{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,17]],"date-time":"2026-02-17T15:32:11Z","timestamp":1771342331619,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":28,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783662434130","type":"print"},{"value":"9783662434147","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-662-43414-7_10","type":"book-chapter","created":{"date-parts":[[2014,5,20]],"date-time":"2014-05-20T14:57:06Z","timestamp":1400597826000},"page":"185-201","source":"Crossref","is-referenced-by-count":71,"title":["AEGIS: A Fast Authenticated Encryption Algorithm"],"prefix":"10.1007","author":[{"given":"Hongjun","family":"Wu","sequence":"first","affiliation":[]},{"given":"Bart","family":"Preneel","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,5,21]]},"reference":[{"issue":"1","key":"10_CR1","doi-asserted-by":"publisher","first-page":"48","DOI":"10.1504\/IJWMC.2011.044106","volume":"5","author":"M \u00c5gren","year":"2011","unstructured":"\u00c5gren, M., Hell, M., Johansson, T., Meier, W.: Grain-128a: a new version of Grain-128 with optional authentication. Int. J. Wireless Mobile Comput. 5(1), 48\u201359 (2011)","journal-title":"Int. J. Wireless Mobile Comput."},{"key":"10_CR2","series-title":"LNCS","doi-asserted-by":"publisher","first-page":"531","DOI":"10.1007\/3-540-44448-3_41","volume-title":"ASIACRYPT 2000","author":"M Bellare","year":"2000","unstructured":"Bellare, M., Namprempre, C.: Authenticated encryption: relations among notions and analysis of the generic composition paradigm. In: Okamoto, T. (ed.) ASIACRYPT 2000. LNCS, vol. 1976, pp. 531\u2013545. Springer, Heidelberg (2000)"},{"key":"10_CR3","series-title":"LNCS","first-page":"67","volume-title":"SAC 2006","author":"A Biryukov","year":"2007","unstructured":"Biryukov, A.: The design of a stream cipher LEX. In: Biham, E., Youssef, A.M. (eds.) SAC 2006. LNCS, vol. 4356, pp. 67\u201375. Springer, Heidelberg (2007)"},{"key":"10_CR4","unstructured":"Biryukov, A.: The Tweak for LEX-128, LEX-192, LEX-256. ECRYPT stream cipher project report 2006\/037. \n                      http:\/\/www.ecrypt.eu.org\/stream"},{"key":"10_CR5","doi-asserted-by":"crossref","unstructured":"Bogdanov, A., Mendel, F., Regazzoni, F., Rijmen, V., Tischhauser, E.: ALE: AES-based lightweight authenticated encryption. Fast Software Encryption - FSE 2013","DOI":"10.1007\/978-3-662-43933-3_23"},{"key":"10_CR6","first-page":"88","volume":"2005","author":"J Daemen","year":"2005","unstructured":"Daemen, J., Rijmen, V.: The Pelican MAC function. IACR Cryptol. ePrint Arch. 2005, 88 (2005)","journal-title":"IACR Cryptol. ePrint Arch."},{"key":"10_CR7","series-title":"LNCS","doi-asserted-by":"publisher","first-page":"539","DOI":"10.1007\/978-3-540-89255-7_33","volume-title":"ASIACRYPT 2008","author":"O Dunkelman","year":"2008","unstructured":"Dunkelman, O., Keller, N.: A new attack on the LEX stream cipher. In: Pieprzyk, J. (ed.) ASIACRYPT 2008. LNCS, vol. 5350, pp. 539\u2013556. Springer, Heidelberg (2008)"},{"key":"10_CR8","series-title":"LNCS","first-page":"330","volume-title":"FSE 2003","author":"N Ferguson","year":"2003","unstructured":"Ferguson, N., Whiting, D., Schneier, B., Kelsey, J., Lucks, S., Kohno, T.: Helix: fast encryption and authentication in a single cryptographic primitive. In: Johansson, T. (ed.) FSE 2003. LNCS, vol. 2887, pp. 330\u2013346. Springer, Heidelberg (2003)"},{"key":"10_CR9","series-title":"LNCS","first-page":"92","volume-title":"FSE 2001","author":"VD Gligor","year":"2002","unstructured":"Gligor, V.D., Donescu, P.: Fast encryption and authentication: XCBC encryption and XECB authentication modes. In: Matsui, M. (ed.) FSE 2001. LNCS, vol. 2355, pp. 92\u2013108. Springer, Heidelberg (2002)"},{"key":"10_CR10","unstructured":"Intel. Intel 64 and IA-32 Architectures Optimization Reference Manual. \n                      http:\/\/www.intel.com\/content\/dam\/doc\/manual\/64-ia-32-architectures-optimization-manual.pdf"},{"key":"10_CR11","series-title":"LNCS","first-page":"356","volume-title":"SAC 2011","author":"G Jakimoski","year":"2012","unstructured":"Jakimoski, G., Khajuria, S.: ASC-1: an authenticated encryption stream cipher. In: Miri, A., Vaudenay, S. (eds.) SAC 2011. LNCS, vol. 7118, pp. 356\u2013372. Springer, Heidelberg (2012)"},{"key":"10_CR12","series-title":"LNCS","doi-asserted-by":"publisher","first-page":"529","DOI":"10.1007\/3-540-44987-6_32","volume-title":"EUROCRYPT 2001","author":"CS Jutla","year":"2001","unstructured":"Jutla, C.S.: Encryption modes with almost free message integrity. In: Pfitzmann, B. (ed.) EUROCRYPT 2001. LNCS, vol. 2045, pp. 529\u2013544. Springer, Heidelberg (2001)"},{"key":"10_CR13","series-title":"LNCS","first-page":"1","volume-title":"CHES 2009","author":"E K\u00e4sper","year":"2009","unstructured":"K\u00e4sper, E., Schwabe, P.: Faster and timing-attack resistant AES-GCM. In: Clavier, C., Gaj, K. (eds.) CHES 2009. LNCS, vol. 5747, pp. 1\u201317. Springer, Heidelberg (2009)"},{"key":"10_CR14","series-title":"LNCS","first-page":"284","volume-title":"FSE 2000","author":"J Katz","year":"2001","unstructured":"Katz, J., Yung, M.: Unforgeable encryption and chosen ciphertext secure modes of operation. In: Schneier, B. (ed.) FSE 2000. LNCS, vol. 1978, pp. 284\u2013299. Springer, Heidelberg (2001)"},{"key":"10_CR15","series-title":"LNCS","first-page":"306","volume-title":"FSE 2011","author":"T Krovetz","year":"2011","unstructured":"Krovetz, T., Rogaway, P.: The software performance of authenticated-encryption modes. In: Joux, A. (ed.) FSE 2011. LNCS, vol. 6733, pp. 306\u2013327. Springer, Heidelberg (2011)"},{"key":"10_CR16","series-title":"LNCS","doi-asserted-by":"publisher","first-page":"343","DOI":"10.1007\/978-3-540-30556-9_27","volume-title":"INDOCRYPT 2004","author":"DA McGrew","year":"2004","unstructured":"McGrew, D.A., Viega, J.: The security and performance of the Galois\/Counter mode (GCM) of operation. In: Canteaut, A., Viswanathan, K. (eds.) INDOCRYPT 2004. LNCS, vol. 3348, pp. 343\u2013355. Springer, Heidelberg (2004)"},{"key":"10_CR17","unstructured":"National Institute of Standards and Technology. Advanced Encryption Standard. FIPS 197"},{"key":"10_CR18","unstructured":"National Institute of Standards and Technology. Recommendation for Block Cipher Modes of Operation. NIST special publication 800-38A, 2001 Edition"},{"key":"10_CR19","unstructured":"National Institute of Standards and Technology. The Keyed-Hash Message Authentication Code (HMAC). FIPS PUB 198"},{"key":"10_CR20","unstructured":"National Institute of Standards and Technology. Recommendations for Block Cipher Modes of Operation: The CCM Mode for Authentication and Confidentiality. NIST special publication 800-38C, May 2004"},{"key":"10_CR21","unstructured":"National Institute of Standards and Technology. Recommendations for Block Cipher Modes of Operation: Galois\/Counter Mode (GCM) and GMAC. NIST special publication 800-38D, Nov 2007"},{"key":"10_CR22","unstructured":"National Institute of Standards and Technology. Recommendation for Block Cipher Modes of Operation: The CMAC Mode for Authentication. NIST special publication 800-38B"},{"issue":"1","key":"10_CR23","doi-asserted-by":"publisher","first-page":"188","DOI":"10.1109\/18.746787","volume":"45","author":"B Preneel","year":"1999","unstructured":"Preneel, B., van Oorschot, P.C.: On the security of iterated message authentication codes. IEEE Trans. Inf. Theory 45(1), 188\u2013199 (1999)","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"3","key":"10_CR24","doi-asserted-by":"publisher","first-page":"365","DOI":"10.1145\/937527.937529","volume":"6","author":"P Rogaway","year":"2003","unstructured":"Rogaway, P., Bellare, M., Black, J.: OCB: a block-cipher mode of operation for efficient authenticated encryption. ACM Trans. Inf. Syst. Secur. 6(3), 365\u2013403 (2003). Earlier version, with T. Krovetz, in CCS 2001","journal-title":"ACM Trans. Inf. Syst. Secur."},{"key":"10_CR25","series-title":"LNCS","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1007\/978-3-540-30539-2_2","volume-title":"ASIACRYPT 2004","author":"P Rogaway","year":"2004","unstructured":"Rogaway, P.: Efficient instantiations of tweakable blockciphers and refinements to modes OCB and PMAC. In: Lee, P.J. (ed.) ASIACRYPT 2004. LNCS, vol. 3329, pp. 16\u201331. Springer, Heidelberg (2004)"},{"key":"10_CR26","unstructured":"Whiting, D., Schneier, B., Lucks, S., Muller, F.: Phelix: Fast Encryption and Authentication in a Single Cryptographic Primitive. eSTREAM, ECRYPT Stream Cipher Project, Report 2005\/027"},{"key":"10_CR27","series-title":"LNCS","first-page":"87","volume-title":"FSE 2007","author":"H Wu","year":"2007","unstructured":"Wu, H., Preneel, B.: Differential-linear attacks against the stream cipher Phelix. In: Biryukov, A. (ed.) FSE 2007. LNCS, vol. 4593, pp. 87\u2013100. Springer, Heidelberg (2007)"},{"key":"10_CR28","series-title":"LNCS","doi-asserted-by":"publisher","first-page":"209","DOI":"10.1007\/978-3-642-03356-8_13","volume-title":"CRYPTO 2009","author":"Z Yuan","year":"2009","unstructured":"Yuan, Z., Wang, W., Jia, K., Xu, G., Wang, X.: New birthday attacks on some MACs based on block ciphers. In: Halevi, S. (ed.) CRYPTO 2009. LNCS, vol. 5677, pp. 209\u2013230. Springer, Heidelberg (2009)"}],"container-title":["Lecture Notes in Computer Science","Selected Areas in Cryptography -- SAC 2013"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-662-43414-7_10","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,26]],"date-time":"2019-05-26T21:39:50Z","timestamp":1558906790000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-662-43414-7_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783662434130","9783662434147"],"references-count":28,"URL":"https:\/\/doi.org\/10.1007\/978-3-662-43414-7_10","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014]]}}}