{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,4]],"date-time":"2026-02-04T18:04:32Z","timestamp":1770228272832,"version":"3.49.0"},"publisher-location":"Berlin, Heidelberg","reference-count":13,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783642044731","type":"print"},{"value":"9783642044748","type":"electronic"}],"license":[{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-04474-8_33","type":"book-chapter","created":{"date-parts":[[2009,9,3]],"date-time":"2009-09-03T07:26:09Z","timestamp":1251962769000},"page":"411-426","source":"Crossref","is-referenced-by-count":12,"title":["Nonce Generators and the Nonce Reset Problem"],"prefix":"10.1007","author":[{"given":"Erik","family":"Zenner","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"33_CR1","unstructured":"Wiktionary: Nonce (2009), \n                    \n                      http:\/\/en.wiktionary.org\/wiki\/nonce"},{"key":"33_CR2","doi-asserted-by":"publisher","first-page":"265","DOI":"10.1016\/0022-0000(81)90033-7","volume":"22","author":"M. Wegmann","year":"1981","unstructured":"Wegmann, M., Carter, J.: New hash functions and their use in authentication and set equality. Journal of Computer and System Sciences\u00a022, 265\u2013279 (1981)","journal-title":"Journal of Computer and System Sciences"},{"key":"33_CR3","unstructured":"List, C.M.: Consequences of nonce reuse (2007), \n                    \n                      http:\/\/www1.ietf.org\/mail-archive\/web\/cfrg\/"},{"key":"33_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"348","DOI":"10.1007\/978-3-540-25937-4_22","volume-title":"Fast Software Encryption","author":"P. Rogaway","year":"2004","unstructured":"Rogaway, P.: Nonce-based symmetric encryption. In: Roy, B., Meier, W. (eds.) FSE 2004. LNCS, vol.\u00a03017, pp. 348\u2013359. Springer, Heidelberg (2004)"},{"key":"33_CR5","first-page":"180","volume-title":"Proc. 7th International Conference on Mobile Computing and Networking","author":"N. Borisov","year":"2001","unstructured":"Borisov, N., Goldberg, I., Wagner, D.: Intercepting mobile communications: The insecurity of 802.11. In: Proc. 7th International Conference on Mobile Computing and Networking, pp. 180\u2013189. ACM, New York (2001)"},{"key":"33_CR6","doi-asserted-by":"publisher","first-page":"72","DOI":"10.1145\/1030083.1030095","volume-title":"Proc. 11th ACM Conference on Computer and Communications Security (CCS 2004)","author":"T. Kohno","year":"2004","unstructured":"Kohno, T.: Attacking and repairing the WinZip encryption scheme. In: Proc. 11th ACM Conference on Computer and Communications Security (CCS 2004), pp. 72\u201381. ACM Press, New York (2004)"},{"key":"33_CR7","doi-asserted-by":"crossref","unstructured":"Sabin, T.: Vulnerability in Windows NT\u2019s SYSKEY encryption. BindView Security Advisory (December 16, 1999), \n                    \n                      http:\/\/marc.info\/?l=bugtraq&m=94537756429898&w=2","DOI":"10.1016\/S1353-4858(99)90125-3"},{"key":"33_CR8","unstructured":"Wu, H.: The misuse of RC4 in Microsoft Word and Excel (2005), \n                    \n                      http:\/\/eprint.iacr.org\/2005\/007"},{"key":"33_CR9","first-page":"203","volume-title":"Proc. 12th ACM Conference on Computer and Communications Security (CCS 2005)","author":"B. Barak","year":"2005","unstructured":"Barak, B., Halevi, S.: A model and architecture for pseudo-random generation with applications to \/dev\/random. In: Proc. 12th ACM Conference on Computer and Communications Security (CCS 2005), pp. 203\u2013212. ACM Press, New York (2005)"},{"key":"33_CR10","doi-asserted-by":"publisher","first-page":"49","DOI":"10.1145\/130704.130709","volume":"26","author":"L. Gong","year":"1992","unstructured":"Gong, L.: A security risk of depending on synchronized clocks. ACM Operating Systems Review\u00a026, 49\u201353 (1992)","journal-title":"ACM Operating Systems Review"},{"key":"33_CR11","doi-asserted-by":"publisher","first-page":"10","DOI":"10.1145\/155848.155852","volume":"27","author":"B. Neuman","year":"1993","unstructured":"Neuman, B., Stubblebine, S.: A note on the use of timestamps as nonces. Operating Systems Review\u00a027, 10\u201314 (1993)","journal-title":"Operating Systems Review"},{"key":"33_CR12","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9781139165464","volume-title":"A Computational Introduction to Number Theory and Algebra","author":"V. Shoup","year":"2005","unstructured":"Shoup, V.: A Computational Introduction to Number Theory and Algebra. Cambridge University Press, Cambridge (2005)"},{"key":"33_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"32","DOI":"10.1007\/11502760_3","volume-title":"Fast Software Encryption","author":"D. Bernstein","year":"2005","unstructured":"Bernstein, D.: The Poly1305-AES message-authentication code. In: Gilbert, H., Handschuh, H. (eds.) FSE 2005. LNCS, vol.\u00a03557, pp. 32\u201349. Springer, Heidelberg (2005), \n                    \n                      http:\/\/cr.yp.to\/mac.html#papers"}],"container-title":["Lecture Notes in Computer Science","Information Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-04474-8_33","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,19]],"date-time":"2019-05-19T12:29:51Z","timestamp":1558268991000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-04474-8_33"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642044731","9783642044748"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-04474-8_33","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2009]]}}}