{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T16:25:29Z","timestamp":1725899129925},"publisher-location":"Berlin, Heidelberg","reference-count":31,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642385186"},{"type":"electronic","value":"9783642385193"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-38519-3_15","type":"book-chapter","created":{"date-parts":[[2013,5,2]],"date-time":"2013-05-02T03:59:28Z","timestamp":1367467168000},"page":"225-245","source":"Crossref","is-referenced-by-count":8,"title":["The Security and Performance of \u201cGCM\u201d when Short Multiplications Are Used Instead"],"prefix":"10.1007","author":[{"given":"Kazumaro","family":"Aoki","sequence":"first","affiliation":[]},{"given":"Kan","family":"Yasuda","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"15_CR1","unstructured":"3GPP: Specification of the 3GPP Confidentiality and Integrity Algorithms UEA2 & UIA2 (2009), \n                  \n                    http:\/\/www.gsma.com\/technicalprojects\/fraud-security\/security-algorithms\/"},{"key":"15_CR2","unstructured":"ANSI: Fibre Channel Security Protocols (FC-SP) rev\u00a01.74. INCITS working draft proposed (2006)"},{"key":"15_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"409","DOI":"10.1007\/11761679_25","volume-title":"Advances in Cryptology - EUROCRYPT 2006","author":"M. Bellare","year":"2006","unstructured":"Bellare, M., Rogaway, P.: The security of triple encryption and a framework\u00a0for\u00a0code-based\u00a0game-playing\u00a0proofs. In: Vaudenay, S. (ed.) EUROCRYPT 2006. LNCS, vol.\u00a04004, pp. 409\u2013426. Springer, Heidelberg (2006)"},{"key":"15_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"322","DOI":"10.1007\/978-3-540-89754-5_25","volume-title":"Progress in Cryptology - INDOCRYPT 2008","author":"D.J. Bernstein","year":"2008","unstructured":"Bernstein, D.J., Schwabe, P.: New AES software speed records. In: Chowdhury, D.R., Rijmen, V., Das, A. (eds.) INDOCRYPT 2008. LNCS, vol.\u00a05365, pp. 322\u2013336. Springer, Heidelberg (2008)"},{"key":"15_CR5","unstructured":"Ferguson, N.: Authentication weaknesses in GCM. Comments Submitted to NIST Modes of Operation (2005)"},{"key":"15_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"399","DOI":"10.1007\/978-3-642-25578-6_28","volume-title":"Progress in Cryptology \u2013 INDOCRYPT 2011","author":"S. Gueron","year":"2011","unstructured":"Gueron, S.: Software optimizations for cryptographic primitives on general purpose x86_64 platforms. In: Bernstein, D.J., Chatterjee, S. (eds.) INDOCRYPT 2011. LNCS, vol.\u00a07107, pp. 399\u2013400. Springer, Heidelberg (2011)"},{"key":"15_CR7","unstructured":"IEEE MAC Security Task Group: 802.1ae\u2014Media Access Control (MAC) security draft\u00a05.1. IEEE Standards Association (2006)"},{"key":"15_CR8","unstructured":"IEEE Security in Storage Working Group: P1619.1 Authenticated encryption. IEEE Standards Association (2007)"},{"key":"15_CR9","unstructured":"IETF: The use of Galois\/Counter Mode (GCM) in IPsec Encapsulating Security Payload (ESP). RFC 4106 (2005)"},{"key":"15_CR10","unstructured":"IETF: The use of Galois Message Authentication Code (GMAC). RFC 4543 (2006)"},{"key":"15_CR11","unstructured":"IETF: AES Galois Counter Mode (GCM) cipher suites for TLS. RFC 5288 (2008)"},{"key":"15_CR12","unstructured":"IETF: AES Galois Counter Mode for the Secure Shell Transport Layer Protocol. RFC 5647 (2009)"},{"key":"15_CR13","unstructured":"Intel Corporation: Fast Cryptographic Computation on Intel Architecture Processors Via Function Stitching (2010)"},{"key":"15_CR14","unstructured":"Intel Corporation: Intel Carry-Less Multiplication Instruction and its Usage for Computing the GCM Mode \u2014 Rev 2 (2010)"},{"key":"15_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1007\/978-3-642-32009-5_3","volume-title":"CRYPTO 2012","author":"T. Iwata","year":"2012","unstructured":"Iwata, T., Ohashi, K., Minematsu, K.: Breaking and repairing GCM security proofs. In: Safavi-Naini, R., Canetti, R. (eds.) CRYPTO 2012. LNCS, vol.\u00a07417, pp. 31\u201349. Springer, Heidelberg (2012)"},{"key":"15_CR16","unstructured":"JTC 1: Information Technology\u2014Security Techniques\u2014Authenticated Encryption. ISO\/IEC 19772 (2009)"},{"key":"15_CR17","first-page":"293","volume":"145","author":"A.A. Karatsuba","year":"1962","unstructured":"Karatsuba, A.A., Ofman, Y.P.: Multiplication of many-digital numbers by automatic computers. Proceedings of the USSR Academy of Sciences\u00a0145, 293\u2013294 (1962)","journal-title":"Proceedings of the USSR Academy of Sciences"},{"key":"15_CR18","doi-asserted-by":"crossref","unstructured":"Kohno, T., Viega, J., Whiting, D.: CWC: A high-performance conventional authenticated encryption mode. Cryptology ePrint Archive: Report 2003\/106 (2003)","DOI":"10.1007\/978-3-540-25937-4_26"},{"key":"15_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"306","DOI":"10.1007\/978-3-642-21702-9_18","volume-title":"Fast Software Encryption","author":"T. Krovetz","year":"2011","unstructured":"Krovetz, T., Rogaway, P.: The software performance of authenticated-encryption modes. In: Joux, A. (ed.) FSE 2011. LNCS, vol.\u00a06733, pp. 306\u2013327. Springer, Heidelberg (2011)"},{"key":"15_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"311","DOI":"10.1007\/978-3-642-17401-8_22","volume-title":"Progress in Cryptology - INDOCRYPT 2010","author":"R. Manley","year":"2010","unstructured":"Manley, R., Gregg, D.: A program generator for Intel AES-NI instructions. In: Gong, G., Gupta, K.C. (eds.) INDOCRYPT 2010. LNCS, vol.\u00a06498, pp. 311\u2013327. Springer, Heidelberg (2010)"},{"key":"15_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"343","DOI":"10.1007\/978-3-540-30556-9_27","volume-title":"Progress in Cryptology - INDOCRYPT 2004","author":"D.A. McGrew","year":"2004","unstructured":"McGrew, D.A., Viega, J.: The security and performance of the Galois\/Counter Mode (GCM) of operation. In: Canteaut, A., Viswanathan, K. (eds.) INDOCRYPT 2004. LNCS, vol.\u00a03348, pp. 343\u2013355. Springer, Heidelberg (2004)"},{"issue":"3","key":"15_CR22","doi-asserted-by":"publisher","first-page":"201","DOI":"10.1007\/s13389-011-0013-z","volume":"1","author":"N. Meloni","year":"2011","unstructured":"Meloni, N., N\u00e8gre, C., Hasan, M.A.: High performance GHASH and impacts of a class of unconventional bases. J. Cryptographic Engineering\u00a01(3), 201\u2013218 (2011)","journal-title":"J. Cryptographic Engineering"},{"key":"15_CR23","unstructured":"NIST: Advanced Encryption Standard (AES). FIPS Publication 197 (2001)"},{"key":"15_CR24","unstructured":"NIST: Recommendation for block cipher modes of operation: Galois\/Counter Mode (GCM) for confidentiality and authentication. Special Publication 800-38D (2007)"},{"key":"15_CR25","doi-asserted-by":"crossref","unstructured":"Rogaway, P.: Authenticated-encryption with associated-data. In: ACM CCS 2002, pp. 98\u2013107. ACM Press (2002)","DOI":"10.1145\/586110.586125"},{"key":"15_CR26","doi-asserted-by":"crossref","unstructured":"Rogaway, P., Bellare, M., Black, J., Krovetz, T.: OCB: A block-cipher mode of operation for efficient authenticated encryption. In: Reiter, M.K., Samarati, P. (eds.) ACM CCS 2001, pp. 196\u2013205. ACM (2001)","DOI":"10.1145\/501983.502011"},{"key":"15_CR27","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"373","DOI":"10.1007\/11761679_23","volume-title":"Advances in Cryptology - EUROCRYPT 2006","author":"P. Rogaway","year":"2006","unstructured":"Rogaway, P., Shrimpton, T.: A provable-security treatment of the key-wrap problem. In: Vaudenay, S. (ed.) EUROCRYPT 2006. LNCS, vol.\u00a04004, pp. 373\u2013390. Springer, Heidelberg (2006)"},{"key":"15_CR28","unstructured":"Saarinen, M.-J.O.: SGCM: The Sophie Germain counter mode. Cryptology ePrint Archive: Report 2011\/326 (2011)"},{"key":"15_CR29","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"216","DOI":"10.1007\/978-3-642-34047-5_13","volume-title":"Fast Software Encryption","author":"M.-J.O. Saarinen","year":"2012","unstructured":"Saarinen, M.-J.O.: Cycling attacks on GCM, GHASH and other polynomial MACs and hashes. In: Canteaut, A. (ed.) FSE 2012. LNCS, vol.\u00a07549, pp. 216\u2013225. Springer, Heidelberg (2012)"},{"key":"15_CR30","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"118","DOI":"10.1007\/978-3-540-75496-1_8","volume-title":"Information Security","author":"A. Satoh","year":"2007","unstructured":"Satoh, A., Sugawara, T., Aoki, T.: High-speed pipelined hardware architecture for Galois counter mode. In: Garay, J.A., Lenstra, A.K., Mambo, M., Peralta, R. (eds.) ISC 2007. LNCS, vol.\u00a04779, pp. 118\u2013129. Springer, Heidelberg (2007)"},{"issue":"3","key":"15_CR31","doi-asserted-by":"publisher","first-page":"265","DOI":"10.1016\/0022-0000(81)90033-7","volume":"22","author":"M.N. Wegman","year":"1981","unstructured":"Wegman, M.N., Carter, L.: New hash functions and their use in authentication and set equality. J. Comput. Syst. Sci.\u00a022(3), 265\u2013279 (1981)","journal-title":"J. Comput. Syst. Sci."}],"container-title":["Lecture Notes in Computer Science","Information Security and Cryptology"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-38519-3_15","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,12]],"date-time":"2019-05-12T15:24:22Z","timestamp":1557674662000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-38519-3_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642385186","9783642385193"],"references-count":31,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-38519-3_15","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2013]]}}}