How to enrich the message space of a cipher]]></article-title>
<source><![CDATA[FSE]]></source>
<year>2007</year>
<volume>4593</volume>
<page-range>101-118</page-range><publisher-name><![CDATA[Spring]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B21">
<label>21</label><nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Sarkar]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[Improving upon the tet mode of operation]]></article-title>
<source><![CDATA[ICISC]]></source>
<year>2007</year>
<volume>4817</volume>
<page-range>180-192</page-range><publisher-name><![CDATA[Springer]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B22">
<label>22</label><nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Wang]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
<name>
<surname><![CDATA[Feng]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
<name>
<surname><![CDATA[Wu]]></surname>
<given-names><![CDATA[W.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[HCTR: A variable-input-length enciphering mode]]></article-title>
<person-group person-group-type="editor">
<name>
<surname><![CDATA[Feng]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
<name>
<surname><![CDATA[Lin]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
<name>
<surname><![CDATA[Yung]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
</person-group>
<source><![CDATA[CISC]]></source>
<year>2005</year>
<volume>3822</volume>
<page-range>175-188</page-range><publisher-name><![CDATA[Springer]]></publisher-name>
</nlm-citation>
</ref>
</ref-list>
</back>
</article>
