{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T18:01:33Z","timestamp":1725904893825},"publisher-location":"Cham","reference-count":25,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319612720"},{"type":"electronic","value":"9783319612737"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-61273-7_8","type":"book-chapter","created":{"date-parts":[[2017,7,13]],"date-time":"2017-07-13T07:22:58Z","timestamp":1499930578000},"page":"145-167","source":"Crossref","is-referenced-by-count":2,"title":["Randomized Stopping Times and Provably Secure Pseudorandom Permutation Generators"],"prefix":"10.1007","author":[{"given":"Michal","family":"Kulis","sequence":"first","affiliation":[]},{"given":"Pawel","family":"Lorek","sequence":"additional","affiliation":[]},{"given":"Filip","family":"Zagorski","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,7,14]]},"reference":[{"key":"8_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"622","DOI":"10.1007\/978-3-662-49890-3_24","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2016","author":"MR Albrecht","year":"2016","unstructured":"Albrecht, M.R., Paterson, K.G.: Lucky microseconds: a timing attack on Amazon\u2019s s2n implementation of TLS. In: Fischlin, M., Coron, J.-S. (eds.) EUROCRYPT 2016. LNCS, vol. 9665, pp. 622\u2013643. Springer, Heidelberg (2016). doi: 10.1007\/978-3-662-49890-3_24"},{"issue":"5","key":"8_CR2","doi-asserted-by":"crossref","first-page":"333","DOI":"10.2307\/2323590","volume":"93","author":"D Aldous","year":"1986","unstructured":"Aldous, D., Diaconis, P.: Shuffling cards and stopping times. Am. Math. Mon. 93(5), 333\u2013348 (1986)","journal-title":"Am. Math. Mon."},{"key":"8_CR3","doi-asserted-by":"crossref","first-page":"69","DOI":"10.1016\/0196-8858(87)90006-6","volume":"8","author":"D Aldous","year":"1987","unstructured":"Aldous, D., Diaconis, P.: Strong uniform times and finite random walks. Adv. Appl. Math. 8, 69\u201397 (1987)","journal-title":"Adv. Appl. Math."},{"key":"8_CR4","doi-asserted-by":"crossref","unstructured":"AlFardan, N., Bernstein, D.J., Paterson, K.G., Poettering, B., Schuldt, J.C.N.: On the security of RC4 in TLS. In: Presented as Part of the 22nd USENIX Security Symposium (USENIX Security 13), Washington, D.C., pp. 305\u2013320. USENIX (2013)","DOI":"10.1109\/MPRV.2013.43"},{"key":"8_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"204","DOI":"10.1007\/978-3-319-22174-8_12","volume-title":"Progress in Cryptology \u2013 LATINCRYPT 2015","author":"R Ankele","year":"2015","unstructured":"Ankele, R., K\u00f6lbl, S., Rechberger, C.: State-recovery analysis of spritz. In: Lauter, K., Rodr\u00edguez-Henr\u00edquez, F. (eds.) LATINCRYPT 2015. LNCS, vol. 9230, pp. 204\u2013221. Springer, Cham (2015). doi: 10.1007\/978-3-319-22174-8_12"},{"key":"8_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"63","DOI":"10.1007\/978-3-662-52993-5_4","volume-title":"Fast Software Encryption","author":"S Banik","year":"2016","unstructured":"Banik, S., Isobe, T.: Cryptanalysis of the full spritz stream cipher. In: Peyrin, T. (ed.) FSE 2016. LNCS, vol. 9783, pp. 63\u201377. Springer, Heidelberg (2016). doi: 10.1007\/978-3-662-52993-5_4"},{"issue":"2","key":"8_CR7","doi-asserted-by":"crossref","first-page":"159","DOI":"10.1007\/BF00535487","volume":"57","author":"P Diaconis","year":"1981","unstructured":"Diaconis, P., Shahshahani, M.: Generating a random permutation with random transpositions. Zeitschrift fur Wahrscheinlichkeitstheorie und Verwandte Gebiete 57(2), 159\u2013179 (1981)","journal-title":"Zeitschrift fur Wahrscheinlichkeitstheorie und Verwandte Gebiete"},{"issue":"1","key":"8_CR8","doi-asserted-by":"crossref","first-page":"131","DOI":"10.1214\/aoap\/1027961037","volume":"8","author":"JA Fill","year":"1998","unstructured":"Fill, J.A.: An interruptible algorithm for perfect sampling via Markov chains. Ann. Appl. Probab. 8(1), 131\u2013162 (1998)","journal-title":"Ann. Appl. Probab."},{"key":"8_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/3-540-45537-X_1","volume-title":"Selected Areas in Cryptography","author":"S Fluhrer","year":"2001","unstructured":"Fluhrer, S., Mantin, I., Shamir, A.: Weaknesses in the key scheduling algorithm of RC4. In: Vaudenay, S., Youssef, A.M. (eds.) SAC 2001. LNCS, vol. 2259, pp. 1\u201324. Springer, Heidelberg (2001). doi: 10.1007\/3-540-45537-X_1"},{"key":"8_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1007\/3-540-44706-7_2","volume-title":"Fast Software Encryption","author":"SR Fluhrer","year":"2001","unstructured":"Fluhrer, S.R., McGrew, D.A.: Statistical analysis of the alleged RC4 keystream generator. In: Goos, G., Hartmanis, J., Leeuwen, J., Schneier, B. (eds.) FSE 2000. LNCS, vol. 1978, pp. 19\u201330. Springer, Heidelberg (2001). doi: 10.1007\/3-540-44706-7_2"},{"key":"8_CR11","doi-asserted-by":"crossref","unstructured":"Ge, Q., Yarom, Y., Cock, D., Heiser, G.: A Survey of Microarchitectural Timing Attacks and Countermeasures on Contemporary Hardware. IACR Eprint (2016)","DOI":"10.1007\/s13389-016-0141-6"},{"key":"8_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"226","DOI":"10.1007\/3-540-69053-0_16","volume-title":"Advances in Cryptology \u2014 EUROCRYPT 1997","author":"JD Goli\u0107","year":"1997","unstructured":"Goli\u0107, J.D.: Linear statistical weakness of alleged RC4 keystream generator. In: Fumy, W. (ed.) EUROCRYPT 1997. LNCS, vol. 1233, pp. 226\u2013238. Springer, Heidelberg (1997). doi: 10.1007\/3-540-69053-0_16"},{"key":"8_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"152","DOI":"10.1007\/3-540-45473-X_13","volume-title":"Fast Software Encryption","author":"I Mantin","year":"2002","unstructured":"Mantin, I., Shamir, A.: A practical attack on broadcast RC4. In: Matsui, M. (ed.) FSE 2001. LNCS, vol. 2355, pp. 152\u2013164. Springer, Heidelberg (2002). doi: 10.1007\/3-540-45473-X_13"},{"issue":"4","key":"8_CR14","doi-asserted-by":"crossref","first-page":"411","DOI":"10.1007\/BF01048728","volume":"1","author":"P Matthews","year":"1988","unstructured":"Matthews, P.: A strong uniform time for random transpositions. J. Theoret. Probab. 1(4), 411\u2013423 (1988)","journal-title":"J. Theoret. Probab."},{"key":"8_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"304","DOI":"10.1007\/3-540-45708-9_20","volume-title":"Advances in Cryptology \u2014 CRYPTO 2002","author":"I Mironov","year":"2002","unstructured":"Mironov, I.: (Not so) random shuffles of RC4. In: Yung, M. (ed.) CRYPTO 2002. LNCS, vol. 2442, pp. 304\u2013319. Springer, Heidelberg (2002). doi: 10.1007\/3-540-45708-9_20"},{"key":"8_CR16","doi-asserted-by":"crossref","unstructured":"Mossel, E., Peres, Y., Sinclair, A.: Shuffling by semi-random transpositions. In: Foundations of Computer Science, pp. 572\u2013581 (2004)","DOI":"10.1109\/FOCS.2004.60"},{"key":"8_CR17","doi-asserted-by":"crossref","unstructured":"Naor, M., Reingold, O.: On the construction of pseudo-random permutations. In: Proceedings of the Twenty-Ninth Annual ACM Symposium on Theory of Computing - STOC 1997, pp. 189\u2013199. ACM Press, New York (1997)","DOI":"10.1145\/258533.258581"},{"key":"8_CR18","unstructured":"Pereida Garc\u00eda, C., Brumley, B.B., Yarom, Y.: Make sure DSA signing exponentiations really are constant-time"},{"key":"8_CR19","doi-asserted-by":"crossref","first-page":"223","DOI":"10.1002\/(SICI)1098-2418(199608\/09)9:1\/2<223::AID-RSA14>3.0.CO;2-O","volume":"9","author":"JG Propp","year":"1996","unstructured":"Propp, J.G., Wilson, D.B.: Exact sampling with coupled Markov chains and applications to statistical mechanics. Random Struct. Algorithms 9, 223\u2013252 (1996)","journal-title":"Random Struct. Algorithms"},{"key":"8_CR20","unstructured":"Schuldt, J.C.N., Rivest, R.L.: Spritz\u2013a spongy RC4-like stream cipher and hash function (2014)"},{"key":"8_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"245","DOI":"10.1007\/978-3-540-25937-4_16","volume-title":"Fast Software Encryption","author":"S Paul","year":"2004","unstructured":"Paul, S., Preneel, B.: A new weakness in the RC4 keystream generator and an approach to improve the security of the cipher. In: Roy, B., Meier, W. (eds.) FSE 2004. LNCS, vol. 3017, pp. 245\u2013259. Springer, Heidelberg (2004). doi: 10.1007\/978-3-540-25937-4_16"},{"key":"8_CR22","doi-asserted-by":"publisher","first-page":"99","DOI":"10.1007\/978-3-642-14452-3_5","volume-title":"Towards Hardware-Intrinsic Security","author":"F-X Standaert","year":"2010","unstructured":"Standaert, F.-X., Pereira, O., Yu, Y., Quisquater, J.-J., Yung, M., Oswald, E.: Leakage resilient cryptography in practice. In: Sadeghi, A.-R., Naccache, D. (eds.) Towards Hardware-Intrinsic Security, pp. 99\u2013134. Springer, Heidelberg (2010). doi: 10.1007\/978-3-642-14452-3_5"},{"key":"8_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"27","DOI":"10.1007\/978-3-540-89754-5_3","volume-title":"Progress in Cryptology - INDOCRYPT 2008","author":"S Maitra","year":"2008","unstructured":"Maitra, S., Paul, G.: Analysis of RC4 and proposal of additional layers for better security margin. In: Chowdhury, D.R., Rijmen, V., Das, A. (eds.) INDOCRYPT 2008. LNCS, vol. 5365, pp. 27\u201339. Springer, Heidelberg (2008). doi: 10.1007\/978-3-540-89754-5_3"},{"key":"8_CR24","doi-asserted-by":"crossref","unstructured":"Yarom, Y., Genkin, D., Heninger, N.: CacheBleed: a timing attack on OpenSSL constant time RSA. CHES (2016)","DOI":"10.1007\/978-3-662-53140-2_17"},{"key":"8_CR25","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"210","DOI":"10.1007\/978-3-540-25937-4_14","volume-title":"Fast Software Encryption","author":"B Zoltak","year":"2004","unstructured":"Zoltak, B.: VMPC one-way function and stream cipher. In: Roy, B., Meier, W. (eds.) FSE 2004. LNCS, vol. 3017, pp. 210\u2013225. Springer, Heidelberg (2004). doi: 10.1007\/978-3-540-25937-4_14"}],"container-title":["Lecture Notes in Computer Science","Paradigms in Cryptology \u2013 Mycrypt 2016. Malicious and Exploratory Cryptology"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-61273-7_8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,29]],"date-time":"2019-09-29T20:58:11Z","timestamp":1569790691000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-61273-7_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319612720","9783319612737"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-61273-7_8","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]}}}