{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,3]],"date-time":"2025-04-03T04:44:00Z","timestamp":1743655440517},"publisher-location":"Singapore","reference-count":17,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811041532"},{"type":"electronic","value":"9789811041549"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-981-10-4154-9_27","type":"book-chapter","created":{"date-parts":[[2017,3,17]],"date-time":"2017-03-17T00:29:21Z","timestamp":1489710561000},"page":"231-240","source":"Crossref","is-referenced-by-count":1,"title":["On the Security Analysis of Weak Cryptographic Primitive Based Key Derivation Function"],"prefix":"10.1007","author":[{"given":"Chai Wen","family":"Chuah","sequence":"first","affiliation":[]},{"given":"Mustafa","family":"Mat Deris","sequence":"additional","affiliation":[]},{"given":"Edward","family":"Dawson","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,3,18]]},"reference":[{"key":"27_CR1","doi-asserted-by":"crossref","unstructured":"Bellare, M., Rogaway, P.: Random oracles are practical: A paradigm for designing efficient protocols. In: Proceedings of the 1st ACM Conference on Computer and Communications Security, pp. 62\u201373. ACM (1993)","DOI":"10.1145\/168588.168596"},{"key":"27_CR2","unstructured":"Cao, Z.: How to Launch A Birthday Attack Against DES. IACR Cryptology ePrint Archive 2008, vol. 288 (2008)"},{"key":"27_CR3","doi-asserted-by":"crossref","unstructured":"Chen, L.: NIST SP 800-56C: recommendation for key derivation through extraction-then-expansion. Technical report, NIST (2011)","DOI":"10.6028\/NIST.SP.800-56c"},{"key":"27_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"199","DOI":"10.1007\/978-3-642-29101-2_14","volume-title":"Information Security Practice and Experience","author":"CC Wen","year":"2012","unstructured":"Wen, C.C., Dawson, E., Gonz\u00e1lez Nieto, J.M., Simpson, L.: A framework for security analysis of key derivation functions. In: Ryan, M.D., Smyth, B., Wang, G. (eds.) ISPEC 2012. LNCS, vol. 7232, pp. 199\u2013216. Springer, Heidelberg (2012). doi: 10.1007\/978-3-642-29101-2_14"},{"key":"27_CR5","series-title":"IFIP Advances in Information and Communication Technology","doi-asserted-by":"publisher","first-page":"125","DOI":"10.1007\/978-3-642-39218-4_10","volume-title":"Security and Privacy Protection in Information Processing Systems","author":"CW Chuah","year":"2013","unstructured":"Chuah, C.W., Dawson, E., Simpson, L.: Key derivation function: The SCKDF scheme. In: Janczewski, L.J., Wolfe, H.B., Shenoi, S. (eds.) SEC 2013. IAICT, vol. 405, pp. 125\u2013138. Springer, Heidelberg (2013). doi: 10.1007\/978-3-642-39218-4_10"},{"key":"27_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"494","DOI":"10.1007\/978-3-540-28628-8_30","volume-title":"Advances in Cryptology \u2013 CRYPTO 2004","author":"Y Dodis","year":"2004","unstructured":"Dodis, Y., Gennaro, R., H\u00e5stad, J., Krawczyk, H., Rabin, T.: Randomness extraction and key derivation using the CBC, cascade and HMAC modes. In: Franklin, M. (ed.) CRYPTO 2004. LNCS, vol. 3152, pp. 494\u2013510. Springer, Heidelberg (2004). doi: 10.1007\/978-3-540-28628-8_30"},{"key":"27_CR7","doi-asserted-by":"crossref","unstructured":"Harkins, D., Carrel, D.: RFC 2409: The Internet Key Exchange (IKE). Technical report, Internet Engineering Task Force (1998)","DOI":"10.17487\/rfc2409"},{"key":"27_CR8","doi-asserted-by":"crossref","unstructured":"Heer, T., Jokela, P., Henderson, T.: Host identity protocol version 2 (HIPv2). Technical report, Internet Engineering Task Force (2015)","DOI":"10.17487\/rfc7401"},{"key":"27_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"240","DOI":"10.1007\/978-3-540-28632-5_18","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2004","author":"JJ Hoch","year":"2004","unstructured":"Hoch, J.J., Shamir, A.: Fault analysis of stream ciphers. In: Joye, M., Quisquater, J.-J. (eds.) CHES 2004. LNCS, vol. 3156, pp. 240\u2013253. Springer, Heidelberg (2004). doi: 10.1007\/978-3-540-28632-5_18"},{"key":"27_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"631","DOI":"10.1007\/978-3-642-14623-7_34","volume-title":"Advances in Cryptology \u2013 CRYPTO 2010","author":"H Krawczyk","year":"2010","unstructured":"Krawczyk, H.: Cryptographic extraction and key derivation: The HKDF scheme. In: Rabin, T. (ed.) CRYPTO 2010. LNCS, vol. 6223, pp. 631\u2013648. Springer, Heidelberg (2010). doi: 10.1007\/978-3-642-14623-7_34"},{"key":"27_CR11","doi-asserted-by":"crossref","unstructured":"Krawczyk, H., Eronen, P.: HMAC-based Extract-and-Expand Key Derivation Function (HKDF). Technical report, RFC 5869 (2010)","DOI":"10.17487\/rfc5869"},{"key":"27_CR12","doi-asserted-by":"crossref","unstructured":"Ma, Z.Q., Gu, D.W.: Improved differential fault analysis of SOSEMANUK. In: 2012 Eighth International Conference on Computational Intelligence and Security (CIS), pp. 487\u2013491. IEEE (2012)","DOI":"10.1109\/CIS.2012.115"},{"key":"27_CR13","volume-title":"Handbook of Applied Cryptography","author":"AJ Menezes","year":"1997","unstructured":"Menezes, A.J., Van Oorschot, P.C., Vanstone, S.A.: Handbook of Applied Cryptography. CRC Press, Boca Raton (1997)"},{"key":"27_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/11535218_1","volume-title":"Advances in Cryptology \u2013 CRYPTO 2005","author":"X Wang","year":"2005","unstructured":"Wang, X., Yu, H., Yin, Y.L.: Efficient collision search attacks on SHA-0. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol. 3621, pp. 1\u201316. Springer, Heidelberg (2005). doi: 10.1007\/11535218_1"},{"key":"27_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1007\/11535218_2","volume-title":"Advances in Cryptology \u2013 CRYPTO 2005","author":"X Wang","year":"2005","unstructured":"Wang, X., Yin, Y.L., Yu, H.: Finding collisions in the full SHA-1. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol. 3621, pp. 17\u201336. Springer, Heidelberg (2005). doi: 10.1007\/11535218_2"},{"key":"27_CR16","unstructured":"Xie, T., Liu, F.B., Feng, D.G.: Fast Collision Attack on MD5. IACR Cryptology ePrint Archive 2013:D170 (2013)"},{"key":"27_CR17","unstructured":"Zhu, L., Wasserman, M., Mills, W.: PKINIT Algorithm Agility. Technical report, Internet Engineering Task Force (2015)"}],"container-title":["Lecture Notes in Electrical Engineering","Information Science and Applications 2017"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-10-4154-9_27","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,19]],"date-time":"2019-09-19T17:34:52Z","timestamp":1568914492000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-981-10-4154-9_27"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9789811041532","9789811041549"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-981-10-4154-9_27","relation":{},"ISSN":["1876-1100","1876-1119"],"issn-type":[{"type":"print","value":"1876-1100"},{"type":"electronic","value":"1876-1119"}],"subject":[],"published":{"date-parts":[[2017]]}}}