{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:18:20Z","timestamp":1750220300135,"version":"3.41.0"},"publisher-location":"Cham","reference-count":27,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319566139"},{"type":"electronic","value":"9783319566146"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-56614-6_17","type":"book-chapter","created":{"date-parts":[[2017,3,31]],"date-time":"2017-03-31T02:31:20Z","timestamp":1490927480000},"page":"499-527","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Modifying an Enciphering Scheme After Deployment"],"prefix":"10.1007","author":[{"given":"Paul","family":"Grubbs","sequence":"first","affiliation":[]},{"given":"Thomas","family":"Ristenpart","sequence":"additional","affiliation":[]},{"given":"Yuval","family":"Yarom","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,4,1]]},"reference":[{"key":"17_CR1","doi-asserted-by":"crossref","unstructured":"Ac\u0131i\u00e7mez, O., Ko\u00e7, \u00c7.K., Seifert, J.-P.: On the power of simple branch prediction analysis. In: 2nd ACM Symposium on Information, Computer and Communications Security, Singapore (2007)","DOI":"10.1145\/1229285.1266999"},{"key":"17_CR2","doi-asserted-by":"crossref","unstructured":"Ac\u0131i\u00e7mez, O., Seifert, J.-P.: Cheap hardware parallelism implies cheap security. In: Fourth International Workshop on Fault Diagnosis and Tolerance in Cryptography, Vienna, AT, pp. 80\u201391 (2007)","DOI":"10.1109\/FDTC.2007.16"},{"key":"17_CR3","doi-asserted-by":"crossref","unstructured":"Askarov, A., Zhang, D., Myers, A.C.: Predictive black-box mitigation of timing channels. In: Al-Shaer, E., Keromytis, A.D., Shmatikov, V. (eds.) ACM CCS 2010, Chicago, Illinois, USA, October 4\u20138, pp. 297\u2013307. ACM Press (2010)","DOI":"10.1145\/1866307.1866341"},{"key":"17_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"295","DOI":"10.1007\/978-3-642-05445-7_19","volume-title":"Selected Areas in Cryptography","author":"M Bellare","year":"2009","unstructured":"Bellare, M., Ristenpart, T., Rogaway, P., Stegers, T.: Format-preserving encryption. In: Jacobson, M.J., Rijmen, V., Safavi-Naini, R. (eds.) SAC 2009. LNCS, vol. 5867, pp. 295\u2013312. Springer, Heidelberg (2009). doi: 10.1007\/978-3-642-05445-7_19"},{"key":"17_CR5","unstructured":"Bernstein, D.J.: Cache-timing attacks on AES (2005). Preprint available at http:\/\/cr.yp.to\/papers.html#cachetiming"},{"key":"17_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"114","DOI":"10.1007\/3-540-45760-7_9","volume-title":"Topics in Cryptology \u2014 CT-RSA 2002","author":"J Black","year":"2002","unstructured":"Black, J., Rogaway, P.: Ciphers with arbitrary finite domains. In: Preneel, B. (ed.) CT-RSA 2002. LNCS, vol. 2271, pp. 114\u2013130. Springer, Heidelberg (2002). doi: 10.1007\/3-540-45760-7_9"},{"issue":"5","key":"17_CR7","doi-asserted-by":"publisher","first-page":"701","DOI":"10.1016\/j.comnet.2005.01.010","volume":"48","author":"D Brumley","year":"2005","unstructured":"Brumley, D., Boneh, D.: Remote timing attacks are practical. Comput. Netw. 48(5), 701\u2013716 (2005)","journal-title":"Comput. Netw."},{"issue":"3","key":"17_CR8","doi-asserted-by":"publisher","first-page":"285","DOI":"10.1016\/0012-365X(79)90084-0","volume":"25","author":"V Chav\u00e1tal","year":"1979","unstructured":"Chav\u00e1tal, V.: The tail of the hypergeometric distribution. Discrete Math. 25(3), 285\u2013287 (1979)","journal-title":"Discrete Math."},{"key":"17_CR9","doi-asserted-by":"crossref","unstructured":"Cock, D., Ge, Q., Murray, T.C., Heiser, G.: The last mile: an empirical study of timing channels on seL4. In: Ahn, G.-J., Yung, M., Li, N. (eds.) ACM CCS 2014, Scottsdale, AZ, USA, November 3\u20137, pp. 570\u2013581. ACM Press (2014)","DOI":"10.1145\/2660267.2660294"},{"key":"17_CR10","unstructured":"PCI Security Standards Council. The payment card industry data security standard specification. https:\/\/www.pcisecuritystandards.org\/security_standards\/documents.php?agreements=pcidss&association=pcidss"},{"key":"17_CR11","doi-asserted-by":"crossref","unstructured":"Dyer, K.P., Coull, S.E., Ristenpart, T., Shrimpton, T.: Protocol misidentification made easy with format-transforming encryption. In: Proceedings of the 20th ACM Conference on Computer and Communications Secuirty (CCS 2013), November 2013","DOI":"10.1145\/2508859.2516657"},{"key":"17_CR12","unstructured":"Protegrity Inc., Protegrity data protection methods. http:\/\/www.protegrity.com\/data-security-platform\/#protection-methods"},{"key":"17_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1007\/3-540-45708-9_3","volume-title":"Advances in Cryptology \u2014 CRYPTO 2002","author":"M Liskov","year":"2002","unstructured":"Liskov, M., Rivest, R.L., Wagner, D.: Tweakable block ciphers. In: Yung, M. (ed.) CRYPTO 2002. LNCS, vol. 2442, pp. 31\u201346. Springer, Heidelberg (2002). doi: 10.1007\/3-540-45708-9_3"},{"key":"17_CR14","doi-asserted-by":"crossref","unstructured":"Liu, F., Ge, Q., Yarom, Y., Mckeen, F., Rozas, C., Heiser, G., Lee, R.B.: CATalyst: Defeating last-level cache side channel attacks in cloud computing. In: IEEE Symposium on High-Performance Computer Architecture, Barcelona, Spain, March 2016","DOI":"10.1109\/HPCA.2016.7446082"},{"key":"17_CR15","doi-asserted-by":"crossref","unstructured":"Liu, F., Yarom, Y., Ge, Q., Heiser, G., Lee, R.B.: Last-level cache side-channel attacks are practical. In: 2015 IEEE Symposium on Security and Privacy, San Jose, CA, US, pp. 605\u2013622, May 2015","DOI":"10.1109\/SP.2015.43"},{"key":"17_CR16","unstructured":"Luchaup, D., Dyer, K.P., Jha, S., Ristenpart, T., Shrimpton, T.: LibFTE: A user-friendly toolkit for constructing practical format-abiding encryption schemes. In: Proceedings of the 14th Conference on USENIX Security Symposium (2014)"},{"key":"17_CR17","doi-asserted-by":"crossref","unstructured":"Luchaup, D., Shrimpton, T., Ristenpart, T., Jha, S.: Formatted encryption beyond regular languages. In: Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, CCS 2014, New York, USA, pp. 1292\u20131303. ACM (2014)","DOI":"10.1145\/2660267.2660351"},{"key":"17_CR18","unstructured":"Mihir Bellare, T.S., Rogaway, P.: The FFX mode of operation for format-preserving encryption. http:\/\/csrc.nist.gov\/groups\/ST\/toolkit\/BCM\/documents\/proposedmodes\/ffx\/ffx-spec.pdf"},{"key":"17_CR19","unstructured":"Osvik, D.A., Shamir, A., Tromer, E.: Cache attacks and countermeasures: the case of AES. Cryptology ePrint Archive, Report 2005\/271, 2005. http:\/\/eprint.iacr.org\/2005\/271"},{"key":"17_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"392","DOI":"10.1007\/978-3-642-40041-4_22","volume-title":"Advances in Cryptology \u2013 CRYPTO 2013","author":"T Ristenpart","year":"2013","unstructured":"Ristenpart, T., Yilek, S.: The mix-and-cut shuffle: small-domain encryption secure against N queries. In: Canetti, R., Garay, J.A. (eds.) CRYPTO 2013. LNCS, vol. 8042, pp. 392\u2013409. Springer, Heidelberg (2013). doi: 10.1007\/978-3-642-40041-4_22"},{"key":"17_CR21","doi-asserted-by":"crossref","unstructured":"Shi, J., Song, X., Chen, H., Zang, B.: Limiting cache-based side-channel in multi-tenant cloud using dynamic page coloring. In: International Conference on Dependable Systems and Networks Workshops (DSN-W), HK, pp. 194\u2013199, June 2011","DOI":"10.1109\/DSNW.2011.5958812"},{"key":"17_CR22","unstructured":"Skala, M.: Hypergeometric tail inequalities: ending the insanity. http:\/\/arxiv.org\/pdf\/1311.5939v1.pdf"},{"key":"17_CR23","unstructured":"Inc., Skyhigh Networks. Skyhigh for Salesforce. https:\/\/www.skyhighnetworks.com\/product\/salesforce-encryption\/"},{"key":"17_CR24","unstructured":"Varadarajan, V., Ristenpart, T., Swift, M.: Scheduler-based defenses against cross-VM side-channels. In: Proceedings of the 24th USENIX Security Symposium, San Diego, CA, US (2014)"},{"key":"17_CR25","unstructured":"HP Security Voltage. Hp format-preserving encryption. https:\/\/www.voltage.com\/technology\/data-encryption\/hp-format-preserving-encryption\/"},{"key":"17_CR26","doi-asserted-by":"crossref","unstructured":"Wang, Z., Lee, R.B.: New cache designs for thwarting software cache-based side channel attacks. In: Proceedings of the 34th International Symposium on Computer Architecture, San Diego, CA, US (2007)","DOI":"10.1145\/1250662.1250723"},{"key":"17_CR27","unstructured":"Wikipedia. Tokenization. https:\/\/en.wikipedia.org\/wiki\/Tokenization_(data_security)"}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2013 EUROCRYPT 2017"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-56614-6_17","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T19:52:36Z","timestamp":1750189956000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-56614-6_17"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319566139","9783319566146"],"references-count":27,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-56614-6_17","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]},"assertion":[{"value":"1 April 2017","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"EUROCRYPT","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Annual International Conference on the Theory and Applications of Cryptographic Techniques","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Paris","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"France","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2017","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"30 April 2017","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"4 May 2017","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"36","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"eurocrypt2017","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/eurocrypt2017.di.ens.fr\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}