{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T00:43:27Z","timestamp":1725497007260},"publisher-location":"Berlin, Heidelberg","reference-count":18,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540772712"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-77272-9_9","type":"book-chapter","created":{"date-parts":[[2007,12,6]],"date-time":"2007-12-06T11:56:55Z","timestamp":1196942215000},"page":"129-151","source":"Crossref","is-referenced-by-count":4,"title":["Blockwise-Adaptive Chosen-Plaintext Attack and Online Modes of Encryption"],"prefix":"10.1007","author":[{"given":"Gregory V.","family":"Bard","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"9_CR1","unstructured":"Bard, G.: A challenging but feasible blockwise-adaptive chosen-plaintext attack on ssl. In: ICETE\/SECRYPT 2006. Proc. IEEE International Conference on Security and Cryptography (2006), http:\/\/eprint.iacr.org\/2006\/136"},{"key":"9_CR2","unstructured":"Bard, G.: Modes of encryption secure against blockwise-adaptive chosen-plaintext attack. Cryptology ePrint Archive, Report 2006\/271 (2006), http:\/\/eprint.iacr.org\/2006\/271 and http:\/\/www.math.umd.edu\/~bardg (March 26, 2004)"},{"key":"9_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-44647-8_18","volume-title":"CRYPTO 2001","author":"M. Bellare","year":"2001","unstructured":"Bellare, M., Boldyreva, A., Knudsen, L., Namprempre, C.: On-line ciphers, and the hash-cbc constructions. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol.\u00a02139, Springer, Heidelberg (2001)"},{"key":"9_CR4","unstructured":"Bellare, M., Desai, A., Jokipii, E., Rogaway, P.: A concrete security treatment of symmetric encryption: Analysis of the des modes of operation. In: FOCS 1997. Proc. of the 38th Annual IEEE Symposium on Foundations of Computer Science (1997)"},{"key":"9_CR5","doi-asserted-by":"crossref","unstructured":"Bellare, M., Kohno, T., Namprempe, C.: Authenticated encryption in ssh: Provably fixing the ssh binary packet protocol. In: CCS 2002. Proc. Ninth ACM Conference on Computer And Communications Security (2002)","DOI":"10.1145\/586110.586112"},{"key":"9_CR6","series-title":"Lecture Notes in Computer Science","volume-title":"SAC 2002","author":"J. Black","year":"2003","unstructured":"Black, J., Rogaway, P., Shrimpton, T.: Encryption-scheme security in the presence of key-dependent messages. In: Nyberg, K., Heys, H.M. (eds.) SAC 2002. LNCS, vol.\u00a02595, Springer, Heidelberg (2003)"},{"key":"9_CR7","doi-asserted-by":"crossref","unstructured":"Boldyreva, A., Taesombut, N.: on-line encryption schemes: New security notions and constructions. In: RSA 2004. Proc. RSA Conference, Cryptographer\u2019s Track (2004)","DOI":"10.1007\/978-3-540-24660-2_1"},{"key":"9_CR8","doi-asserted-by":"crossref","unstructured":"Campbell, C.: Design and specification of cryptographic capabilities. Technical report, US Department of Commerce (1978)","DOI":"10.1109\/MCOM.1978.1089775"},{"key":"9_CR9","volume-title":"Information Theory","author":"T. Cover","year":"2006","unstructured":"Cover, T., Thomas, J.: Information Theory, 2nd edn. Wiley-Interscience, Chichester (2006)","edition":"2"},{"key":"9_CR10","series-title":"Lecture Notes in Computer Science","volume-title":"SAC 2003","author":"P. Fouque","year":"2004","unstructured":"Fouque, P., Joux, A., Martinet, G., Valette, F.: Authenticated on-line encryption. In: Matsui, M., Zuccherato, R.J. (eds.) SAC 2003. LNCS, vol.\u00a03006, Springer, Heidelberg (2004)"},{"key":"9_CR11","series-title":"Lecture Notes in Computer Science","volume-title":"SAC 2004","author":"P. Fouque","year":"2004","unstructured":"Fouque, P., Joux, A., Poupard, G.: Blockwise adversarial model for on-line ciphers and symmetric encryption schemes. In: Handschuh, H., Hasan, M.A. (eds.) SAC 2004. LNCS, vol.\u00a03357, Springer, Heidelberg (2004)"},{"key":"9_CR12","series-title":"Lecture Notes in Computer Science","volume-title":"FSE 2003","author":"P. Fouque","year":"2003","unstructured":"Fouque, P., Martinet, G., Poupard, G.: Practical symmetric on-line encryption. In: Johansson, T. (ed.) FSE 2003. LNCS, vol.\u00a02887, Springer, Heidelberg (2003)"},{"key":"9_CR13","unstructured":"Gligor, V., Donescu, P.: On message integrity in symmetric encryption. In: Proc. 1st NIST Workshop on AES Modes of Operation (2000)"},{"key":"9_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45708-9_2","volume-title":"CRYPTO 2002","author":"A. Joux","year":"2002","unstructured":"Joux, A., Martinet, G., Valette, F.: Blockwise-adaptive attacks. revisiting the (in)security of some provably secure encryption modes: Cbc, gem, iacbc. In: Yung, M. (ed.) CRYPTO 2002. LNCS, vol.\u00a02442, Springer, Heidelberg (2002)"},{"key":"9_CR15","unstructured":"Knudsen, L.: Block chaining modes of operation. In: Proc. Symmetric Key Block Cipher Modes of Operation Workshop (2000)"},{"key":"9_CR16","doi-asserted-by":"crossref","unstructured":"Katz, J., Yung, M.: Complete characterization of security notions for probabilistic private-key encryption. In: Proc. 32nd ACM Annual Symposium on Theory of Computing (2000)","DOI":"10.1145\/335305.335335"},{"key":"9_CR17","unstructured":"The u-tube website, http:\/\/www.utube.com"},{"key":"9_CR18","series-title":"Lecture Notes in Computer Science","volume-title":"EUROCRYPT 2002","author":"S. Vaudeney","year":"2002","unstructured":"Vaudeney, S.: Security flaws induced by cbc padding - applications to ssl, ipsec, wtls.. In: Knudsen, L.R. (ed.) EUROCRYPT 2002. LNCS, vol.\u00a02332, Springer, Heidelberg (2002)"}],"container-title":["Lecture Notes in Computer Science","Cryptography and Coding"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-77272-9_9.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T11:06:59Z","timestamp":1619521619000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-77272-9_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540772712"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-77272-9_9","relation":{},"subject":[]}}