{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T14:53:36Z","timestamp":1742914416544,"version":"3.40.3"},"publisher-location":"Boston, MA","reference-count":4,"publisher":"Springer US","isbn-type":[{"type":"print","value":"9781441959058"},{"type":"electronic","value":"9781441959065"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-1-4419-5906-5_291","type":"book-chapter","created":{"date-parts":[[2011,10,27]],"date-time":"2011-10-27T13:52:05Z","timestamp":1319723525000},"page":"679-681","source":"Crossref","is-referenced-by-count":0,"title":["Key Encryption Key"],"prefix":"10.1007","author":[{"given":"Torben","family":"Pedersen","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"291_CR1_291","unstructured":"Kerckhoffs A (Jan 1883) La cryptographie militaire. J Sci Mil IX:5\u201338. \n                  http:\/\/www.petitcolas.net\/fabien\/kerckhoffs\/"},{"key":"291_CR2_291","unstructured":"FIPS140 (2001) Security requirements for cryptographic modules. FIPS 140-2. NIST, Gaithersburg, 25 May\u00a02001"},{"key":"291_CR3_291","unstructured":"ISO\/IEC 19790 Information technology\u00a0\u2013 security techniques\u00a0\u2013 security requirements for cryptographic modules"},{"key":"291_CR4_291","unstructured":"ISO 11568-2 (2007) Banking\u00a0\u2013 key management (retail)\u00a0\u2013 symmetric ciphers, their key management and life\u00a0cycle"}],"container-title":["Encyclopedia of Cryptography and Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-1-4419-5906-5_291","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,6,2]],"date-time":"2020-06-02T00:45:51Z","timestamp":1591058751000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-1-4419-5906-5_291"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9781441959058","9781441959065"],"references-count":4,"URL":"https:\/\/doi.org\/10.1007\/978-1-4419-5906-5_291","relation":{},"subject":[],"published":{"date-parts":[[2011]]}}}