{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,9]],"date-time":"2025-09-09T22:19:33Z","timestamp":1757456373354},"publisher-location":"Berlin, Heidelberg","reference-count":10,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642291005"},{"type":"electronic","value":"9783642291012"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-29101-2_14","type":"book-chapter","created":{"date-parts":[[2012,4,2]],"date-time":"2012-04-02T04:10:23Z","timestamp":1333339823000},"page":"199-216","source":"Crossref","is-referenced-by-count":8,"title":["A Framework for Security Analysis of Key Derivation Functions"],"prefix":"10.1007","author":[{"given":"Chuah Chai","family":"Wen","sequence":"first","affiliation":[]},{"given":"Edward","family":"Dawson","sequence":"additional","affiliation":[]},{"given":"Juan Manuel","family":"Gonz\u00e1lez Nieto","sequence":"additional","affiliation":[]},{"given":"Leonie","family":"Simpson","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"14_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"134","DOI":"10.1007\/978-3-540-30144-8_12","volume-title":"Information Security","author":"C. Adams","year":"2004","unstructured":"Adams, C., Kramer, G., Mister, S., Zuccherato, R.: On The Security of Key Derivation Functions. In: Zhang, K., Zheng, Y. (eds.) ISC 2004. LNCS, vol.\u00a03225, pp. 134\u2013145. Springer, Heidelberg (2004)"},{"key":"14_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"166","DOI":"10.1007\/978-3-540-45238-6_14","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2003","author":"B. Barak","year":"2003","unstructured":"Barak, B., Shaltiel, R., Tromer, E.: True Random Number Generators Secure in a Changing Environment. In: Walter, C.D., Ko\u00e7, \u00c7.K., Paar, C. (eds.) CHES 2003. LNCS, vol.\u00a02779, pp. 166\u2013180. Springer, Heidelberg (2003)"},{"key":"14_CR3","first-page":"135","volume":"800","author":"Q. Dang","year":"2010","unstructured":"Dang, Q.: Recommendation for Existing Application-Specific Key Derivation Functions. NIST Special Publication\u00a0800, 135 (2010)","journal-title":"NIST Special Publication"},{"key":"14_CR4","doi-asserted-by":"crossref","unstructured":"Kaliski, B.: PKCS# 5: Password-based cryptography specification version 2.0. Technical report, RFC 2898 (September 2000)","DOI":"10.17487\/rfc2898"},{"key":"14_CR5","unstructured":"Krawczyk, H.: On Extract-then-Expand Key Derivation Functions and an HMAC-based KDF (2008), \n                    \n                      http:\/\/citeseerx.ist.psu.edu\/viewdoc\/download?doi=10.1.1.131.8254&rep=rep1&type=pdf"},{"key":"14_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"631","DOI":"10.1007\/978-3-642-14623-7_34","volume-title":"Advances in Cryptology \u2013 CRYPTO 2010","author":"H. Krawczyk","year":"2010","unstructured":"Krawczyk, H.: Cryptographic Extraction and Key Derivation: The HKDF Scheme. In: Rabin, T. (ed.) CRYPTO 2010. LNCS, vol.\u00a06223, pp. 631\u2013648. Springer, Heidelberg (2010)"},{"key":"14_CR7","doi-asserted-by":"crossref","unstructured":"Krawczyk, H., Eronen, P.: HMAC-based Extract-and-Expand Key Derivation Function (HKDF). Technical report, RFC 5869 (May 2010)","DOI":"10.17487\/rfc5869"},{"key":"14_CR8","unstructured":"McGrew, D., Weis, B.: Key Derivation Functions and Their Uses (2010), \n                    \n                      http:\/\/www.ietf.org\/id\/draft-irtf-cfrg-kdf-uses-00.txt"},{"key":"14_CR9","unstructured":"Shoup, V.: ISO 18033-2: An emerging standard for public-key encryption. Final Committee Draft (December 2004)"},{"key":"14_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"245","DOI":"10.1007\/978-3-540-30574-3_17","volume-title":"Topics in Cryptology \u2013 CT-RSA 2005","author":"F.F. Yao","year":"2005","unstructured":"Yao, F.F., Yin, Y.L.: Design and Analysis of Password-Based Key Derivation Functions. In: Menezes, A. (ed.) CT-RSA 2005. LNCS, vol.\u00a03376, pp. 245\u2013261. Springer, Heidelberg (2005)"}],"container-title":["Lecture Notes in Computer Science","Information Security Practice and Experience"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-29101-2_14.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,4]],"date-time":"2021-05-04T11:23:33Z","timestamp":1620127413000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-29101-2_14"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642291005","9783642291012"],"references-count":10,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-29101-2_14","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2012]]}}}