{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,11]],"date-time":"2025-06-11T04:08:26Z","timestamp":1749614906622,"version":"3.41.0"},"publisher-location":"Cham","reference-count":39,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319455068"},{"type":"electronic","value":"9783319455075"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-45507-5_8","type":"book-chapter","created":{"date-parts":[[2016,8,22]],"date-time":"2016-08-22T11:11:04Z","timestamp":1471864264000},"page":"106-123","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["A Blockcipher Based Authentication Encryption"],"prefix":"10.1007","author":[{"given":"Rashed","family":"Mazumder","sequence":"first","affiliation":[]},{"given":"Atsuko","family":"Miyaji","sequence":"additional","affiliation":[]},{"given":"Chunhua","family":"Su","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,8,23]]},"reference":[{"key":"8_CR1","unstructured":"Rogaway, P.: Evaluation of Some Blockcipher Modes of Operation (2011). http:\/\/web.cs.ucdavis.edu\/rogaway\/papers\/modes.pdf"},{"key":"8_CR2","volume-title":"Handbook of Applied Cryptography","author":"AJ Menezes","year":"2001","unstructured":"Menezes, A.J., van Oorschot, P.C., Vanstone, S.A.: Handbook of Applied Cryptography, 5th edn. CRC Press, Boca Raton (2001)","edition":"5"},{"key":"8_CR3","volume-title":"Data & Computer Communications","author":"W Stallings","year":"2013","unstructured":"Stallings, W.: Data & Computer Communications, 10th edn. Pearson, Boston (2013)","edition":"10"},{"key":"8_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"215","DOI":"10.1007\/BFb0053735","volume-title":"Information Security and Privacy","author":"G Hanaoka","year":"1998","unstructured":"Hanaoka, G., Zheng, Y., Imai, H.: LITESET: a light-weight secure electronic transaction protocol. In: Boyd, C., Dawson, E. (eds.) ACISP 1998. LNCS, vol. 1438, pp. 215\u2013226. Springer, Heidelberg (1998)"},{"key":"8_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"461","DOI":"10.1007\/978-3-540-24707-4_57","volume-title":"Computational Science and Its Applications \u2013 ICCSA 2004","author":"H Kim","year":"2004","unstructured":"Kim, H., Kim, T.: Design on mobile secure electronic transaction protocol with component based development. In: Lagan\u00e1, A., Gavrilova, M.L., Kumar, V., Mun, Y., Tan, C.J.K., Gervasi, O. (eds.) ICCSA 2004. LNCS, vol. 3043, pp. 461\u2013470. Springer, Heidelberg (2004)"},{"key":"8_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"234","DOI":"10.1007\/978-3-642-23971-7_31","volume-title":"Web Information Systems and Mining","author":"L-C Cao","year":"2011","unstructured":"Cao, L.-C.: Improving security of SET protocol based on ECC. In: Gong, Z., Luo, X., Chen, J., Lei, J., Wang, F.L. (eds.) WISM 2011, Part I. LNCS, vol. 6987, pp. 234\u2013241. Springer, Heidelberg (2011)"},{"key":"8_CR7","first-page":"175","volume-title":"The Future of Identity in the Information Society","author":"M Lorenz","year":"2008","unstructured":"Lorenz, M.: Authentication and transaction security in e-business. In: Fischer-H\u00fcbner, S., Duquenoy, P., Zuccato, A., Martucci, L. (eds.) The Future of Identity in the Information Society, vol. 262, pp. 175\u2013197. Springer, Heidelberg (2008)"},{"key":"8_CR8","series-title":"CCIS","first-page":"186","volume-title":"ICETE 2009","author":"DV Bailey","year":"2011","unstructured":"Bailey, D.V., Brainard, J., Rohde, S., Paar, C.: Wireless authentication and transaction-confirmation token. In: Obaidat, M.S., Filipe, J. (eds.) ICETE 2009. CCIS, vol. 130, pp. 186\u2013198. Springer, Heidelberg (2011)"},{"key":"8_CR9","series-title":"Lecture Notes in Electrical Engineering","doi-asserted-by":"crossref","first-page":"93","DOI":"10.1007\/978-3-662-45402-2_14","volume-title":"Computer Science and its Applications","author":"P Subpratatsavee","year":"2015","unstructured":"Subpratatsavee, P., Kuacharoen, P.: Transaction authentication using HMAC-based one-time password and QR code. In: Park, J.J.J.H., Stojmenovic, I., Jeong, H.Y., Yi, G. (eds.) Computer Science and Its Applications. LNEE, vol. 330, pp. 93\u201398. Springer, Heidelberg (2015)"},{"key":"8_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"286","DOI":"10.1007\/978-3-642-00730-9_18","volume-title":"Information Security and Cryptology \u2013 ICISC 2008","author":"L Zhang","year":"2009","unstructured":"Zhang, L., Wu, W., Wang, P.: Extended models for message authentication. In: Lee, P.J., Cheon, J.H. (eds.) ICISC 2008. LNCS, vol. 5461, pp. 286\u2013301. Springer, Heidelberg (2009)"},{"issue":"15","key":"8_CR11","doi-asserted-by":"publisher","first-page":"2787","DOI":"10.1016\/j.comnet.2010.05.010","volume":"54","author":"L Atzori","year":"2010","unstructured":"Atzori, L., Iera, A., Morabito, G.: The internet of things: a survey. Comput. Netw. 54(15), 2787\u20132805 (2010). Elsevier","journal-title":"Comput. Netw."},{"key":"8_CR12","doi-asserted-by":"publisher","first-page":"277","DOI":"10.1007\/s00779-016-0912-1","volume":"20","author":"Z Zhou","year":"2016","unstructured":"Zhou, Z., Tsang, K.F., Zhao, Z., Gaalou, W.: Data intelligence on the Internet of Things. Pers. Ubiquit. Comput. 20, 277\u2013281 (2016). doi: 10.1007\/s00779-016-0912_1 . Springer","journal-title":"Pers. Ubiquit. Comput."},{"key":"8_CR13","series-title":"Computer Communications and Networks","volume-title":"Pervasive Computing","author":"P Coppola","year":"2009","unstructured":"Coppola, P., Mea, V.D., Gaspero, L.D., Lomuscio, R., Mischis, D., Mizzaro, S., Nazzi, E., Scagnetto, I., Vassena, L.: AI techniques in a context-aware ubiquitous environment. In: Hassanien, A.E., Abawajy, J.H., Abraham, A., Hagras, H. (eds.) Pervasive Computing. Computer Communications and Networks. Springer, Heidelberg (2009)"},{"key":"8_CR14","doi-asserted-by":"crossref","unstructured":"Zhao, K., Ge, L.: A survey on the internet of things security. In: 9th CIS, pp. 663\u2013667. IEEE (2013). ISBN 978-1-4799-2548-3","DOI":"10.1109\/CIS.2013.145"},{"key":"8_CR15","doi-asserted-by":"crossref","unstructured":"Mennink, B.: Embedded security for internet of things. In: 2nd NCETACS, pp. 1\u20136. IEEE (2011). ISBN 978-1-4244-9578-8","DOI":"10.1109\/NCETACS.2011.5751382"},{"issue":"1","key":"8_CR16","doi-asserted-by":"publisher","first-page":"22","DOI":"10.1109\/JIOT.2014.2306328","volume":"1","author":"A Zanella","year":"2014","unstructured":"Zanella, A., Bui, N., Castellani, A., Vangelista, L., Zorzi, M.: Internet of things for smart cities. IEEE Internet Things J. 1(1), 22\u201332 (2014)","journal-title":"IEEE Internet Things J."},{"key":"8_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"176","DOI":"10.1007\/978-3-642-10868-6_11","volume-title":"Cryptography and Coding","author":"O \u00d6zen","year":"2009","unstructured":"\u00d6zen, O., Stam, M.: Another glance at double-length hashing. In: Parker, M.G. (ed.) Cryptography and Coding 2009. LNCS, vol. 5921, pp. 176\u2013201. Springer, Heidelberg (2009)"},{"key":"8_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"424","DOI":"10.1007\/978-3-642-42033-7_22","volume-title":"Advances in Cryptology - ASIACRYPT 2013","author":"E Andreeva","year":"2013","unstructured":"Andreeva, E., Bogdanov, A., Luykx, A., Mennink, B., Tischhauser, E., Yasuda, K.: Parallelizable and authenticated online ciphers. In: Sako, K., Sarkar, P. (eds.) ASIACRYPT 2013, Part I. LNCS, vol. 8269, pp. 424\u2013443. Springer, Heidelberg (2013)"},{"key":"8_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"168","DOI":"10.1007\/978-3-662-46706-0_9","volume-title":"Fast Software Encryption","author":"E Andreeva","year":"2015","unstructured":"Andreeva, E., Bilgin, B., Bogdanov, A., Luykx, A., Mennink, B., Mouha, N., Yasuda, K.: APE: authenticated permutation-based encryption for lightweight cryptography. In: Cid, C., Rechberger, C. (eds.) FSE 2014. LNCS, vol. 8540, pp. 168\u2013186. Springer, Heidelberg (2015)"},{"key":"8_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"205","DOI":"10.1007\/978-3-662-46706-0_11","volume-title":"Fast Software Encryption","author":"F Abed","year":"2015","unstructured":"Abed, F., Fluhrer, S., Forler, C., List, E., Lucks, S., McGrew, D., Wenzel, J.: Pipelineable on-line encryption. In: Cid, C., Rechberger, C. (eds.) FSE 2014. LNCS, vol. 8540, pp. 205\u2013223. Springer, Heidelberg (2015)"},{"key":"8_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"196","DOI":"10.1007\/978-3-642-34047-5_12","volume-title":"Fast Software Encryption","author":"E Fleischmann","year":"2012","unstructured":"Fleischmann, E., Forler, C., Lucks, S.: McOE: a family of almost foolproof on-line authenticated encryption schemes. In: Canteaut, A. (ed.) FSE 2012. LNCS, vol. 7549, pp. 196\u2013215. Springer, Heidelberg (2012)"},{"key":"8_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1007\/978-3-540-30539-2_2","volume-title":"Advances in Cryptology - ASIACRYPT 2004","author":"P Rogaway","year":"2004","unstructured":"Rogaway, P.: Efficient instantiations of tweakable blockciphers and refinements to modes OCB and PMAC. In: Lee, P.J. (ed.) ASIACRYPT 2004. LNCS, vol. 3329, pp. 16\u201331. Springer, Heidelberg (2004)"},{"key":"8_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"596","DOI":"10.1007\/978-3-642-22792-9_34","volume-title":"Advances in Cryptology \u2013 CRYPTO 2011","author":"K Yasuda","year":"2011","unstructured":"Yasuda, K.: A new variant of PMAC: beyond the birthday bound. In: Rogaway, P. (ed.) CRYPTO 2011. LNCS, vol. 6841, pp. 596\u2013609. Springer, Heidelberg (2011)"},{"key":"8_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"167","DOI":"10.1007\/978-3-319-26059-4_9","volume-title":"Provable Security","author":"Y Naito","year":"2015","unstructured":"Naito, Y.: Full PRF-secure message authentication code based on tweakable block cipher. In: Chakraborty, S. (ed.) ProvSec 2015. LNCS, vol. 9451, pp. 167\u2013182. Springer, Heidelberg (2015). doi: 10.1007\/978-3-319-26059-4_9"},{"key":"8_CR25","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"299","DOI":"10.1007\/11502760_20","volume-title":"Fast Software Encryption","author":"AKL Yau","year":"2005","unstructured":"Yau, A.K.L., Paterson, K.G., Mitchell, C.J.: Padding Oracle attacks on CBC-mode encryption with secret and random IVs. In: Gilbert, H., Handschuh, H. (eds.) FSE 2005. LNCS, vol. 3557, pp. 299\u2013319. Springer, Heidelberg (2005)"},{"key":"8_CR26","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"343","DOI":"10.1007\/11496618_25","volume-title":"Information Security and Cryptology \u2013 ICISC 2004","author":"T Lee","year":"2005","unstructured":"Lee, T., Kim, J.-S., Lee, C.-H., Sung, J., Lee, S.-J., Hong, D.: Padding oracle attacks on multiple modes of operation. In: Park, C., Chee, S. (eds.) ICISC 2004. LNCS, vol. 3506, pp. 343\u2013351. Springer, Heidelberg (2005)"},{"key":"8_CR27","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"305","DOI":"10.1007\/978-3-540-24660-2_24","volume-title":"Topics in Cryptology \u2013 CT-RSA 2004","author":"KG Paterson","year":"2004","unstructured":"Paterson, K.G., Yau, A.K.L.: Padding oracle attacks on the ISO CBC mode encryption standard. In: Okamoto, T. (ed.) CT-RSA 2004. LNCS, vol. 2964, pp. 305\u2013323. Springer, Heidelberg (2004)"},{"key":"8_CR28","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"320","DOI":"10.1007\/3-540-45708-9_21","volume-title":"Advances in Cryptology - CRYPTO 2002","author":"JA Black","year":"2002","unstructured":"Black, J.A., Rogaway, P., Shrimpton, T.: Black-box analysis of the block-cipher-based hash-function constructions from PGV. In: Yung, M. (ed.) CRYPTO 2002. LNCS, vol. 2442, pp. 320\u2013335. Springer, Heidelberg (2002)"},{"key":"8_CR29","doi-asserted-by":"publisher","first-page":"519","DOI":"10.1007\/s00145-010-9071-0","volume":"23","author":"JA Black","year":"2010","unstructured":"Black, J.A., Rogaway, P., Shrimpton, T., Stam, M.: An analysis of the blockcipher-based hash functions from PGV. J. Cryptol. 23, 519\u2013545 (2010)","journal-title":"J. Cryptol."},{"key":"8_CR30","doi-asserted-by":"crossref","unstructured":"Miyaji, A., Mazumder, R.: A new (n, 2n) double block length hash function based on single key scheduling. In: AINA, pp. 564\u2013570. IEEE (2015)","DOI":"10.1109\/AINA.2015.237"},{"key":"8_CR31","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"151","DOI":"10.1007\/978-3-642-24209-0_10","volume-title":"Information Security and Cryptology - ICISC 2010","author":"S Hirose","year":"2011","unstructured":"Hirose, S., Ideguchi, K., Kuwakado, H., Owada, T., Preneel, B., Yoshida, H.: A lightweight 256-bit hash function for hardware and low-end devices: lesamnta-LW. In: Rhee, K.-H., Nyang, D.H. (eds.) ICISC 2010. LNCS, vol. 6829, pp. 151\u2013168. Springer, Heidelberg (2011)"},{"key":"8_CR32","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"181","DOI":"10.1007\/978-3-540-74619-5_12","volume-title":"Fast Software Encryption","author":"Taizo Shirai","year":"2007","unstructured":"Shirai, Taizo, Shibutani, Kyoji, Akishita, Toru, Moriai, Shiho, Iwata, Tetsu: The 128-bit blockcipher CLEFIA (Extended Abstract). In: Biryukov, Alex (ed.) FSE 2007. LNCS, vol. 4593, pp. 181\u2013195. Springer, Heidelberg (2007). IACR archive, https:\/\/www.iacr.org\/archive\/fse2007\/45930182\/45930182.pdf"},{"key":"8_CR33","unstructured":"Yoshida, H.: On the standardization of cryptographic application techniques for IoT devices in ITU techniques for IoT devices in ITU-T and ISO\/IEC JTC 1 T and ISO\/IEC JTC1 (2015). https:\/\/www.ietf.org\/proceedings\/94\/slides\/slides-94-saag-2.pdf,"},{"key":"8_CR34","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"409","DOI":"10.1007\/11761679_25","volume-title":"Advances in Cryptology - EUROCRYPT 2006","author":"M Bellare","year":"2006","unstructured":"Bellare, M., Rogaway, P.: The Security of Triple Encryption and a Framework\u00a0for\u00a0Code-Based\u00a0Game-Playing\u00a0Proofs. In: Vaudenay, S. (ed.) EUROCRYPT 2006. LNCS, vol. 4004, pp. 409\u2013426. Springer, Heidelberg (2006)"},{"key":"8_CR35","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"493","DOI":"10.1007\/978-3-662-47989-6_24","volume-title":"Advances in Cryptology \u2013 CRYPTO 2015","author":"VT Hoang","year":"2015","unstructured":"Hoang, V.T., Reyhanitabar, R., Rogaway, P., Damian, V.: Online authenticated-encryption and its nonce-reuse misuse-resistance. In: Gennaro, R., Robshaw, M. (eds.) Advances in Cryptology \u2013 CRYPTO 2015. LNCS, vol. 9215, pp. 493\u2013517. Springer, Heidelberg (2015)"},{"key":"8_CR36","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"149","DOI":"10.1007\/978-3-662-46706-0_8","volume-title":"Fast Software Encryption","author":"T Iwata","year":"2015","unstructured":"Iwata, T., Minematsu, K., Guo, J., Morioka, S.: CLOC: authenticated encryption for short input. In: Cid, C., Rechberger, C. (eds.) FSE 2014. LNCS, vol. 8540, pp. 149\u2013167. Springer, Heidelberg (2015)"},{"key":"8_CR37","unstructured":"Iwata, T., Minematsu, K., Guo, J., Morioka, S., Kobayashi, E.: SILC: SImple Lightweight CFB. DIAC Competitions. https:\/\/competitions.cr.yp.to\/round2\/silcv2.pdf"},{"key":"8_CR38","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"275","DOI":"10.1007\/978-3-642-55220-5_16","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2014","author":"K Minematsu","year":"2014","unstructured":"Minematsu, K.: Parallelizable rate-1 authenticated encryption from pseudorandom functions. In: Nguyen, P.Q., Oswald, E. (eds.) EUROCRYPT 2014. LNCS, vol. 8441, pp. 275\u2013292. Springer, Heidelberg (2014)"},{"key":"8_CR39","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"198","DOI":"10.1007\/978-3-319-26059-4_11","volume-title":"Provable Security","author":"D Chang","year":"2015","unstructured":"Chang, D., R., S.M., Sanadhya, S.K.: PPAE: practical parazoa authenticated encryption family. In: Au, M.-H., Miyaji, A. (eds.) ProvSec 2015. LNCS, vol. 9451, pp. 198\u2013211. Springer, Heidelberg (2015). doi: 10.1007\/978-3-319-26059-4_11"}],"container-title":["Lecture Notes in Computer Science","Availability, Reliability, and Security in Information Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-45507-5_8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,10]],"date-time":"2025-06-10T11:34:10Z","timestamp":1749555250000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-45507-5_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319455068","9783319455075"],"references-count":39,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-45507-5_8","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2016]]},"assertion":[{"value":"23 August 2016","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"CD-ARES","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Availability, Reliability, and Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Salzburg","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Austria","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2016","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"31 August 2016","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2 September 2016","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ieeeares2016","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}