{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T08:26:28Z","timestamp":1725870388576},"publisher-location":"Cham","reference-count":14,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319491509"},{"type":"electronic","value":"9783319491516"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-49151-6_9","type":"book-chapter","created":{"date-parts":[[2016,11,3]],"date-time":"2016-11-03T22:09:46Z","timestamp":1478210986000},"page":"122-136","source":"Crossref","is-referenced-by-count":1,"title":["Collision Attacks on CAESAR Second-Round Candidate: ELmD"],"prefix":"10.1007","author":[{"given":"Jian","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Wenling","family":"Wu","sequence":"additional","affiliation":[]},{"given":"Yafei","family":"Zheng","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,11,5]]},"reference":[{"key":"9_CR1","unstructured":"Cryptographic competitions: Caesar. http:\/\/competitions.cr.yp.to\/caesar-call.html"},{"key":"9_CR2","unstructured":"Andreeva, E., Bogdanov, A., Luykx, A., Mennink, B., Tischhauser, E., Yasuda, K.: Aes-copa v. 2 (2015). http:\/\/competitions.cr.yp.to\/round2\/aescopav2.pdf"},{"key":"9_CR3","unstructured":"Bay, A., Ersoy, O., Karako\u00e7, F.: Universal forgery and key recovery attacks on ELmD authenticated encryption algorithm. Cryptology ePrint Archive, report 2016\/640 (2016). http:\/\/eprint.iacr.org"},{"issue":"1","key":"9_CR4","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1007\/BF00630563","volume":"4","author":"E Biham","year":"1991","unstructured":"Biham, E., Shamir, A.: Differential cryptanalysis of des-like cryptosystems. J. Cryptol. 4(1), 3\u201372 (1991)","journal-title":"J. Cryptol."},{"key":"9_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1007\/11935230_3","volume-title":"Advances in Cryptology \u2013 ASIACRYPT 2006","author":"S Contini","year":"2006","unstructured":"Contini, S., Yin, Y.L.: Forgery and partial key-recovery attacks on HMAC and NMAC using hash collisions. In: Lai, X., Chen, K. (eds.) ASIACRYPT 2006. LNCS, vol. 4284, pp. 37\u201353. Springer, Heidelberg (2006). doi: 10.1007\/11935230_3"},{"key":"9_CR6","unstructured":"Datta, N., Nandi, M.: ELmD v2.0 specification (2015). http:\/\/competitions.cr.yp.to\/round2\/elmdv20.pdf"},{"key":"9_CR7","doi-asserted-by":"crossref","unstructured":"Dunkelman, O., Keller, N., Shamir, A.: Almost universal forgery attacks on AES-based MACs. Des. Codes Cryptography 1\u201319 (2014)","DOI":"10.1007\/s10623-014-9969-x"},{"key":"9_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"510","DOI":"10.1007\/978-3-662-48800-3_21","volume-title":"Advances in Cryptology \u2013 ASIACRYPT 2015","author":"T Fuhr","year":"2015","unstructured":"Fuhr, T., Leurent, G., Suder, V.: Collision attacks against CAESAR candidates. In: Iwata, T., Cheon, J.H. (eds.) ASIACRYPT 2015. LNCS, vol. 9453, pp. 510\u2013532. Springer, Heidelberg (2015). doi: 10.1007\/978-3-662-48800-3_21"},{"key":"9_CR9","unstructured":"Guo, J.: Marble specification version 1.0 (2014). http:\/\/competitions.cr.yp.to\/round1\/marblev10.pdf"},{"key":"9_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"131","DOI":"10.1007\/978-3-662-44371-2_8","volume-title":"Advances in Cryptology \u2013 CRYPTO 2014","author":"J Guo","year":"2014","unstructured":"Guo, J., Peyrin, T., Sasaki, Y., Wang, L.: Updates on generic attacks against HMAC and NMAC. In: Garay, J.A., Gennaro, R. (eds.) CRYPTO 2014. LNCS, vol. 8616, pp. 131\u2013148. Springer, Heidelberg (2014). doi: 10.1007\/978-3-662-44371-2_8"},{"key":"9_CR11","unstructured":"Hoang, V.T., Krovetz, T., Rogaway, P.: Aez v1: authenticated-encryption by enciphering (2014). http:\/\/web.cs.ucdavis.edu\/~rogaway\/aez\/AEZv3.pdf"},{"key":"9_CR12","unstructured":"Lu, J.: On the security of the COPA and marble authenticated encryption algorithms against (almost) universal forgery attack (2015). http:\/\/eprint.iacr.org"},{"issue":"1","key":"9_CR13","doi-asserted-by":"crossref","first-page":"131","DOI":"10.1007\/s00145-007-9013-7","volume":"21","author":"AA Sel\u00e7uk","year":"2008","unstructured":"Sel\u00e7uk, A.A.: On probability of success in linear and differential cryptanalysis. J. Cryptol. 21(1), 131\u2013147 (2008)","journal-title":"J. Cryptol."},{"key":"9_CR14","unstructured":"Zhang, J., Wenling, W.: Collision attacks on CAESAR second-round candidate: ELmD (full version) (2016). http:\/\/www.escience.cn\/people\/zjcrypto\/index.html"}],"container-title":["Lecture Notes in Computer Science","Information Security Practice and Experience"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-49151-6_9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,15]],"date-time":"2019-09-15T04:01:11Z","timestamp":1568520071000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-49151-6_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319491509","9783319491516"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-49151-6_9","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2016]]}}}