{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,21]],"date-time":"2025-05-21T00:44:54Z","timestamp":1747788294011},"publisher-location":"Cham","reference-count":21,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319162942"},{"type":"electronic","value":"9783319162959"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-16295-9_15","type":"book-chapter","created":{"date-parts":[[2015,3,29]],"date-time":"2015-03-29T03:06:51Z","timestamp":1427598411000},"page":"274-287","source":"Crossref","is-referenced-by-count":1,"title":["Key Recovery Attacks on Recent Authenticated Ciphers"],"prefix":"10.1007","author":[{"given":"Andrey","family":"Bogdanov","sequence":"first","affiliation":[]},{"given":"Christoph","family":"Dobraunig","sequence":"additional","affiliation":[]},{"given":"Maria","family":"Eichlseder","sequence":"additional","affiliation":[]},{"given":"Martin M.","family":"Lauridsen","sequence":"additional","affiliation":[]},{"given":"Florian","family":"Mendel","sequence":"additional","affiliation":[]},{"given":"Martin","family":"Schl\u00e4ffer","sequence":"additional","affiliation":[]},{"given":"Elmar","family":"Tischhauser","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,3,29]]},"reference":[{"key":"15_CR1","unstructured":"CAESAR: Competition for Authenticated Encryption: Security, Applicability, and Robustness, March 2014. \n                      http:\/\/competitions.cr.yp.to\/caesar.html"},{"key":"15_CR2","doi-asserted-by":"publisher","first-page":"329","DOI":"10.1049\/iet-ifs.2011.0221","volume":"6","author":"M \u00c5gren","year":"2012","unstructured":"\u00c5gren, M., Hell, M., Johansson, T.: On hardware-oriented message authentication. IET Inf. Secur. 6, 329\u2013336 (2012)","journal-title":"IET Inf. Secur."},{"key":"15_CR3","doi-asserted-by":"publisher","first-page":"48","DOI":"10.1504\/IJWMC.2011.044106","volume":"5","author":"M \u00c5gren","year":"2011","unstructured":"\u00c5gren, M., Hell, M., Johansson, T., Meier, W.: Grain-128a: a new version of Grain-128 with optional authentication. IJWMC 5, 48\u201359 (2011)","journal-title":"IJWMC"},{"key":"15_CR4","unstructured":"Alomair, B.: AVALANCHEv1. Submission to the CAESAR competition (2014). \n                      http:\/\/competitions.cr.yp.to\/round1\/avalanchev1.pdf"},{"key":"15_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"489","DOI":"10.1007\/978-3-642-34931-7_28","volume-title":"Progress in Cryptology - INDOCRYPT 2012","author":"J-P Aumasson","year":"2012","unstructured":"Aumasson, J.-P., Bernstein, D.J.: SipHash: a fast short-input PRF. In: Galbraith, S., Nandi, M. (eds.) INDOCRYPT 2012. LNCS, vol. 7668, pp. 489\u2013508. Springer, Heidelberg (2012)"},{"key":"15_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"531","DOI":"10.1007\/3-540-44448-3_41","volume-title":"Advances in Cryptology - ASIACRYPT 2000","author":"M Bellare","year":"2000","unstructured":"Bellare, M., Namprempre, C.: Authenticated encryption: relations among notions and analysis of the generic composition paradigm. In: Okamoto, T. (ed.) ASIACRYPT 2000. LNCS, vol. 1976, pp. 531\u2013545. Springer, Heidelberg (2000)"},{"key":"15_CR7","unstructured":"Bernstein, D.J.: ChaCha, a variant of Salsa20. In: Workshop Record of SASC 2008: The State of the Art of Stream Ciphers (2008)"},{"key":"15_CR8","unstructured":"Bertoni, G., Daemen, J., Peeters, M., Van Assche, G.: The Keccak SHA-3 submission. Submission to NIST (2011)"},{"key":"15_CR9","doi-asserted-by":"crossref","unstructured":"Dworkin, M.J.: SP 800\u201338C. Recommendation for block cipher modes of operation: the CCM mode for authentication and confidentiality. Technical report, Gaithersburg, MD, United States (2004)","DOI":"10.6028\/NIST.SP.800-38b-2005"},{"key":"15_CR10","doi-asserted-by":"crossref","unstructured":"Dworkin, M.J.: SP 800\u201338D. Recommendation for block cipher modes of operation: galois\/counter mode (GCM) and GMAC. Technical report, Gaithersburg, MD, United States (2007)","DOI":"10.6028\/NIST.SP.800-38d"},{"key":"15_CR11","unstructured":"ISO 19772:2009. Information technology - Security techniques - Authenticated encryption (2009)"},{"key":"15_CR12","doi-asserted-by":"crossref","unstructured":"Jeddi, Z., Amini, E., Bayoumi, M.: A novel authenticated cipher for RFID systems. Int. J. Crypt. Inf. Secur. 4 (2014)","DOI":"10.5121\/ijcis.2014.4102"},{"key":"15_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"284","DOI":"10.1007\/3-540-44706-7_20","volume-title":"Fast Software Encryption","author":"J Katz","year":"2001","unstructured":"Katz, J., Yung, M.: Unforgeable encryption and chosen ciphertext secure modes of operation. In: Schneier, B. (ed.) FSE 2000. LNCS, vol. 1978, pp. 284\u2013299. Springer, Heidelberg (2001)"},{"key":"15_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"306","DOI":"10.1007\/978-3-642-21702-9_18","volume-title":"Fast Software Encryption","author":"T Krovetz","year":"2011","unstructured":"Krovetz, T., Rogaway, P.: The software performance of authenticated-encryption modes. In: Joux, A. (ed.) FSE 2011. LNCS, vol. 6733, pp. 306\u2013327. Springer, Heidelberg (2011)"},{"key":"15_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"343","DOI":"10.1007\/978-3-540-30556-9_27","volume-title":"Progress in Cryptology - INDOCRYPT 2004","author":"DA McGrew","year":"2004","unstructured":"McGrew, D.A., Viega, J.: The security and performance of the galois\/counter mode (GCM) of operation. In: Canteaut, A., Viswanathan, K. (eds.) INDOCRYPT 2004. LNCS, vol. 3348, pp. 343\u2013355. Springer, Heidelberg (2004)"},{"key":"15_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"23","DOI":"10.1007\/978-3-642-35404-5_3","volume-title":"Cryptology and Network Security","author":"F Mendel","year":"2012","unstructured":"Mendel, F., Mennink, B., Rijmen, V., Tischhauser, E.: A simple key-recovery attack on McOE-X. In: Pieprzyk, J., Sadeghi, A.-R., Manulis, M. (eds.) CANS 2012. LNCS, vol. 7712, pp. 23\u201331. Springer, Heidelberg (2012)"},{"key":"15_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"275","DOI":"10.1007\/978-3-642-55220-5_16","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2014","author":"K Minematsu","year":"2014","unstructured":"Minematsu, K.: Parallelizable rate-1 authenticated encryption from pseudorandom functions. In: Nguyen, P.Q., Oswald, E. (eds.) EUROCRYPT 2014. LNCS, vol. 8441, pp. 275\u2013292. Springer, Heidelberg (2014)"},{"key":"15_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"408","DOI":"10.1007\/0-387-34805-0_38","volume-title":"Advances in Cryptology - CRYPTO \u201989","author":"J-J Quisquater","year":"1990","unstructured":"Quisquater, J.-J., Delescaille, J.-P.: How easy is collision search. new results and applications to DES. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol. 435, pp. 408\u2013413. Springer, Heidelberg (1990)"},{"key":"15_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1007\/978-3-540-30539-2_2","volume-title":"Advances in Cryptology - ASIACRYPT 2004","author":"P Rogaway","year":"2004","unstructured":"Rogaway, P.: Efficient instantiations of tweakable blockciphers and refinements to modes OCB and PMAC. In: Lee, P.J. (ed.) ASIACRYPT 2004. LNCS, vol. 3329, pp. 16\u201331. Springer, Heidelberg (2004)"},{"key":"15_CR20","doi-asserted-by":"crossref","unstructured":"Rogaway, P., Bellare, M., Black, J., Krovetz, T.: OCB: a block-cipher mode of operation for efficient authenticated encryption. In: ACM Conference on Computer and Communications Security, pp. 196\u2013205 (2001)","DOI":"10.1145\/501983.502011"},{"key":"15_CR21","unstructured":"Taylor, C.: The Calico Family of Authenticated Ciphers Version 8. Submission to the CAESAR competition (2014). \n                      http:\/\/competitions.cr.yp.to\/round1\/calicov8.pdf"}],"container-title":["Lecture Notes in Computer Science","Progress in Cryptology - LATINCRYPT 2014"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-16295-9_15","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,29]],"date-time":"2019-05-29T14:11:28Z","timestamp":1559139088000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-16295-9_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319162942","9783319162959"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-16295-9_15","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]}}}