{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T23:48:34Z","timestamp":1725839314906},"publisher-location":"Cham","reference-count":14,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319260587"},{"type":"electronic","value":"9783319260594"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-26059-4_11","type":"book-chapter","created":{"date-parts":[[2015,11,27]],"date-time":"2015-11-27T11:59:56Z","timestamp":1448625596000},"page":"198-211","source":"Crossref","is-referenced-by-count":2,"title":["PPAE: Practical Parazoa Authenticated Encryption Family"],"prefix":"10.1007","author":[{"given":"Donghoon","family":"Chang","sequence":"first","affiliation":[]},{"given":"Sumesh Manjunath","family":"R.","sequence":"additional","affiliation":[]},{"given":"Somitra Kumar","family":"Sanadhya","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,11,28]]},"reference":[{"key":"11_CR1","unstructured":"Alizadeh, J., Aref, M.R., Bagheri, N.: Artemia v1 (2014)"},{"issue":"3","key":"11_CR2","doi-asserted-by":"publisher","first-page":"149","DOI":"10.1007\/s10207-012-0157-6","volume":"11","author":"E Andreeva","year":"2012","unstructured":"Andreeva, E., Mennink, B., Preneel, B.: The parazoa family: generalizing the sponge hash functions. Int. J. Inf. Sec. 11(3), 149\u2013165 (2012)","journal-title":"Int. J. Inf. Sec."},{"key":"11_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"19","DOI":"10.1007\/978-3-319-11212-1_2","volume-title":"Computer Security - ESORICS 2014","author":"J-P Aumasson","year":"2014","unstructured":"Aumasson, J.-P., Jovanovic, P., Neves, S.: NORX: parallel and scalable AEAD. In: Kuty\u0142owski, M., Vaidya, J. (eds.) ICAIS 2014, Part II. LNCS, vol. 8713, pp. 19\u201336. Springer, Heidelberg (2014)"},{"key":"11_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"531","DOI":"10.1007\/3-540-44448-3_41","volume-title":"Advances in Cryptology - ASIACRYPT 2000","author":"M Bellare","year":"2000","unstructured":"Bellare, M., Namprempre, C.: Authenticated encryption: relations among notions and analysis of the generic composition paradigm. In: Okamoto, T. (ed.) ASIACRYPT 2000. LNCS, vol. 1976, pp. 531\u2013545. Springer, Heidelberg (2000)"},{"key":"11_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"409","DOI":"10.1007\/11761679_25","volume-title":"Advances in Cryptology - EUROCRYPT 2006","author":"M Bellare","year":"2006","unstructured":"Bellare, M., Rogaway, P.: The security of triple encryption and a framework\u00a0for\u00a0code-based\u00a0game-playing\u00a0proofs. In: Vaudenay, S. (ed.) EUROCRYPT 2006. LNCS, vol. 4004, pp. 409\u2013426. Springer, Heidelberg (2006)"},{"key":"11_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"320","DOI":"10.1007\/978-3-642-28496-0_19","volume-title":"Selected Areas in Cryptography","author":"G Bertoni","year":"2012","unstructured":"Bertoni, G., Daemen, J., Peeters, M., Van Assche, G.: Duplexing the sponge: single-pass authenticated encryption and other applications. In: Miri, A., Vaudenay, S. (eds.) SAC 2011. LNCS, vol. 7118, pp. 320\u2013337. Springer, Heidelberg (2012)"},{"key":"11_CR7","unstructured":"Bertoni, G., Daemen, J., Peeters, M., Van Assche, G., Van Keer, R.: Keyak V1 (2014)"},{"key":"11_CR8","unstructured":"CAESAR. Competition for Authenticated Encryption: Security, Applicability, and Robustness (2013). \n                      http:\/\/competitions.cr.yp.to\/caesar.html"},{"key":"11_CR9","unstructured":"Dobraunig, C., Eichlseder, M., Mendel, F., Martin, S.: Ascon V1 (2014)"},{"key":"11_CR10","unstructured":"Andreeva, E., Bilgin, B., Bogdanov, A., Luykx, A., Mennink, B., Mouha, N., Yasuda, K.: APE: Authenticated Permutation-Based Encryption for Lightweight Cryptography. Cryptology ePrint Archive, Report 2013\/791 (2013). \n                      http:\/\/eprint.iacr.org\/"},{"key":"11_CR11","unstructured":"Bertoni, G., Daemen, J., Peeters, M., Van Assche, G.: Sponge Functions. Ecrypt Hash Workshop 2007 (2007). \n                      http:\/\/sponge.noekeon.org\/SpongeFunctions.pdf"},{"key":"11_CR12","unstructured":"Alizadeh, J., Aref, M.R., Bagheri, N.: JHAE: An Authenticated Encryption Mode Based on JH. Cryptology ePrint Archive, Report 2014\/193 (2014). \n                      http:\/\/eprint.iacr.org\/"},{"key":"11_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"85","DOI":"10.1007\/978-3-662-45611-8_5","volume-title":"Advances in Cryptology \u2013 ASIACRYPT 2014","author":"P Jovanovic","year":"2014","unstructured":"Jovanovic, P., Luykx, A., Mennink, B.: Beyond 2\n                      \n                        \n                      \n                      $$^\\text{c\/2}$$\n                      \n                        \n                          \n                            \n                            c\/2\n                          \n                        \n                      \n                     security in sponge-based authenticated encryption modes. In: Sarkar, P., Iwata, T. (eds.) ASIACRYPT 2014. LNCS, vol. 8873, pp. 85\u2013104. Springer, Heidelberg (2014)"},{"key":"11_CR14","unstructured":"Morawiecki, P., Gaj, K., Homsirikamol, E., Matusiewicz, K., Pieprzyk, J., Rogawski, M., Srebrny, M., Wojcik, M.: ICEPOLE: High-speed, Hardware-oriented Authenticated Encryption. Cryptology ePrint Archive, Report 2014\/266 (2014). \n                      http:\/\/eprint.iacr.org\/"}],"container-title":["Lecture Notes in Computer Science","Provable Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-26059-4_11","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,31]],"date-time":"2019-05-31T14:33:15Z","timestamp":1559313195000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-26059-4_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319260587","9783319260594"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-26059-4_11","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]}}}