{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,6]],"date-time":"2025-12-06T04:56:17Z","timestamp":1764996977686},"publisher-location":"Berlin, Heidelberg","reference-count":17,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642390586"},{"type":"electronic","value":"9783642390593"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-39059-3_1","type":"book-chapter","created":{"date-parts":[[2013,6,13]],"date-time":"2013-06-13T21:33:17Z","timestamp":1371159197000},"page":"1-12","source":"Crossref","is-referenced-by-count":5,"title":["Analysing the IOBC Authenticated Encryption Mode"],"prefix":"10.1007","author":[{"given":"Chris J.","family":"Mitchell","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"1_CR1","volume-title":"Handbook of Applied Cryptography","author":"A.J. Menezes","year":"1997","unstructured":"Menezes, A.J., van Oorschot, P.C., Vanstone, S.A.: Handbook of Applied Cryptography. CRC Press, Boca Raton (1997)"},{"key":"1_CR2","unstructured":"McGrew, D.A., Viega, J.: The Galois\/Counter mode of operation (GCM) (May 2005), \n                    \n                      http:\/\/www.mindspring.com\/~dmcgrew\/gcm-nist-6.pdf"},{"key":"1_CR3","unstructured":"International Organization for Standardization Gen\u00e8ve, Switzerland: ISO\/IEC 19772:2009, Information technology \u2014 Security techniques \u2014 Authenticated encryption mechanisms (February 2009)"},{"key":"1_CR4","unstructured":"International Organization for Standardization Gen\u00e8ve, Switzerland: ISO\/IEC 9797-3:2011, Information technology \u2014 Security techniques \u2014 Message Authentication Codes (MACs) \u2014 Part 3: Mechanisms using a universal hash-function (2011)"},{"key":"1_CR5","unstructured":"Dent, A.W., Mitchell, C.J.: User\u2019s Guide to Cryptography and Standards. Artech House (2005)"},{"key":"1_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"35","DOI":"10.1007\/0-387-34805-0_5","volume-title":"Advances in Cryptology - CRYPTO \u201989","author":"J.T. Kohl","year":"1990","unstructured":"Kohl, J.T.: The use of encryption in kerberos for network authentication. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol.\u00a0435, pp. 35\u201343. Springer, Heidelberg (1990)"},{"key":"1_CR7","first-page":"191","volume-title":"Proceedings: Usenix Association, Winter Conference, Dallas 1988","author":"J. Steiner","year":"1988","unstructured":"Steiner, J., Neuman, C., Schiller, J.: Kerberos: an authentication service for open network systems. In: Proceedings: Usenix Association, Winter Conference, Dallas 1988, pp. 191\u2013202. USENIX Association, Berkeley (1988)"},{"key":"1_CR8","volume-title":"Cryptography: A new dimension in computer data security","author":"C.H. Meyer","year":"1982","unstructured":"Meyer, C.H., Matyas, S.M.: Cryptography: A new dimension in computer data security. John Wiley and Sons, New York (1982)"},{"key":"1_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"560","DOI":"10.1007\/11506157_47","volume-title":"Information Security and Privacy","author":"C.J. Mitchell","year":"2005","unstructured":"Mitchell, C.J.: Cryptanalysis of two variants of PCBC mode when used for message integrity. In: Boyd, C., Gonz\u00e1lez Nieto, J.M. (eds.) ACISP 2005. LNCS, vol.\u00a03574, pp. 560\u2013571. Springer, Heidelberg (2005)"},{"key":"1_CR10","doi-asserted-by":"publisher","first-page":"857","DOI":"10.1016\/j.future.2003.11.006","volume":"20","author":"J.M. Sierra","year":"2004","unstructured":"Sierra, J.M., Hernandez, J.C., Jayaram, N., Ribagorda, A.: Low computational cost integrity for block ciphers. Future Generation Computer Systems\u00a020, 857\u2013863 (2004)","journal-title":"Future Generation Computer Systems"},{"key":"1_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"153","DOI":"10.1007\/10720107_22","volume-title":"Security Protocols","author":"V.D. Gligor","year":"2000","unstructured":"Gligor, V.D., Donescu, P.: Integrity-aware PCBC encryption schemes. In: Malcolm, J.A., Christianson, B., Crispo, B., Roe, M. (eds.) Security Protocols. LNCS, vol.\u00a01796, pp. 153\u2013171. Springer, Heidelberg (2000)"},{"key":"1_CR12","unstructured":"Ferguson, N., Whiting, D., Kelsey, J., Wagner, D.: Critical weaknesses of iaPCBC (November 1999)"},{"issue":"3","key":"1_CR13","doi-asserted-by":"publisher","first-page":"34","DOI":"10.1109\/40.502404","volume":"16","author":"A. Zuquete","year":"1996","unstructured":"Zuquete, A., Guedes, P.: Transparent authentication and confidentiality for stream sockets. IEEE Micro\u00a016(3), 34\u201341 (1996)","journal-title":"IEEE Micro"},{"key":"1_CR14","unstructured":"Recacha, F.: IOBC: Un nuevo modo de encadenamiento para cifrado en bloque. In: Proceedings: IV Reunion Espanola de Criptologia, Valladolid, pp. 85\u201392 (September 1996)"},{"key":"1_CR15","series-title":"Lecture Notes in Computer Science","first-page":"323","volume-title":"Cryptography and Coding","author":"A. Zuquete","year":"1997","unstructured":"Zuquete, A., Guedes, P.: Efficient error-propagating block chaining. In: Darnell, M. (ed.) Cryptography and Coding 1997. LNCS, vol.\u00a01355, pp. 323\u2013334. Springer, Heidelberg (1997)"},{"key":"1_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"118","DOI":"10.1007\/978-3-540-77272-9_8","volume-title":"Cryptography and Coding","author":"C.J. Mitchell","year":"2007","unstructured":"Mitchell, C.J.: Cryptanalysis of the EPBC authenticated encryption mode. In: Galbraith, S.D. (ed.) Cryptography and Coding 2007. LNCS, vol.\u00a04887, pp. 118\u2013128. Springer, Heidelberg (2007)"},{"key":"1_CR17","unstructured":"International Organization for Standardization Gen\u00e8ve, Switzerland: ISO\/IEC 18033-3:2010, Information technology \u2014 Security techniques \u2014 Encryption algorithms \u2014 Part 3: Block ciphers, 2nd edn. (2010)"}],"container-title":["Lecture Notes in Computer Science","Information Security and Privacy"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-39059-3_1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,13]],"date-time":"2019-05-13T23:58:52Z","timestamp":1557791932000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-39059-3_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642390586","9783642390593"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-39059-3_1","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2013]]}}}