{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T05:39:10Z","timestamp":1761975550793},"publisher-location":"Cham","reference-count":19,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319390277"},{"type":"electronic","value":"9783319390284"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-39028-4_8","type":"book-chapter","created":{"date-parts":[[2016,4,30]],"date-time":"2016-04-30T07:42:05Z","timestamp":1462002125000},"page":"97-111","source":"Crossref","is-referenced-by-count":5,"title":["Reviving the Idea of Incremental Cryptography for the Zettabyte Era Use Case: Incremental Hash Functions Based on SHA-3"],"prefix":"10.1007","author":[{"given":"Hristina","family":"Mihajloska","sequence":"first","affiliation":[]},{"given":"Danilo","family":"Gligoroski","sequence":"additional","affiliation":[]},{"given":"Simona","family":"Samardjiska","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,5,1]]},"reference":[{"key":"8_CR1","unstructured":"Amazon web services. An Amazon Company (2015). \n                      http:\/\/aws.amazon.com\/ec2\/instance-types\/"},{"key":"8_CR2","unstructured":"Virtual machine and cloud service sizes for azure. Microsoft (2015). \n                      https:\/\/msdn.microsoft.com\/en-us\/library\/azure\/dn197896.aspx"},{"key":"8_CR3","unstructured":"Historical cost of computer memory and storage. hblok.net \n                      \n                        \n                      \n                      $$\\bullet $$\n                     Freedom, Electronics and Tech, February 2013. \n                      http:\/\/hblok.net\/blog\/storage\/"},{"key":"8_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"216","DOI":"10.1007\/3-540-48658-5_22","volume-title":"Advances in Cryptology - CRYPTO \u201994","author":"M Bellare","year":"1994","unstructured":"Bellare, M., Goldreich, O., Goldwasser, S.: Incremental cryptography: the case of hashing and signing. In: Desmedt, Y.G. (ed.) CRYPTO 1994. LNCS, vol. 839, pp. 216\u2013233. Springer, Heidelberg (1994)"},{"key":"8_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"163","DOI":"10.1007\/3-540-69053-0_13","volume-title":"Advances in Cryptology - EUROCRYPT \u201997","author":"M Bellare","year":"1997","unstructured":"Bellare, M., Micciancio, D.: A new paradigm for collision-free hashing: incrementality at reduced cost. In: Fumy, W. (ed.) EUROCRYPT 1997. LNCS, vol. 1233, pp. 163\u2013192. Springer, Heidelberg (1997)"},{"key":"8_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"217","DOI":"10.1007\/978-3-319-07536-5_14","volume-title":"Applied Cryptography and Network Security","author":"G Bertoni","year":"2014","unstructured":"Bertoni, G., Daemen, J., Peeters, M., Van Assche, G.: Sakura: a flexible coding for tree hashing. In: Boureanu, I., Owesarski, P., Vaudenay, S. (eds.) ACNS 2014. LNCS, vol. 8479, pp. 217\u2013234. Springer, Heidelberg (2014)"},{"key":"8_CR7","doi-asserted-by":"publisher","first-page":"335","DOI":"10.1007\/s10207-013-0220-y","volume":"4","author":"G Bertoni","year":"2014","unstructured":"Bertoni, G., Daemen, J., Peeters, M., Van Assche, G.: Sufficient conditions for sound tree and sequential hashing modes. Int. J. Inf. Secur. 4, 335\u2013353 (2014)","journal-title":"Int. J. Inf. Secur."},{"key":"8_CR8","unstructured":"Chang, F., Dean, J., Ghemawat, S., Hsieh, W.C., Wallach, D.A., Burrows, M., Chandra, T., Fikes, A., Gruber, R.E.: Bigtable: a distributed storage system for structured data. In: Proceedings of the 7th USENIX Symposium on Operating Systems Design and Implementation, OSDI 2006, Berkeley, CA, USA, vol. 7, p. 15. USENIX Association (2006)"},{"key":"8_CR9","unstructured":"Cisco. Cisco visual networking index: Forecast and methodology, 2012\u20132017. White Paper, May 2013"},{"key":"8_CR10","unstructured":"EMC. The EMC Digital Universe study with research and analysis by IDC. Open Report, April 2014"},{"key":"8_CR11","unstructured":"Gligoroski, D., Samardjiska, S.: iSHAKE: incremental hashing with SHAKE128 and SHAKE256 for the zettabyte era. In: SHA-3 Workshop (2014). \n                      http:\/\/csrc.nist.gov\/groups\/ST\/hash\/sha-3\/Aug2014\/documents\/gligoroski_paper_sha3_2014_workshop.pdf"},{"issue":"34","key":"8_CR12","doi-asserted-by":"publisher","first-page":"177","DOI":"10.1016\/j.earscirev.2006.05.001","volume":"78","author":"JK Hart","year":"2006","unstructured":"Hart, J.K., Martinez, K.: Environmental sensor networks: a revolution in the earth system science? Earth-Sci. Rev. 78(34), 177\u2013191 (2006)","journal-title":"Earth-Sci. Rev."},{"key":"8_CR13","unstructured":"Hornby, M.: Review of the best cloud storage services (2015). \n                      http:\/\/www.thetop10bestonlinebackup.com\/cloud-storage\n                      \n                    . Accessed 01 Mar 2016"},{"key":"8_CR14","unstructured":"Kelsey, J.: What should be in a parallel hashing standard? In: NIST, 2014 SHA3 Workshop (2014). \n                      http:\/\/csrc.nist.gov\/groups\/ST\/hash\/sha-3\/Aug2014\/documents\/kelsey_sha3_2014_panel.pdf"},{"key":"8_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"369","DOI":"10.1007\/3-540-48184-2_32","volume-title":"Advances in Cryptology - CRYPTO \u201987","author":"RC Merkle","year":"1988","unstructured":"Merkle, R.C.: A digital signature based on a conventional encryption function. In: Pomerance, C. (ed.) CRYPTO 1987. LNCS, vol. 293, pp. 369\u2013378. Springer, Heidelberg (1988)"},{"key":"8_CR16","unstructured":"Mike, S.: How are digital movies distributed and screened? every question answered! \n                      http:\/\/goo.gl\/qLYoIV\n                      \n                    . Accessed 01 Mar 2016"},{"key":"8_CR17","unstructured":"NIST. DRAFT SHA-3 Standard: Permutation-Based Hash and Extendable-Output Functions. FIPS 202, April 2014"},{"key":"8_CR18","unstructured":"National Centers for Environmental Information NOAA. Climate Forecast System Version 2 (CFSv2). \n                      https:\/\/www.ncdc.noaa.gov\/data-access\/model-data\/model-datasets\/climate-forecast-system-version2-cfsv2"},{"key":"8_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"288","DOI":"10.1007\/3-540-45708-9_19","volume-title":"Advances in Cryptology - CRYPTO 2002","author":"D Wagner","year":"2002","unstructured":"Wagner, D.: A generalized birthday problem. In: Yung, M. (ed.) CRYPTO 2002. LNCS, vol. 2442, pp. 288\u2013303. Springer, Heidelberg (2002)"}],"container-title":["Lecture Notes in Computer Science","Open Problems in Network Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-39028-4_8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T22:26:38Z","timestamp":1559427998000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-39028-4_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319390277","9783319390284"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-39028-4_8","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2016]]}}}