{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,28]],"date-time":"2026-02-28T13:00:37Z","timestamp":1772283637133,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":22,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540773597","type":"print"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-77360-3_20","type":"book-chapter","created":{"date-parts":[[2007,12,1]],"date-time":"2007-12-01T08:04:18Z","timestamp":1196496258000},"page":"311-327","source":"Crossref","is-referenced-by-count":22,"title":["The Security of the Extended Codebook (XCB) Mode of Operation"],"prefix":"10.1007","author":[{"given":"David A.","family":"McGrew","sequence":"first","affiliation":[]},{"given":"Scott R.","family":"Fluhrer","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"20_CR1","volume-title":"Proceedings of the 38th FOCS","author":"M. Bellare","year":"1997","unstructured":"Bellare, M., Desai, A., Jokipii, E., Rogaway, P.: A concrete security treatment of symmetric encryption. In: Proceedings of the 38th FOCS, IEEE Computer Society Press, Los Alamitos (1997)"},{"key":"20_CR2","unstructured":"IEEE Security in Storage Working Group. Web page, http:\/\/siswg.org"},{"key":"20_CR3","unstructured":"Schroeppel, R.: Hasty Pudding Cipher Specification. In: First AES Candidate Workshop (August 1998), available online at http:\/\/www.cs.arizona.edu\/people\/rcs\/hpc\/hpc-spec"},{"key":"20_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45708-9_3","volume-title":"Advances in Cryptology - CRYPTO 2002","author":"M. Liskov","year":"2002","unstructured":"Liskov, M., Rivest, R., Wagner, D.: Tweakable Block Ciphers. In: Yung, M. (ed.) CRYPTO 2002. LNCS, vol.\u00a02442, Springer, Heidelberg (2002)"},{"key":"20_CR5","unstructured":"Naor, M., Reingold, O.: A pseudo-random encryption mode. Manuscript (1997), available from http:\/\/www.wisdom.weizmann.ac.il\/naor"},{"key":"20_CR6","doi-asserted-by":"crossref","unstructured":"Anderson, R., Biham, E.: Two Practical and Provably Secure Block Ciphers: BEAR and LION. In: Proceedings of the Third International Workshop on Fast Software Encryption, Cambridge, UK, pp. 113\u2013120 (1996)","DOI":"10.1007\/3-540-60865-6_48"},{"key":"20_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"482","DOI":"10.1007\/978-3-540-45146-4_28","volume-title":"CRYPTO 2003","author":"S. Halevi","year":"2003","unstructured":"Halevi, S., Rogaway, P.: A tweakable enciphering mode. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol.\u00a02729, pp. 482\u2013499. Springer, Heidelberg (2003)"},{"key":"20_CR8","series-title":"Lecture Notes in Computer Science","volume-title":"2004 RSA Conference Cryptography Track","author":"S. Halevi","year":"2004","unstructured":"Halevi, S., Rogaway, P.: A Parallelizable Enciphering Mode. In: 2004 RSA Conference Cryptography Track. LNCS, Springer, Heidelberg (2004)"},{"key":"20_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"315","DOI":"10.1007\/978-3-540-30556-9_25","volume-title":"Progress in Cryptology - INDOCRYPT 2004","author":"S. Halevi","year":"2004","unstructured":"Halevi, S.: EME*: extending EME to handle arbitrary-length messages with associated data. In: Canteaut, A., Viswanathan, K. (eds.) INDOCRYPT 2004. LNCS, vol.\u00a03348, pp. 315\u2013327. Springer, Heidelberg (2004)"},{"key":"20_CR10","unstructured":"McGrew, D., Viega, J.: Arbitrary block length mode. Standards contribution (2004), available on-line from http:\/\/grouper.ieee.org\/groups\/1619\/email\/pdf00005.pdf"},{"key":"20_CR11","unstructured":"McGrew, D., Fluhrer, S.: The Extended Codebook (XCB) Mode of Operation, Cryptology ePrint Archive: Report 2004\/278 (October 25, 2004) http:\/\/eprint.iacr.org\/2004\/278"},{"key":"20_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"175","DOI":"10.1007\/11599548_15","volume-title":"Information Security and Cryptology","author":"P. Wang","year":"2005","unstructured":"Wang, P., Feng, D., Wu, W.: HCTR: A variable-input-length enciphering mode. In: Feng, D., Lin, D., Yung, M. (eds.) CISC 2005. LNCS, vol.\u00a03822, pp. 175\u2013188. Springer, Heidelberg (2005)"},{"key":"20_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"287","DOI":"10.1007\/11941378_21","volume-title":"INDOCRYPT 2006","author":"D. Chakraborty","year":"2006","unstructured":"Chakraborty, D., Sarkar, P.: HCH: A new tweakable enciphering scheme using the hash-encrypt-hash approach. In: Barua, R., Lange, T. (eds.) INDOCRYPT 2006. LNCS, vol.\u00a04329, pp. 287\u2013302. Springer, Heidelberg (2006)"},{"key":"20_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"293","DOI":"10.1007\/11799313_19","volume-title":"Fast Software Encryption","author":"D. Chakraborty","year":"2006","unstructured":"Chakraborty, D., Sarkar, P.: A new mode of encryption providing a tweakable strong pseudo-random permutation. In: Robshaw, M. (ed.) FSE 2006. LNCS, vol.\u00a04047, pp. 293\u2013309. Springer, Heidelberg (2006)"},{"key":"20_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-74143-5_23","volume-title":"CRYPTO 2007","author":"S. Halevi","year":"2007","unstructured":"Halevi, S.: Invertible Universal Hashing and the TET Encryption Mode. In: Menezes, A. (ed.) CRYPTO 2007. LNCS, vol.\u00a04622. Springer, Heidelberg (2007)"},{"key":"20_CR16","doi-asserted-by":"crossref","unstructured":"Baugher, M., McGrew, D., Naslund, M., Carrara, E., Norrman, K.: The Secure Real-time Transport Protocol. IETF RFC 3711 (March 2004)","DOI":"10.17487\/rfc3711"},{"key":"20_CR17","unstructured":"McGrew, D., Viega, J.: The Galois\/Counter Mode of Operation (GCM). NIST Modes of Operation Process (submission) (January 2004), available online at http:\/\/csrc.nist.gov\/CryptoToolkit\/modes\/proposedmodes\/"},{"issue":"3","key":"20_CR18","doi-asserted-by":"publisher","first-page":"362","DOI":"10.1006\/jcss.1999.1694","volume":"61","author":"M. Bellare","year":"2000","unstructured":"Bellare, M., Kilian, J., Rogaway, P.: The Security of the Cipher Block Chaining Message Authentication Code. J. Comput. Syst. Sci.\u00a061(3), 362\u2013399 (2000)","journal-title":"J. Comput. Syst. Sci."},{"key":"20_CR19","unstructured":"McGrew, D., Fluhrer, S.: The Extended Codebook (XCB) Mode of Operation, Version 2, IEEE P1619 (submission) grouper.ieee.org\/groups\/1619\/email\/pdf00019.pdf"},{"key":"20_CR20","series-title":"Lecture Notes in Computer Science","volume-title":"CRYPTO 2004","author":"H. Krawczyk","year":"2004","unstructured":"Krawczyk, H.: LFSR-based hashing and authentication. In: Franklin, M. (ed.) CRYPTO 2004. LNCS, vol.\u00a03152, Springer, Heidelberg (2004)"},{"key":"20_CR21","unstructured":"U.S. National Institute of Standards and Technology. The Advanced Encryption Standard. Federal Information Processing Standard (FIPS) 197, (2002)"},{"key":"20_CR22","volume-title":"Discrete Mathematics","author":"N. Biggs","year":"1993","unstructured":"Biggs, N.: Discrete Mathematics. Oxford University Press, Oxford (1993) (Revised Edition)"}],"container-title":["Lecture Notes in Computer Science","Selected Areas in Cryptography"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-77360-3_20.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T11:09:31Z","timestamp":1619521771000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-77360-3_20"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540773597"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-77360-3_20","relation":{},"subject":[]}}