{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T00:43:31Z","timestamp":1725497011368},"publisher-location":"Berlin, Heidelberg","reference-count":16,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540772712"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-77272-9_8","type":"book-chapter","created":{"date-parts":[[2007,12,6]],"date-time":"2007-12-06T06:56:55Z","timestamp":1196924215000},"page":"118-128","source":"Crossref","is-referenced-by-count":1,"title":["Cryptanalysis of the EPBC Authenticated Encryption Mode"],"prefix":"10.1007","author":[{"given":"Chris J.","family":"Mitchell","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"8_CR1","volume-title":"Handbook of Applied Cryptography","author":"A.J. Menezes","year":"1997","unstructured":"Menezes, A.J., van Oorschot, P.C., Vanstone, S.A.: Handbook of Applied Cryptography. CRC Press, Boca Raton (1997)"},{"key":"8_CR2","doi-asserted-by":"publisher","first-page":"206","DOI":"10.1145\/996943.996945","volume":"7","author":"M. Bellare","year":"2004","unstructured":"Bellare, M., Kohno, T., Namprempre, C.: Breaking and provably repairing the SSH authenticated encryption scheme: A case study of the encode-then-encrypt-and-MAC paradigm. ACM Transactions on Information and System Security\u00a07, 206\u2013241 (2004)","journal-title":"ACM Transactions on Information and System Security"},{"key":"8_CR3","unstructured":"Black, J., Urtubia, H.: Side-channel attacks on symmetric encryption schemes: The case for authenticated encryption. In: USENIX 2002. Proceedings of the 11th USENIX Security Symposium, San Francisco, CA, USA August 5-9, 2002 pp. 327\u2013338 (2002)"},{"key":"8_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"583","DOI":"10.1007\/978-3-540-45146-4_34","volume-title":"CRYPTO 2003","author":"B. Canvel","year":"2003","unstructured":"Canvel, B., Hiltgen, A., Vaudenay, S., Vuagnoux, M.: Password interception in a SSL\/TLS channel. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol.\u00a02729, pp. 583\u2013599. Springer, Heidelberg (2003)"},{"key":"8_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"305","DOI":"10.1007\/978-3-540-24660-2_24","volume-title":"CT-RSA 2004","author":"K.G. Paterson","year":"2004","unstructured":"Paterson, K.G., Yau, A.: Padding oracle attacks on the ISO CBC mode padding standard. In: Okamoto, T. (ed.) CT-RSA 2004. LNCS, vol.\u00a02964, pp. 305\u2013323. Springer, Heidelberg (2004)"},{"key":"8_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"534","DOI":"10.1007\/3-540-46035-7_35","volume-title":"EUROCRYPT 2002","author":"S. Vaudenay","year":"2002","unstructured":"Vaudenay, S.: Security flaws induced by CBC padding \u2014 Applications to SSL, IPSEC, WTLS. In: Knudsen, L.R. (ed.) EUROCRYPT 2002. LNCS, vol.\u00a02332, pp. 534\u2013545. Springer, Heidelberg (2002)"},{"key":"8_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"299","DOI":"10.1007\/11502760_20","volume-title":"FSE 2005","author":"A.K.L. Yau","year":"2005","unstructured":"Yau, A.K.L., Paterson, K.G., Mitchell, C.J.: Padding oracle attacks on CBC-mode encryption with secret and random IVs. In: Gilbert, H., Handschuh, H. (eds.) FSE 2005. LNCS, vol.\u00a03557, pp. 299\u2013319. Springer, Heidelberg (2005)"},{"key":"8_CR8","doi-asserted-by":"publisher","first-page":"365","DOI":"10.1145\/937527.937529","volume":"6","author":"P. Rogaway","year":"2003","unstructured":"Rogaway, P., Bellare, M., Black, J.: OCB: A block-cipher mode of operation for efficient authenticated encryption. ACM Transactions on Information and System Security\u00a06, 365\u2013403 (2003)","journal-title":"ACM Transactions on Information and System Security"},{"key":"8_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"389","DOI":"10.1007\/978-3-540-25937-4_25","volume-title":"FSE 2004","author":"M. Bellare","year":"2004","unstructured":"Bellare, M., Rogaway, P., Wagner, D.: The EAX mode of operation. In: Roy, B., Meier, W. (eds.) FSE 2004. LNCS, vol.\u00a03017, pp. 389\u2013407. Springer, Heidelberg (2004)"},{"key":"8_CR10","unstructured":"National Institute of Standards and Technology (NIST): NIST Special Publication 800-38C, Recommendation for Block Cipher Modes of Operation: The CCM Mode For Authentication and Confidentiality (2004)"},{"key":"8_CR11","doi-asserted-by":"crossref","unstructured":"Whiting, D., Housley, R., Ferguson, N.: RFC 3610, Counter with CBC-MAC (CCM). Internet Engineering Task Force (2003)","DOI":"10.17487\/rfc3610"},{"key":"8_CR12","unstructured":"International Organization for Standardization Gen\u00e8ve, Switzerland: ISO\/IEC 3rd CD 19772, Information technology \u2014 Security techniques \u2014 Authenticated encryption mechanisms (2007)"},{"key":"8_CR13","unstructured":"Dent, A.W., Mitchell, C.J.: User\u2019s Guide to Cryptography and Standards. Artech House (2005)"},{"key":"8_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"323","DOI":"10.1007\/BFb0024478","volume-title":"Cryptography and Coding","author":"A. Zuquete","year":"1997","unstructured":"Zuquete, A., Guedes, P.: Efficient error-propagating block chaining. In: Darnell, M. (ed.) Cryptography and Coding. LNCS, vol.\u00a01355, pp. 323\u2013334. Springer, Heidelberg (1997)"},{"key":"8_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"560","DOI":"10.1007\/11506157_47","volume-title":"ACISP 2005","author":"C.J. Mitchell","year":"2005","unstructured":"Mitchell, C.J.: Cryptanalysis of two variants of PCBC mode when used for message integrity. In: Boyd, C., Gonz\u00e1lez Nieto, J.M. (eds.) ACISP 2005. LNCS, vol.\u00a03574, pp. 560\u2013571. Springer, Heidelberg (2005)"},{"key":"8_CR16","unstructured":"International Organization for Standardization Gen\u00e8ve, Switzerland: ISO\/IEC 18033\u20133, Information technology \u2014 Security techniques \u2014 Encryption algorithms \u2014 Part 3: Block ciphers (2005)"}],"container-title":["Lecture Notes in Computer Science","Cryptography and Coding"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-77272-9_8.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T07:06:59Z","timestamp":1619507219000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-77272-9_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540772712"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-77272-9_8","relation":{},"subject":[]}}