{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T03:04:47Z","timestamp":1725505487043},"publisher-location":"Berlin, Heidelberg","reference-count":17,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540791034"},{"type":"electronic","value":"9783540791041"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-79104-1_29","type":"book-chapter","created":{"date-parts":[[2008,3,13]],"date-time":"2008-03-13T07:28:21Z","timestamp":1205393301000},"page":"404-418","source":"Crossref","is-referenced-by-count":4,"title":["On the Importance of the Key Separation Principle for Different Modes of Operation"],"prefix":"10.1007","author":[{"given":"Danilo","family":"Gligoroski","sequence":"first","affiliation":[]},{"given":"Suzana","family":"Andova","sequence":"additional","affiliation":[]},{"given":"Svein Johan","family":"Knapskog","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"29_CR1","unstructured":"Belousov, V.D.: Osnovi teorii kvazigrup i lup, \u201cNauka\u201d, Moskva (1967)"},{"key":"29_CR2","volume-title":"New Developments in the Theory and Applications","author":"J. D\u00e9nes","year":"1991","unstructured":"D\u00e9nes, J., Keedwell, A.D.: Latin Squares. In: New Developments in the Theory and Applications, North-Holland Publishing Co, Amsterdam (1991)"},{"key":"29_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/3-540-45473-X_8","volume-title":"Fast Software Encryption","author":"V.D. Gligor","year":"2002","unstructured":"Gligor, V.D., Donescu, P.: Fast Encryption and Authentication: XCBC Encryption and XECB Authentication Modes. In: Matsui, M. (ed.) FSE 2001. LNCS, vol.\u00a02355, pp. 1\u201320. Springer, Heidelberg (2002)"},{"key":"29_CR4","unstructured":"H\u00e5stad, J., N\u00e4slund, M.: Key Feedback Mode: A Keystream Generator with Provable Security, http:\/\/csrc.nist.gov\/CryptoToolkit\/modes\/workshop1\/papers\/hastad-Naslund-kfb.pdf"},{"key":"29_CR5","unstructured":"ISO\/IEC 10116:1991, Fisrt Edition 1991, Information technology - Security techniques - Modes of operation of n-bit block cipher (1991)"},{"key":"29_CR6","unstructured":"ISO\/IEC 10116:1997, Second Edition 1997. Information technology - Security techniques - Modes of operation of n-bit block cipher (1997)"},{"key":"29_CR7","unstructured":"ISO\/IEC 10116:2006, Third Edition 2006, Information technology - Security techniques - Modes of operation of n-bit block cipher (2006)"},{"key":"29_CR8","doi-asserted-by":"crossref","unstructured":"Jutla, C.S.: Encryption Modes with Almost Free Message Integrity. Cryptology ePrint Archive: Report 2000\/039 (2000)","DOI":"10.1007\/3-540-44987-6_32"},{"key":"29_CR9","unstructured":"Knudsen, L.R.: Block chaining modes of operation. Technical Report, Department of Informatics, University of Bergen, Norway (2000)"},{"key":"29_CR10","first-page":"13","volume":"XX 1-2","author":"S. Markovski","year":"1999","unstructured":"Markovski, S., Gligoroski, D., Bakeva, V.: Quasigroup String Processing: Part 1. Maced. Acad. of Sci. and Arts, Sc. Math. Tech. Scien.\u00a0XX 1-2, 13\u201328 (1999)","journal-title":"Maced. Acad. of Sci. and Arts, Sc. Math. Tech. Scien."},{"key":"29_CR11","unstructured":"National Bureau of Standards, DES modes of operation, Federal Information Processing Standard (FIPS), Publication 81, National Bureau of Standards, U.S. Department of Commerce, Washington D.C. (December 1980)"},{"key":"29_CR12","unstructured":"National Institute of Standards and Technology, Modes of Operation Home page, http:\/\/csrc.nist.gov\/CryptoToolkit\/modes\/"},{"key":"29_CR13","unstructured":"National Institute of Standards and Technology, Special Publication 800-38A 2001, Recommendation for Block Cipher Modes of Operation Methods and Techniques, 66 pages (December 2001)"},{"key":"29_CR14","unstructured":"National Institute of Standards and Technology, Special Publication 800-21 2005, Guideline for Implementing Cryptograph. In: The Federal Government. 89 pages (December 2005)"},{"key":"29_CR15","unstructured":"National Institute of Standards and Technology, Special Publication 800-57 2007, Recommendation for Key Management - Part 1: General (Revised), 142 pages (March 2007)"},{"key":"29_CR16","unstructured":"Rogaway, P.: OCB Mode: Parallelizable Authenticated Encryption. Comments to NIST concerning AES Modes of Operation, Draft (October 6, 2000), http:\/\/csrc.nist.gov\/CryptoToolkit\/modes\/workshop1\/papers\/rogaway-ocb1.pdf"},{"key":"29_CR17","volume-title":"An introduction to quasigroups and their representations","author":"J.D.H. Smith","year":"2007","unstructured":"Smith, J.D.H.: An introduction to quasigroups and their representations. Chapman and Hall, Boca Raton (2007)"}],"container-title":["Lecture Notes in Computer Science","Information Security Practice and Experience"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-79104-1_29.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T11:10:19Z","timestamp":1619521819000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-79104-1_29"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540791034","9783540791041"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-79104-1_29","relation":{},"subject":[]}}