{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T22:49:39Z","timestamp":1725922179561},"publisher-location":"Cham","reference-count":21,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319710747"},{"type":"electronic","value":"9783319710754"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-71075-4_13","type":"book-chapter","created":{"date-parts":[[2017,11,28]],"date-time":"2017-11-28T12:37:18Z","timestamp":1511872638000},"page":"109-115","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Extending Full Disk Encryption for the Future"],"prefix":"10.1007","author":[{"given":"Milan","family":"Bro\u017e","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,11,29]]},"reference":[{"key":"13_CR1","unstructured":"Verified Boot. https:\/\/source.android.com\/security\/verifiedboot\/"},{"key":"13_CR2","unstructured":"IEEE 1619-2007 - Standard for Cryptographic Protection of Data on Block-Oriented Storage Devices (2008)"},{"key":"13_CR3","unstructured":"IEEE Standard for Authenticated Encryption With Length Expansion for Storage Devices. IEEE Std 1619.1-2007, pp. c1\u201345, May 2008"},{"key":"13_CR4","unstructured":"CAESAR: Competition for Authenticated Encryption: Security, Applicability, and Robustness (2016). https:\/\/competitions.cr.yp.to\/caesar.html"},{"key":"13_CR5","unstructured":"LUKS: Linux Unified Key Setup (2016). https:\/\/gitlab.com\/cryptsetup\/cryptsetup"},{"issue":"3","key":"13_CR6","doi-asserted-by":"crossref","first-page":"8:1","DOI":"10.1145\/1416944.1416947","volume":"4","author":"LN Bairavasundaram","year":"2008","unstructured":"Bairavasundaram, L.N., Arpaci-Dusseau, A.C., Arpaci-Dusseau, R.H., Goodson, G.R., Schroeder, B.: An analysis of data corruption in the storage stack. Trans. Storage 4(3), 8:1\u20138:28 (2008). http:\/\/doi.acm.org\/10.1145\/1416944.1416947","journal-title":"Trans. Storage"},{"issue":"3","key":"13_CR7","doi-asserted-by":"crossref","first-page":"74","DOI":"10.1109\/MSP.2014.60","volume":"12","author":"M Bro\u017e","year":"2014","unstructured":"Bro\u017e, M., Maty\u00e1\u0161, V.: The TrueCrypt on-disk format - an independent view. IEEE Secur. Priv. 12(3), 74\u201377 (2014)","journal-title":"IEEE Secur. Priv."},{"key":"13_CR8","unstructured":"Chakraborty, D., Mancillas-Lopez, C., Sarkar, P.: Disk encryption: Do we need to preserve length? Cryptology ePrint Archive, Report 2015\/594 (2015)"},{"key":"13_CR9","doi-asserted-by":"crossref","unstructured":"Dworkin, M.J.: SP 800-38A, 2001 Edition. Recommendation for Block Cipher Modes of Operation: Methods and Techniques. Technical report, Gaithersburg, MD, United States (2001)","DOI":"10.6028\/NIST.SP.800-38a"},{"key":"13_CR10","doi-asserted-by":"crossref","unstructured":"Dworkin, M.J.: SP 800-38D. Recommendation for Block Cipher Modes of Operation: Galois\/Counter Mode (GCM) and GMAC. Technical report, National Institute of Standards & Technology, Gaithersburg, MD, United States (2007)","DOI":"10.6028\/NIST.SP.800-38d"},{"key":"13_CR11","doi-asserted-by":"crossref","unstructured":"Dworkin, M.J.: SP 800-38E. Recommendation for Block Cipher Modes of Operation: The XTS-AES Mode for Confidentiality on Storage Devices. Technical report, National Institute of Standards & Technology, Gaithersburg, MD, United States (2010)","DOI":"10.6028\/NIST.SP.800-38e"},{"key":"13_CR12","unstructured":"Ferguson, N.: AES-CBC + Elephant diffuser: a disk encryption algorithm for Windows Vista. Technical report, Microsoft Corporation (2006). http:\/\/download.microsoft.com\/download\/0\/2\/3\/0238acaf-d3bf-4a6d-b3d6-0a0be4bbb36e\/BitLockerCipher200608.pdf"},{"key":"13_CR13","unstructured":"Fruhwirth, C.: New methods in hard disk encryption. Ph.D. thesis, Institute for Computer Languages Theory and Logic Group Vienna University of Technology (2005). http:\/\/clemens.endorphin.org\/publications"},{"key":"13_CR14","unstructured":"Holt, K.: End-to-End Data Protection Justification (2003). T10 Technical Committee proposal letter. www.t10.org\/ftp\/t10\/document.03\/03-224r0.pdf"},{"key":"13_CR15","unstructured":"Khati, L., Mouha, N., Vergnaud, D.: Full disk encryption: bridging theory and practice. Cryptology ePrint Archive, Report 2016\/1114 (2016). http:\/\/eprint.iacr.org\/2016\/1114"},{"key":"13_CR16","unstructured":"Lindell, Y., Langley, A., Gueron, S.: AES-GCM-SIV: Nonce Misuse-Resistant Authenticated Encryption. Internet-Draft draft-irtf-cfrg-gcmsiv-03, Internet Engineering Task Force, April 2016, work in Progress. https:\/\/tools.ietf.org\/html\/draft-irtf-cfrg-gcmsiv-03"},{"issue":"5","key":"13_CR17","doi-asserted-by":"crossref","first-page":"491","DOI":"10.1109\/TDSC.2014.2369041","volume":"12","author":"T M\u00fcller","year":"2014","unstructured":"M\u00fcller, T., Freiling, F.: A systematic assessment of the security of full disk encryption. Trans. Dependable Secure Comput. (TDSC) 12(5), 491\u2013503 (2014)","journal-title":"Trans. Dependable Secure Comput. (TDSC)"},{"key":"13_CR18","unstructured":"M\u00fcller, T., Latzo, T., Freiling, F.: Self-encrypting disks pose self-decrypting risks: how to break hardware-based full disk encryption. Technical report, Friedrich-Alexander-Universit\u00e4t Erlangen-N\u00fcrnberg (2012). https:\/\/www1.informatik.uni-erlangen.de\/filepool\/projects\/sed\/seds-at-risks.pdf"},{"key":"13_CR19","unstructured":"Petersen, M.K.: T10 Data Integrity Feature (Logical Block Guarding). Linux Storage & Filesystem Workshop (2007). https:\/\/www.usenix.org\/event\/lsf07\/tech\/petersen.pdf"},{"key":"13_CR20","unstructured":"Rogaway, P.: Evaluation of some blockcipher modes of operation. Technical report, University of California, Davis, February 2011. http:\/\/web.cs.ucdavis.edu\/rogaway\/papers\/modes.pdf"},{"key":"13_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"27","DOI":"10.1007\/978-3-540-31815-6_3","volume-title":"Information Security Applications","author":"M-JO Saarinen","year":"2005","unstructured":"Saarinen, M.-J.O.: Encrypted watermarks and linux laptop security. In: Lim, C.H., Yung, M. (eds.) WISA 2004. LNCS, vol. 3325, pp. 27\u201338. Springer, Heidelberg (2005). https:\/\/doi.org\/10.1007\/978-3-540-31815-6_3"}],"container-title":["Lecture Notes in Computer Science","Security Protocols XXV"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-71075-4_13","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,6]],"date-time":"2019-10-06T20:41:54Z","timestamp":1570394514000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-71075-4_13"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319710747","9783319710754"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-71075-4_13","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]}}}