{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T22:56:56Z","timestamp":1725490616668},"publisher-location":"Berlin, Heidelberg","reference-count":23,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540001645"},{"type":"electronic","value":"9783540361596"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2002]]},"DOI":"10.1007\/3-540-36159-6_28","type":"book-chapter","created":{"date-parts":[[2007,8,28]],"date-time":"2007-08-28T14:06:48Z","timestamp":1188310008000},"page":"327-341","source":"Crossref","is-referenced-by-count":3,"title":["Risks with Raw-Key Masking \u2014 The Security Evaluation of 2-Key XCBC"],"prefix":"10.1007","author":[{"given":"Soichi","family":"Furuya","sequence":"first","affiliation":[]},{"given":"Kouichi","family":"Sakurai","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2002,12,16]]},"reference":[{"key":"28_CR1","series-title":"Lect Notes Comput Sci","volume-title":"Selected Areas in Cryptography, 7th Annual International Workshop, SAC 2000, Proceedings","author":"K. Aoki","year":"2001","unstructured":"K. Aoki, T. Ichikawa, M. Kanda, M. Matsui, S. Moriai, J. Nakajima, T. Tokita, \u201cCamellia: A 128-Bit Block Cipher Suitable for Multiple Platforms \u2014Design and Analysis,\u201d In Selected Areas in Cryptography, 7th Annual International Workshop, SAC 2000, Proceedings, LNCS 2012, Springer-Verlag, 2001."},{"key":"28_CR2","unstructured":"M. Bellare, A. Desai, E. Jokipii, P. Rogaway, \u201cA Concrete Security Treatment of Symmetric Encryption: Analysis of the DES Modes of Operation,\u201d Proceedings of the 38th Symposium on Foundations of Computer Science, IEEE, 1997."},{"key":"28_CR3","series-title":"Lect Notes Comput Sci","volume-title":"Advances in Cryptology,-CRYPTO\u201994","author":"M. Bellare","year":"1994","unstructured":"M. Bellare, J. Kilian, P. Rogaway, \u201cThe Security of Cipher Block Chaining,\u201d Advances in Cryptology,-CRYPTO\u201994, LNCS Vol. 839, Springer-Verlag, 1994."},{"key":"28_CR4","series-title":"Lect Notes Comput Sci","volume-title":"Advances in Cryptology-AUSCRYPT\u2019 90","author":"L. Brown","year":"1990","unstructured":"L. Brown, J. Pieprzyk, J. Seberry, \u201cLOKI-A Cryptographic Primitive for Authentication and Secrecy Applications,\u201d Advances in Cryptology-AUSCRYPT\u2019 90, Springer-Verlag, Lecture Notes in Computer Science Vol. 453, 1990."},{"key":"28_CR5","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-44598-6_12","volume-title":"Advances in Cryptology,-CRYPTO2000","author":"J. Black","year":"2000","unstructured":"J. Black, P. Rogaway, \u201cCBC MACs for arbitrary-length messages: The three-key constructions,\u201d Advances in Cryptology,-CRYPTO2000, LNCS 1880, Springer-Verlag, 2000."},{"key":"28_CR6","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-46035-7_25","volume-title":"Advances in Cryptology,-EUROCRYPT 2002","author":"J. Black","year":"2002","unstructured":"J. Black, P. Rogaway, \u201cA Block-Cipher Mode of Operation for Parallelizable Message Authentication,\u201d Advances in Cryptology,-EUROCRYPT 2002, LNCS Vol. 2332, Springer-Verlag, 2002."},{"key":"28_CR7","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45539-6_41","volume-title":"Advances in Cryptology,-EUROCRYPT 2000","author":"A. Biryukov","year":"2000","unstructured":"A. Biryukov, D. Wagner, \u201cAdvanced Slide attacks,\u201d Advances in Cryptology,-EUROCRYPT 2000, LNCS Vol. 1807, Springer-Verlag, 2000."},{"key":"28_CR8","series-title":"Lect Notes Comput Sci","volume-title":"Advances in Cryptology-ASIACRYPT\u201991","author":"J. Daemen","year":"1993","unstructured":"J. Daemen, \u201cLimitations of the Even-Mansour construction,\u201d Advances in Cryptology-ASIACRYPT\u201991, LNCS, Vol. 739, Springer-Verlag, 1993."},{"key":"28_CR9","unstructured":"J. Daemen, V. Rijmen, AES Proposal: Rijndael, AES Algorithm Submission, September 3, 1999, available at http:\/\/www.nist.gov\/CryptoToolkit ."},{"issue":"3","key":"28_CR10","doi-asserted-by":"publisher","first-page":"151","DOI":"10.1007\/s001459900025","volume":"10","author":"S. Even","year":"1997","unstructured":"S. Even, Y. Mansour, \u201cA construction of a cipher from a single pseudorandom permutation,\u201d J of Cryptology, 10(3) 151\u2013161, Summer 1997.","journal-title":"J of Cryptology"},{"key":"28_CR11","unstructured":"National Institute of Standards and Technology, Federal Information Processing Standards Publication 46-3, Data Encryption Standard (DES)."},{"key":"28_CR12","unstructured":"National Institute of Standards and Technology, Federal Information Processing Standards Publication 81, DES Modes of Operation (DES), 1980."},{"key":"28_CR13","unstructured":"National Institute of Standards and Technology, Federal Information Processing Standards Publication 197, Advanced Encryption Standard (AES)."},{"issue":"4","key":"28_CR14","doi-asserted-by":"publisher","first-page":"792","DOI":"10.1145\/6490.6503","volume":"33","author":"O. Goldreich","year":"1986","unstructured":"O. Goldreich and S. Goldwasser and S. Micali, \u201cHow to Construct Random Functions,\u201d Journal of the ACM, 33(4), 1986, 792\u2013807.","journal-title":"Journal of the ACM"},{"key":"28_CR15","doi-asserted-by":"crossref","unstructured":"E. Jaulmes, A. Joux, F. Valette, \u201cOn the security of randomized CBC-MAC beyond the birthday paradox limit: a new construction,\u201d in the Preproceedings of the Fast Software Encryption 2002, Leuven, Belgium, 2002.","DOI":"10.1007\/3-540-45661-9_19"},{"key":"28_CR16","doi-asserted-by":"crossref","unstructured":"L.R. Knudsen, \u201cCryptanalysis of LOKI,\u201d Advances in Cryptology-ASIACRYPT\u2019 91, Springer-Verlag, 1993, pp. 22\u201335.","DOI":"10.1007\/3-540-57332-1_2"},{"key":"28_CR17","series-title":"Lect Notes Comput Sci","volume-title":"Advances in Cryptology-CRYPTO\u201996","author":"J. Kilian","year":"1996","unstructured":"J. Kilian, P. Rogaway, \u201cHow to protect DES against exhaustive search (an analysis of DESX),\u201d Advances in Cryptology-CRYPTO\u201996, Lecture Notes in Computer Science, Vol. 1190, Springer-Verlag, 1996."},{"key":"28_CR18","unstructured":"K. Kurosawa, T. Iwata, \u201cTMAC, Two-Key CBC MAC,\u201d ePrint archive: eport 2002\/092, available at http:\/\/eprint.iacr.org\/2002\/092\/ ."},{"key":"28_CR19","doi-asserted-by":"crossref","unstructured":"M Luby, C. Rackoff, \u201cHow to Construct Pseudorandom Permutations from Pseudorandom Functions,\u201d SIAM J. Comput., Vol. 17, No. 2, April 1988.","DOI":"10.1137\/0217022"},{"key":"28_CR20","volume-title":"COSIC Seminar","author":"C.J. Mitchell","year":"2002","unstructured":"C.J. Mitchell, \u201cThe security of two-key DESX,\u201d COSIC Seminar, Katholieke Universiteit Leuven, 15th March 2002, Leuven, Belgium."},{"key":"28_CR21","unstructured":"S. Moriai, H. Imai, \u201c2-Key XCBC: The CBC-MAC for Arbitrary Length Messages by the Two-key Construction,\u201d a talk at the Recent Results session of Fast Software Encryption 2002, Leuven, 2002."},{"key":"28_CR22","unstructured":"S. Moriai, H. Imai, \u201c2-Key XCBC: The CBC MAC for Arbitrary-Length Messages by the Two-Key Construction,\u201d In the Proc. of SCIS2002, The 2002 Symposium on Cryptography and Information Security, The Institute of Electronics, Information and Communication Engineers, 2002 (in Japanese)."},{"key":"28_CR23","series-title":"Lect Notes Comput Sci","volume-title":"Final Report of Race Integrity Primitives","author":"RACE. A. Berendschot","year":"1995","unstructured":"RACE. A. Berendschot, B. den Boer, J. Boly, A. Bosselaers, J. Brandt, D. Chaum, I. Damgaard, M. Dichtl, W. Fumy, M. van der Ham, C. Jansen, P. Landrock, B. Preneel, G. Roelofsen, P. de Rooij, J. Vandewalle, Final Report of Race Integrity Primitives, Lecture Notes in Computer Science, Vol. 1007, Springer-Verlag, 1995."}],"container-title":["Lecture Notes in Computer Science","Information and Communications Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-36159-6_28","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,2]],"date-time":"2019-05-02T17:07:00Z","timestamp":1556816820000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-36159-6_28"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2002]]},"ISBN":["9783540001645","9783540361596"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/3-540-36159-6_28","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[2002]]}}}