{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T01:00:01Z","timestamp":1740099601375,"version":"3.37.3"},"publisher-location":"Cham","reference-count":17,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030410247"},{"type":"electronic","value":"9783030410254"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-41025-4_13","type":"book-chapter","created":{"date-parts":[[2020,2,27]],"date-time":"2020-02-27T14:03:38Z","timestamp":1582812218000},"page":"193-212","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Speeding up OMD Instantiations in Hardware"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-9541-5705","authenticated-orcid":false,"given":"Diana","family":"Maimu\u0163","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9541-1114","authenticated-orcid":false,"given":"\u015etefan Alexandru","family":"Mega","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,2,28]]},"reference":[{"key":"13_CR1","unstructured":"CAESAR. \nhttps:\/\/competitions.cr.yp.to\/caesar.html"},{"key":"13_CR2","unstructured":"OMDv2 CAESAR Submission. \nhttps:\/\/competitions.cr.yp.to\/round2\/omdv20c.pdf"},{"key":"13_CR3","unstructured":"Password Hashing Competition. \nhttps:\/\/password-hashing.net"},{"key":"13_CR4","unstructured":"Source Code. \nhttps:\/\/github.com\/megastefan22\/OMD"},{"key":"13_CR5","unstructured":"Ashur, T., Mennink, B.: Trivial Nonce-misusing attack on pure OMD. IACR Cryptology ePrint Archive (2015)"},{"key":"13_CR6","series-title":"Information Security and Cryptography","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-44757-4","volume-title":"The Hash Function BLAKE","author":"J-P Aumasson","year":"2014","unstructured":"Aumasson, J.-P., Meier, W., Phan, R.C.-W., Henzen, L.: The Hash Function BLAKE. ISC. Springer, Heidelberg (2014). \nhttps:\/\/doi.org\/10.1007\/978-3-662-44757-4"},{"key":"13_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"112","DOI":"10.1007\/978-3-319-13051-4_7","volume-title":"Selected Areas in Cryptography \u2013 SAC 2014","author":"S Cogliani","year":"2014","unstructured":"Cogliani, S., et al.: OMD: a compression function mode of operation for authenticated encryption. In: Joux, A., Youssef, A. (eds.) SAC 2014. LNCS, vol. 8781, pp. 112\u2013128. Springer, Cham (2014). \nhttps:\/\/doi.org\/10.1007\/978-3-319-13051-4_7"},{"key":"13_CR8","unstructured":"Diehl, W., Gaj, K.: RTL implementations and FPGA benchmarking of selected CAESAR round two authenticated ciphers. Microprocess. Microsyst. (2017). \nhttps:\/\/www.sciencedirect.com\/science\/article\/abs\/pii\/S0141933117300352"},{"key":"13_CR9","unstructured":"Homsirikamol, E., Rogawski, M., Gaj, K.: Comparing hardware performance of fourteen round two SHA-3 candidates using FPGAs. IACR Cryptology ePrint Archive (2010). \nhttp:\/\/eprint.iacr.org\/2010\/445"},{"key":"13_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"306","DOI":"10.1007\/978-3-642-21702-9_18","volume-title":"Fast Software Encryption","author":"T Krovetz","year":"2011","unstructured":"Krovetz, T., Rogaway, P.: The software performance of authenticated-encryption modes. In: Joux, A. (ed.) FSE 2011. LNCS, vol. 6733, pp. 306\u2013327. Springer, Heidelberg (2011). \nhttps:\/\/doi.org\/10.1007\/978-3-642-21702-9_18"},{"key":"13_CR11","unstructured":"Maimu\u0163, D.: Authentication and encryption protocols: design, attacks and algorithmic tools. Ph.D. thesis, \u00c9cole normale sup\u00e9rieure (2015)"},{"issue":"2","key":"13_CR12","doi-asserted-by":"publisher","first-page":"70","DOI":"10.1109\/MSP.2014.19","volume":"12","author":"D Maimu\u0163","year":"2014","unstructured":"Maimu\u0163, D., Reyhanitabar, R.: Authenticated encryption: toward next-generation algorithms. IEEE Secur. Privacy 12(2), 70\u201372 (2014)","journal-title":"IEEE Secur. Privacy"},{"key":"13_CR13","unstructured":"National Institute of Standards and Technology: FIPS PUB 180\u20134: Secure Hash Standard. NIST, August 2015"},{"key":"13_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"55","DOI":"10.1007\/978-3-319-12475-9_5","volume-title":"Provable Security","author":"R Reyhanitabar","year":"2014","unstructured":"Reyhanitabar, R., Vaudenay, S., Viz\u00e1r, D.: Misuse-resistant variants of the OMD authenticated encryption mode. In: Chow, S.S.M., Liu, J.K., Hui, L.C.K., Yiu, S.M. (eds.) ProvSec 2014. LNCS, vol. 8782, pp. 55\u201370. Springer, Cham (2014). \nhttps:\/\/doi.org\/10.1007\/978-3-319-12475-9_5"},{"key":"13_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"411","DOI":"10.1007\/978-3-662-48116-5_20","volume-title":"Fast Software Encryption","author":"R Reyhanitabar","year":"2015","unstructured":"Reyhanitabar, R., Vaudenay, S., Viz\u00e1r, D.: Boosting OMD for almost free authentication of associated data. In: Leander, G. (ed.) FSE 2015. LNCS, vol. 9054, pp. 411\u2013427. Springer, Heidelberg (2015). \nhttps:\/\/doi.org\/10.1007\/978-3-662-48116-5_20"},{"key":"13_CR16","doi-asserted-by":"crossref","unstructured":"Rogaway, P.: Authenticated-encryption with associated-data. In: CCS 2002, pp. 98\u2013107. ACM (2002)","DOI":"10.1145\/586110.586125"},{"key":"13_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"348","DOI":"10.1007\/978-3-540-25937-4_22","volume-title":"Fast Software Encryption","author":"P Rogaway","year":"2004","unstructured":"Rogaway, P.: Nonce-based symmetric encryption. In: Roy, B., Meier, W. (eds.) FSE 2004. LNCS, vol. 3017, pp. 348\u2013358. Springer, Heidelberg (2004). \nhttps:\/\/doi.org\/10.1007\/978-3-540-25937-4_22"}],"container-title":["Lecture Notes in Computer Science","Innovative Security Solutions for Information Technology and Communications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-41025-4_13","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,2,27]],"date-time":"2020-02-27T14:05:34Z","timestamp":1582812334000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-41025-4_13"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030410247","9783030410254"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-41025-4_13","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"28 February 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}