{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T07:27:21Z","timestamp":1750318041046,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":19,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783662478530"},{"type":"electronic","value":"9783662478547"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-662-47854-7_6","type":"book-chapter","created":{"date-parts":[[2015,7,15]],"date-time":"2015-07-15T10:06:28Z","timestamp":1436954788000},"page":"86-106","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":9,"title":["Protecting Encrypted Cookies from Compression Side-Channel Attacks"],"prefix":"10.1007","author":[{"given":"Janaka","family":"Alawatugoda","sequence":"first","affiliation":[]},{"given":"Douglas","family":"Stebila","sequence":"additional","affiliation":[]},{"given":"Colin","family":"Boyd","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,7,16]]},"reference":[{"key":"6_CR1","doi-asserted-by":"crossref","unstructured":"Fielding, R., Reschke, J.: Hypertext Transfer Protocol (HTTP\/1.1): Message Syntax and Routing. RFC 7230 (Proposed Standard) (2014)","DOI":"10.17487\/rfc7230"},{"key":"6_CR2","doi-asserted-by":"crossref","unstructured":"Dierks, T., Rescorla, E.: The Transport Layer Security (TLS) Protocol Version 1.2. RFC 5246 (Proposed Standard) (2008). Updated by RFCs 5746, 5878, 6176","DOI":"10.17487\/rfc5246"},{"key":"6_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"104","DOI":"10.1007\/3-540-68697-5_9","volume-title":"Advances in Cryptology - CRYPTO 1996","author":"PC Kocher","year":"1996","unstructured":"Kocher, P.C.: Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems. In: Koblitz, N. (ed.) CRYPTO 1996. LNCS, vol. 1109, pp. 104\u2013113. Springer, Heidelberg (1996)"},{"key":"6_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"97","DOI":"10.1007\/BFb0055858","volume-title":"Computer Security \u2013 ESORICS 1998","author":"J Kelsey","year":"1998","unstructured":"Kelsey, J., Schneier, B., Wagner, D., Hall, C.: Side channel cryptanalysis of product ciphers. In: Quisquater, J.-J., Deswarte, Y., Meadows, C., Gollmann, D. (eds.) ESORICS 1998. LNCS, vol. 1485, pp. 97\u2013110. Springer, Heidelberg (1998)"},{"key":"6_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"320","DOI":"10.1007\/978-3-540-74735-2_22","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2007","author":"M Hutter","year":"2007","unstructured":"Hutter, M., Mangard, S., Feldhofer, M.: Power and EM attacks on passive 13.56 mhz RFID devices. In: Paillier, P., Verbauwhede, I. (eds.) CHES 2007. LNCS, vol. 4727, pp. 320\u2013333. Springer, Heidelberg (2007)"},{"key":"6_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"263","DOI":"10.1007\/3-540-45661-9_21","volume-title":"Fast Software Encryption","author":"J Kelsey","year":"2002","unstructured":"Kelsey, J.: Compression and information leakage of plaintext. In: Daemen, J., Rijmen, V. (eds.) FSE 2002. LNCS, vol. 2365, pp. 263\u2013276. Springer, Heidelberg (2002)"},{"key":"6_CR7","unstructured":"Rizzo, J., Duong, T.: The CRIME attack. Presented at ekoparty 2012 (2012). http:\/\/goo.gl\/mlw1X1"},{"key":"6_CR8","unstructured":"The Chromium Projects: (SPDY). http:\/\/dev.chromium.org\/spdy"},{"key":"6_CR9","unstructured":"Trustworthy Internet Movement: SSL Pulse (2014). https:\/\/www.trustworthyinternet.org\/ssl-pulse\/"},{"key":"6_CR10","unstructured":"Gluck, Y., Harris, N., Prado, A.: SSL, gone in 30\u00a0s: A BREACH beyond CRIME. In: Black Hat USA 2013 (2013)"},{"key":"6_CR11","doi-asserted-by":"crossref","unstructured":"Belshe, M., Peon, R., Thomson, M.: Hypertext Transfer Protocol version 2. Internet-Draft (2014). http:\/\/tools.ietf.org\/html\/draft-ietf-httpbis-http2-16","DOI":"10.17487\/RFC7540"},{"key":"6_CR12","unstructured":"Kelley, J., Tamassia, R.: Secure compression: theory & practice. Cryptology ePrint Archive, Report 2014\/113 (2014). http:\/\/eprint.iacr.org\/2014\/113"},{"key":"6_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"474","DOI":"10.1007\/978-3-642-00457-5_28","volume-title":"Theory of Cryptography","author":"A Akavia","year":"2009","unstructured":"Akavia, A., Goldwasser, S., Vaikuntanathan, V.: Simultaneous hardcore bits and cryptography against memory attacks. In: Reingold, O. (ed.) TCC 2009. LNCS, vol. 5444, pp. 474\u2013495. Springer, Heidelberg (2009)"},{"key":"6_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1007\/978-3-642-03356-8_2","volume-title":"Advances in Cryptology - CRYPTO 2009","author":"M Naor","year":"2009","unstructured":"Naor, M., Segev, G.: Public-key cryptosystems resilient to key leakage. In: Halevi, S. (ed.) CRYPTO 2009. LNCS, vol. 5677, pp. 18\u201335. Springer, Heidelberg (2009)"},{"key":"6_CR15","unstructured":"Alawatugoda, J., Stebila, D., Boyd, C.: Protecting encrypted cookies from compression side-channel attacks (full version). Cryptology ePrint Archive, Report 2014\/724 (2014). http:\/\/eprint.iacr.org\/2014\/724"},{"key":"6_CR16","doi-asserted-by":"publisher","first-page":"324","DOI":"10.1093\/comjnl\/24.4.324","volume":"24","author":"J Pike","year":"1980","unstructured":"Pike, J.: Text compression using a 4\u00a0bit coding scheme. Comput. J. 24, 324\u2013330 (1980)","journal-title":"Comput. J."},{"key":"6_CR17","unstructured":"Sanfilippo, S.: Smaz: small strings compression library (2009). https:\/\/github.com\/antirez\/smaz"},{"key":"6_CR18","doi-asserted-by":"crossref","unstructured":"Klinc, D., Hazay, C., Jagmohan, A., Krawczyk, H., Rabin, T.: On Compression of Data Encrypted with Block Ciphers Cryptology ePrint Archive, Report 2010\/477. http:\/\/eprint.iacr.org\/2010\/477","DOI":"10.1109\/DCC.2009.71"},{"key":"6_CR19","unstructured":"Peon, R., Ruellan, H.: HPACK-Header Compression for HTTP\/2. http:\/\/http2.github.io\/http2-spec\/compression.html"}],"container-title":["Lecture Notes in Computer Science","Financial Cryptography and Data Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-662-47854-7_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,8]],"date-time":"2023-02-08T14:07:22Z","timestamp":1675865242000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-662-47854-7_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783662478530","9783662478547"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-662-47854-7_6","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]},"assertion":[{"value":"16 July 2015","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}