{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,10]],"date-time":"2026-04-10T04:21:21Z","timestamp":1775794881562,"version":"3.50.1"},"publisher-location":"Cham","reference-count":17,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783319293592","type":"print"},{"value":"9783319293608","type":"electronic"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-29360-8_5","type":"book-chapter","created":{"date-parts":[[2016,2,3]],"date-time":"2016-02-03T05:46:23Z","timestamp":1454478383000},"page":"64-78","source":"Crossref","is-referenced-by-count":7,"title":["Post-Quantum Security Models for Authenticated Encryption"],"prefix":"10.1007","author":[{"given":"Vladimir","family":"Soukharev","sequence":"first","affiliation":[]},{"given":"David","family":"Jao","sequence":"additional","affiliation":[]},{"given":"Srinath","family":"Seshadri","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,2,4]]},"reference":[{"key":"5_CR1","doi-asserted-by":"crossref","unstructured":"Anand, M.V., Targhi, E.E., Tabia, G.N., Unruh, D.: Post-quantum security of the CBC, CFB, OFB, CTR, and XTS modes of operation. PQCrypto (to appear, 2016)","DOI":"10.1007\/978-3-319-29360-8_4"},{"issue":"4","key":"5_CR2","doi-asserted-by":"publisher","first-page":"469","DOI":"10.1007\/s00145-008-9026-x","volume":"21","author":"M Bellare","year":"2008","unstructured":"Bellare, M., Namprempre, C.: Authenticated encryption: relations among notions and analysis of the generic composition paradigm. J. Cryptol. 21(4), 469\u2013491 (2008)","journal-title":"J. Cryptol."},{"key":"5_CR3","unstructured":"Bernstein, D.J.: Cost analysis of hash collisions: will quantum computers make SHARCS obsolete? In: Workshop Record of SHARCS 2009: Special-Purpose Hardware for Attacking Cryptographic Systems, pp. 51\u201382 (2009)"},{"key":"5_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"592","DOI":"10.1007\/978-3-642-38348-9_35","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2013","author":"M Zhandry","year":"2013","unstructured":"Zhandry, M., Boneh, D.: Quantum-secure message authentication codes. In: Johansson, T., Nguyen, P.Q. (eds.) EUROCRYPT 2013. LNCS, vol. 7881, pp. 592\u2013608. Springer, Heidelberg (2013)"},{"key":"5_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"361","DOI":"10.1007\/978-3-642-40084-1_21","volume-title":"Advances in Cryptology \u2013 CRYPTO 2013","author":"D Boneh","year":"2013","unstructured":"Boneh, D., Zhandry, M.: Secure signatures and chosen ciphertext security in a quantum computing world. In: Canetti, R., Garay, J.A. (eds.) CRYPTO 2013, Part II. LNCS, vol. 8043, pp. 361\u2013379. Springer, Heidelberg (2013)"},{"key":"5_CR6","unstructured":"Bos, J.W., Costello, C., Naehrig, M., Stebila, D.: Post-quantum key exchange for the TLS protocol from the ring learning with errors problem. Cryptology ePrint Archive, Report 2014\/599 (2014). \n                    http:\/\/eprint.iacr.org\/"},{"key":"5_CR7","doi-asserted-by":"crossref","unstructured":"Fujioka, A., Suzuki, K., Xagawa, K., Yoneyama, K.: Practical and post-quantum authenticated key exchange from one-way secure key encapsulation mechanism. In: Proceedings of the 8th ACM SIGSAC Symposium on Information, Computer and Communications Security, ASIA CCS 2013, pp. 83\u201394. ACM, New York (2013)","DOI":"10.1145\/2484313.2484323"},{"issue":"7","key":"5_CR8","doi-asserted-by":"publisher","first-page":"1954","DOI":"10.1109\/TC.2014.2346177","volume":"64","author":"T G\u00fcneysu","year":"2015","unstructured":"G\u00fcneysu, T., Lyubashevsky, V., P\u00f6ppelmann, T.: Lattice-based signatures: optimization and implementation on reconfigurable hardware. IEEE Trans. Comput. 64(7), 1954\u20131967 (2015)","journal-title":"IEEE Trans. Comput."},{"key":"5_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"190","DOI":"10.1007\/978-3-642-30057-8_12","volume-title":"Public Key Cryptography \u2013 PKC 2012","author":"B-Y Yang","year":"2012","unstructured":"Yang, B.-Y., Liu, F.-H., Huang, Y.-J.: Public-key cryptography from new multivariate quadratic assumptions. In: Fischlin, M., Buchmann, J., Manulis, M. (eds.) PKC 2012. LNCS, vol. 7293, pp. 190\u2013205. Springer, Heidelberg (2012)"},{"key":"5_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"143","DOI":"10.1007\/3-540-68339-9_13","volume-title":"Advances in Cryptology - EUROCRYPT \u201996","author":"M Jakobsson","year":"1996","unstructured":"Jakobsson, M., Sako, K., Impagliazzo, R.: Designated verifier proofs and their applications. In: Maurer, U.M. (ed.) EUROCRYPT 1996. LNCS, vol. 1070, pp. 143\u2013154. Springer, Heidelberg (1996)"},{"key":"5_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1007\/978-3-642-25405-5_2","volume-title":"Post-Quantum Cryptography","author":"L Feo De","year":"2011","unstructured":"De Feo, L., Jao, D.: Towards quantum-resistant cryptosystems from supersingular elliptic curve isogenies. In: Yang, B.-Y. (ed.) PQCrypto 2011. LNCS, vol. 7071, pp. 19\u201334. Springer, Heidelberg (2011)"},{"key":"5_CR12","unstructured":"Jao, D., Kalach, K., Leonardi, C.: Key compression for isogeny-based cryptography. (in preparation)"},{"issue":"2","key":"5_CR13","doi-asserted-by":"publisher","first-page":"70","DOI":"10.1109\/MSP.2014.19","volume":"12","author":"D Maimut","year":"2014","unstructured":"Maimut, D., Reyhanitabar, R.: Authenticated encryption: toward next-generation algorithms. IEEE Secur. Priv. 12(2), 70\u201372 (2014)","journal-title":"IEEE Secur. Priv."},{"key":"5_CR14","unstructured":"Schanck, J., Whyte, W., Zhang, Z.: A quantum-safe circuit-extension handshake for tor. Cryptology ePrint Archive, Report 2015\/287 (2015). \n                    http:\/\/eprint.iacr.org\/"},{"key":"5_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"239","DOI":"10.1007\/3-540-44647-8_15","volume-title":"Advances in Cryptology - CRYPTO 2001","author":"V Shoup","year":"2001","unstructured":"Shoup, V.: OAEP reconsidered. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 239\u2013259. Springer, Heidelberg (2001)"},{"key":"5_CR16","unstructured":"Song, F.: A note on quantum security for post-quantum cryptography. Cryptology ePrint Archive, Report 2014\/709 (2014). \n                    http:\/\/eprint.iacr.org\/"},{"key":"5_CR17","doi-asserted-by":"crossref","unstructured":"Sun, X., Tian, H., Wang, Y.: Toward quantum-resistant strong designated verifier signature from isogenies. In: Xhafa, F., Barolli, L., Pop, F., Chen, X., Cristea, V. (eds.) INCoS, pp. 292\u2013296. IEEE (2012)","DOI":"10.1109\/iNCoS.2012.70"}],"container-title":["Lecture Notes in Computer Science","Post-Quantum Cryptography"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-29360-8_5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T08:53:22Z","timestamp":1559379202000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-29360-8_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319293592","9783319293608"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-29360-8_5","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016]]}}}