{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T00:50:53Z","timestamp":1740099053587,"version":"3.37.3"},"publisher-location":"Cham","reference-count":16,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319924588"},{"type":"electronic","value":"9783319924595"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-92459-5_29","type":"book-chapter","created":{"date-parts":[[2018,5,28]],"date-time":"2018-05-28T13:39:27Z","timestamp":1527514767000},"page":"357-372","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["A Note on Keys and Keystreams of Chacha20 for Multi-key Channels"],"prefix":"10.1007","author":[{"given":"Adam","family":"Czubak","sequence":"first","affiliation":[]},{"given":"Andrzej","family":"Jasi\u0144ski","sequence":"additional","affiliation":[]},{"given":"Marcin","family":"Szymanek","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,5,29]]},"reference":[{"key":"29_CR1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-04101-3","volume-title":"Understanding Cryptography: A Textbook for Students and Practitioners","author":"C Paar","year":"2010","unstructured":"Paar, C., Pelzl, J.: Understanding Cryptography: A Textbook for Students and Practitioners. Springer, New York (2010). \nhttps:\/\/doi.org\/10.1007\/978-3-642-04101-3"},{"key":"29_CR2","unstructured":"Dierks, T., Rescorla, E.: The transport layer security (TLS) protocol version 1.2. In: Internet Requests for Comments RFC 5246 (2008). \nhttp:\/\/www.rfc-editor.org\/rfc\/rfc5246.txt"},{"key":"29_CR3","unstructured":"Rescorla, E.: The transport layer security (TLS) protocol version 1.3. In: IETF Network Working Group - Internet-Draft (2018). \nhttps:\/\/tools.ietf.org\/html\/draft-ietf-tls-tls13-23"},{"key":"29_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"587","DOI":"10.1007\/978-3-319-63697-9_20","volume-title":"Advances in Cryptology \u2013 CRYPTO 2017","author":"F G\u00fcnther","year":"2017","unstructured":"G\u00fcnther, F., Mazaheri, S.: A formal treatment of multi-key channels. In: Katz, J., Shacham, H. (eds.) CRYPTO 2017. LNCS, vol. 10403, pp. 587\u2013618. Springer, Cham (2017). \nhttps:\/\/doi.org\/10.1007\/978-3-319-63697-9_20"},{"key":"29_CR5","unstructured":"Bernstein, D.J.: ChaCha, a variant of Salsa20. In: Workshop Record of SASC 2008: The State of the Art of Stream Ciphers. \nhttp:\/\/cr.yp.to\/chacha\/chacha-20080128.pdf"},{"key":"29_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"84","DOI":"10.1007\/978-3-540-68351-3_8","volume-title":"New Stream Cipher Designs","author":"DJ Bernstein","year":"2008","unstructured":"Bernstein, D.J.: The salsa20 family of stream ciphers. In: Robshaw, M., Billet, O. (eds.) New Stream Cipher Designs. LNCS, vol. 4986, pp. 84\u201397. Springer, Heidelberg (2008). \nhttps:\/\/doi.org\/10.1007\/978-3-540-68351-3_8"},{"key":"29_CR7","unstructured":"Google Swaps Out Crypto Ciphers in OpenSSL. In: Infosecurity Magazine (2014). \nhttps:\/\/www.infosecurity-magazine.com\/news\/google-swaps-out-crypto-ciphers-in-openssl\/"},{"key":"29_CR8","unstructured":"Popov, A.: Prohibiting RC4 cipher suites. In: Internet Requests for Comments RFC 7465 (2015). \nhttp:\/\/www.rfc-editor.org\/rfc\/rfc7465.txt"},{"key":"29_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/3-540-45537-X_1","volume-title":"Selected Areas in Cryptography","author":"S Fluhrer","year":"2001","unstructured":"Fluhrer, S., Mantin, I., Shamir, A.: Weaknesses in the key scheduling algorithm of RC4. In: Vaudenay, S., Youssef, A.M. (eds.) SAC 2001. LNCS, vol. 2259, pp. 1\u201324. Springer, Heidelberg (2001). \nhttps:\/\/doi.org\/10.1007\/3-540-45537-X_1"},{"key":"29_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"152","DOI":"10.1007\/3-540-45473-X_13","volume-title":"Fast Software Encryption","author":"I Mantin","year":"2002","unstructured":"Mantin, I., Shamir, A.: A practical attack on broadcast RC4. In: Matsui, M. (ed.) FSE 2001. LNCS, vol. 2355, pp. 152\u2013164. Springer, Heidelberg (2002). \nhttps:\/\/doi.org\/10.1007\/3-540-45473-X_13"},{"key":"29_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1007\/3-540-44706-7_2","volume-title":"Fast Software Encryption","author":"SR Fluhrer","year":"2001","unstructured":"Fluhrer, S.R., McGrew, D.A.: Statistical analysis of the alleged RC4 keystream generator. In: Goos, G., Hartmanis, J., van Leeuwen, J., Schneier, B. (eds.) FSE 2000. LNCS, vol. 1978, pp. 19\u201330. Springer, Heidelberg (2001). \nhttps:\/\/doi.org\/10.1007\/3-540-44706-7_2"},{"issue":"2","key":"29_CR12","doi-asserted-by":"publisher","first-page":"147","DOI":"10.1002\/j.1538-7305.1950.tb00463.x","volume":"29","author":"R. W. Hamming","year":"1950","unstructured":"Hamming, R.W.: Error detecting and error correcting codes. Bell Syst. Tech. J. 29(2), 147\u2013160 (1950). \nhttps:\/\/doi.org\/10.1002\/j.1538-7305.1950.tb00463.x","journal-title":"Bell System Technical Journal"},{"key":"29_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"470","DOI":"10.1007\/978-3-540-71039-4_30","volume-title":"Fast Software Encryption","author":"J-P Aumasson","year":"2008","unstructured":"Aumasson, J.-P., Fischer, S., Khazaei, S., Meier, W., Rechberger, C.: New features of latin dances: analysis of salsa, chacha, and rumba. In: Nyberg, K. (ed.) FSE 2008. LNCS, vol. 5086, pp. 470\u2013488. Springer, Heidelberg (2008). \nhttps:\/\/doi.org\/10.1007\/978-3-540-71039-4_30"},{"issue":"3","key":"29_CR14","doi-asserted-by":"publisher","first-page":"269","DOI":"10.1007\/s10623-008-9206-6","volume":"48","author":"Andreas Klein","year":"2008","unstructured":"Klein, A.: Attacks on the RC4 stream cipher. In: Designs, Codes and Cryptography, vol. 48(3), pp. 269\u2013286. Springer, Heidelberg (2008). \nhttps:\/\/doi.org\/10.1007\/s10623-008-9206-6","journal-title":"Designs, Codes and Cryptography"},{"key":"29_CR15","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-03762-2","volume-title":"Data Analysis Statistical and Computational Methods for Scientists and Engineers","author":"S Brandt","year":"2014","unstructured":"Brandt, S.: Data Analysis Statistical and Computational Methods for Scientists and Engineers. Springer, Cham (2014). \nhttps:\/\/doi.org\/10.1007\/978-3-319-03762-2"},{"key":"29_CR16","unstructured":"Langleyand, A., Chang, W., Mavrogiannopoulos, N., Strombergson, J., Josefsson, S.: ChaCha20-Poly1305 cipher suites for transport layer security (TLS). In: Internet Requests for Comments RFC 7905 (2016). \nhttp:\/\/www.rfc-editor.org\/rfc\/rfc7905.txt"}],"container-title":["Communications in Computer and Information Science","Computer Networks"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-92459-5_29","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,5,28]],"date-time":"2018-05-28T13:48:27Z","timestamp":1527515307000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-92459-5_29"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783319924588","9783319924595"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-92459-5_29","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2018]]}}}