{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,25]],"date-time":"2026-02-25T17:12:10Z","timestamp":1772039530820,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":8,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540209966","type":"print"},{"value":"9783540246602","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2004]]},"DOI":"10.1007\/978-3-540-24660-2_24","type":"book-chapter","created":{"date-parts":[[2010,8,2]],"date-time":"2010-08-02T11:18:44Z","timestamp":1280747924000},"page":"305-323","source":"Crossref","is-referenced-by-count":27,"title":["Padding Oracle Attacks on the ISO CBC Mode Encryption Standard"],"prefix":"10.1007","author":[{"given":"Kenneth G.","family":"Paterson","sequence":"first","affiliation":[]},{"given":"Arnold","family":"Yau","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"24_CR1","unstructured":"Black, J., Urtubia, H.: Side-Channel Attacks on Symmetric Encryption Schemes: The Case for Authenticated Encryption. In: Proceedings of the 11th USENIX Security Symposium, San Francisco, CA, USA, August 5-9, pp. 327\u2013338 (2002)"},{"key":"24_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"583","DOI":"10.1007\/978-3-540-45146-4_34","volume-title":"Advances in Cryptology - CRYPTO 2003","author":"B. Canvel","year":"2003","unstructured":"Canvel, B., Hiltgen, A., Vaudenay, S., Vuagnoux, M.: Password Interception in a SSL\/TLS Channel. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol.\u00a02729, pp. 583\u2013599. Springer, Heidelberg (2003)"},{"key":"24_CR3","unstructured":"ISO\/IEC 9797-1: Information technology \u2014 Security tehniques \u2014 Message Auhentication Codes (MACs) \u2014 Part 1: Mechanisms using a block cipher (1999)"},{"key":"24_CR4","unstructured":"ISO\/IEC 10116 (2nd edn): Information technology \u2014 Security techniques \u2014 Modes of operation for an n-bit block cipher (1997)"},{"key":"24_CR5","unstructured":"ISO\/IEC 3rd CD 10116 (3rd edn.): Information technology \u2014 Security techniques \u2014 Modes of operation for an n-bit block cipher (Commitee Draft). 2002."},{"key":"24_CR6","unstructured":"ISO\/IEC FDIS 10118-1: Information technology \u2014 Security techniques \u2014 Hashfunctions \u2014 Part 1: General, Final Draft (2000)"},{"key":"24_CR7","unstructured":"Klima, V., Rosa, T.: Side Channel Attacks on CBC Encrypted Messages in the PKCS#7 Format. Cryptology ePrint Archive, Report 2003\/098 (2003)"},{"key":"24_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"534","DOI":"10.1007\/3-540-46035-7_35","volume-title":"Advances in Cryptology - EUROCRYPT 2002","author":"S. Vaudenay","year":"2002","unstructured":"Vaudenay, S.: Security Flaws Induced by CBC Padding \u2014 Applications to SSL, IPSEC, WTLS.. In: Knudsen, L.R. (ed.) EUROCRYPT 2002. LNCS, vol.\u00a02332, pp. 534\u2013545. Springer, Heidelberg (2002)"}],"container-title":["Lecture Notes in Computer Science","Topics in Cryptology \u2013 CT-RSA 2004"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-24660-2_24","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,3,17]],"date-time":"2019-03-17T13:15:06Z","timestamp":1552828506000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-24660-2_24"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004]]},"ISBN":["9783540209966","9783540246602"],"references-count":8,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-24660-2_24","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2004]]}}}