{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T15:44:50Z","timestamp":1743003890529,"version":"3.40.3"},"publisher-location":"Cham","reference-count":12,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031769337"},{"type":"electronic","value":"9783031769344"}],"license":[{"start":{"date-parts":[[2024,12,12]],"date-time":"2024-12-12T00:00:00Z","timestamp":1733961600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,12,12]],"date-time":"2024-12-12T00:00:00Z","timestamp":1733961600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-3-031-76934-4_6","type":"book-chapter","created":{"date-parts":[[2024,12,17]],"date-time":"2024-12-17T18:15:55Z","timestamp":1734459355000},"page":"92-99","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Mezzo TLS 1.3 Protocol, Suitable for\u00a0Transmitting Already-Encrypted Data"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-7273-4797","authenticated-orcid":false,"given":"Nir","family":"Drucker","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9145-7609","authenticated-orcid":false,"given":"Shay","family":"Gueron","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,12,12]]},"reference":[{"key":"6_CR1","unstructured":"Boringssl. https:\/\/github.com\/google\/boringssl\/blame\/7c2b62e93487b772990fddc1905f22d4cfaee4a4\/ssl\/ssl_aead_ctx.cc#L221C23-L221C23. Accessed July 2024"},{"key":"6_CR2","doi-asserted-by":"publisher","unstructured":"Al\u00a0Fardan, N.J., Paterson, K.G.: Lucky thirteen: breaking the TLS and DTLS record protocols. In: 2013 IEEE Symposium on Security and Privacy, pp. 526\u2013540 (2013). https:\/\/doi.org\/10.1109\/SP.2013.42","DOI":"10.1109\/SP.2013.42"},{"key":"6_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"622","DOI":"10.1007\/978-3-662-49890-3_24","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2016","author":"MR Albrecht","year":"2016","unstructured":"Albrecht, M.R., Paterson, K.G.: Lucky microseconds: a timing attack on Amazon\u2019s s2n implementation of TLS. In: Fischlin, M., Coron, J.-S. (eds.) EUROCRYPT 2016. LNCS, vol. 9665, pp. 622\u2013643. Springer, Heidelberg (2016). https:\/\/doi.org\/10.1007\/978-3-662-49890-3_24"},{"key":"6_CR4","unstructured":"Duong, T., Rizzo, J.: Here come the ninjas. Unpublished manuscript 320 (2011)"},{"key":"6_CR5","doi-asserted-by":"publisher","unstructured":"Dworkin, M.: Recommendation for Block Cipher Modes of Operation: Galois\/Counter Mode (GCM) and GMAC (2007). https:\/\/doi.org\/10.6028\/NIST.SP.800-38d","DOI":"10.6028\/NIST.SP.800-38d"},{"key":"6_CR6","doi-asserted-by":"publisher","unstructured":"Dworkin, M.: Recommendation for Block Cipher Modes of Operation: The XTS-AES Mode for Confidentiality on Storage Devices (2010). https:\/\/doi.org\/10.6028\/NIST.SP.800-38E","DOI":"10.6028\/NIST.SP.800-38E"},{"key":"6_CR7","unstructured":"Gueron, S., Langley, A., Lindell, Y.: AES-GCM-SIV: Specification and Analysis. Cryptology ePrint Archive, Report 2017\/168 (2017). https:\/\/eprint.iacr.org\/2017\/168"},{"key":"6_CR8","doi-asserted-by":"publisher","unstructured":"Gueron, S., Langley, A., Lindell, Y.: AES-GCM-SIV: Nonce Misuse-Resistant Authenticated Encryption. RFC 8452 (2019). https:\/\/doi.org\/10.17487\/RFC8452","DOI":"10.17487\/RFC8452"},{"key":"6_CR9","doi-asserted-by":"publisher","unstructured":"Gueron, S., Lindell, Y.: GCM-SIV: full nonce misuse-resistant authenticated encryption at under one cycle per byte. In: Proceedings of the 22Nd ACM SIGSAC Conference on Computer and Communications Security, CCS 2015, pp. 109\u2013119. ACM, New York (2015). https:\/\/doi.org\/10.1145\/2810103.2813613","DOI":"10.1145\/2810103.2813613"},{"key":"6_CR10","doi-asserted-by":"publisher","unstructured":"McGrew, D., Bailey, D.: AES-CCM Cipher Suites for Transport Layer Security (TLS). RFC 6655 (2012). https:\/\/doi.org\/10.17487\/RFC6655","DOI":"10.17487\/RFC6655"},{"key":"6_CR11","doi-asserted-by":"publisher","unstructured":"Nir, Y., Langley, A.: ChaCha20 and Poly1305 for IETF Protocols. RFC 7539 (2015). https:\/\/doi.org\/10.17487\/RFC7539","DOI":"10.17487\/RFC7539"},{"key":"6_CR12","doi-asserted-by":"publisher","unstructured":"Rescorla, E.: The Transport Layer Security (TLS) Protocol Version 1.3. RFC 8446 (2018). https:\/\/doi.org\/10.17487\/RFC8446","DOI":"10.17487\/RFC8446"}],"container-title":["Lecture Notes in Computer Science","Cyber Security, Cryptology, and Machine Learning"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-76934-4_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,12,17]],"date-time":"2024-12-17T19:02:48Z","timestamp":1734462168000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-76934-4_6"}},"subtitle":["\u2013 Short Paper \u2013"],"short-title":[],"issued":{"date-parts":[[2024,12,12]]},"ISBN":["9783031769337","9783031769344"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-76934-4_6","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2024,12,12]]},"assertion":[{"value":"12 December 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"CSCML","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Symposium on Cyber Security, Cryptology, and Machine Learning","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Be'er Sheva","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Israel","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20 December 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21 December 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"cscml2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.cscml.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}