{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,19]],"date-time":"2025-03-19T15:05:10Z","timestamp":1742396710965},"publisher-location":"Berlin, Heidelberg","reference-count":15,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540648925"},{"type":"electronic","value":"9783540684626"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1998]]},"DOI":"10.1007\/bfb0055743","type":"book-chapter","created":{"date-parts":[[2006,7,27]],"date-time":"2006-07-27T17:12:36Z","timestamp":1154020356000},"page":"390-407","source":"Crossref","is-referenced-by-count":29,"title":["Security amplification by composition: The case of doubly-iterated, ideal ciphers"],"prefix":"10.1007","author":[{"given":"W.","family":"Aiello","sequence":"first","affiliation":[]},{"given":"M.","family":"Bellare","sequence":"additional","affiliation":[]},{"given":"G.","family":"Di Crescenzo","sequence":"additional","affiliation":[]},{"given":"R.","family":"Venkatesan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2006,5,28]]},"reference":[{"key":"28_CR1","unstructured":"W. Aiello, M. Bellare, G. Di Crescenzo and R. Venkatesan, \u201cSecurity Amplification by Composition: The case of Doubly-Iterated, Ideal Ciphers,\u201d Full version of this paper, available via http:\/\/www-cse.ucscl.edu\/users\/mihir."},{"key":"28_CR2","unstructured":"M. Bellare, J. Kilian and P. Rogaway, \u201cThe security of cipher block chaining\u201d, Advances in Cryptology \u2014 Crypto 94 Proceedings, Lecture Notes in Computer Science Vol. 839, Y. Desmedt ed., Springer-Verlag, 1994."},{"issue":"No.1","key":"28_CR3","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/BF00630563","volume":"4","author":"E. Biham","year":"1991","unstructured":"E. Biham and A. Shamir, \u201cDifferential cryptanalysis of DES-like cryptosystems,\u201d J. of Cryptology, Vol. 4, No. 1, pp. 3\u201372, 1991.","journal-title":"J. of Cryptology"},{"key":"28_CR4","unstructured":"E. Biham and A. Shamir, \u201cDifferential cryptanalysis of the Full 16-round DES,\u201d Advances in Cryptology \u2014 Crypto 92 Proceedings, Lecture Notes in Computer Science Vol. 740, E. Brickell ed., Springer-Verlag, 1992."},{"issue":"No.6","key":"28_CR5","doi-asserted-by":"crossref","first-page":"74","DOI":"10.1109\/C-M.1977.217750","volume":"10","author":"W. Diffie","year":"1977","unstructured":"W. Diffie and M. Hellman, \u201cExhaustive cryptanalysis of the NBS data encryption standard,\u201d Computer, Vol. 10, No. 6, pp. 74\u201384, June 1977.","journal-title":"Computer"},{"issue":"No.2","key":"28_CR6","doi-asserted-by":"publisher","first-page":"108","DOI":"10.1145\/214438.214442","volume":"3","author":"S. Even","year":"1985","unstructured":"S. Even and O. Goldreich, \u201cOn the power of cascade ciphers,\u201d ACM Transactions on Computer Systems, Vol. 3, No. 2, May 1985, pp. 108\u2013116.","journal-title":"ACM Transactions on Computer Systems"},{"key":"28_CR7","unstructured":"S. Even and Y. Mansour, \u201cA construction of a cipher from a single pseudorandom permutation,\u201d Advances in Cryptology \u2014 ASIACRYPT 91 Proceedings, Lecture Notes in Computer Science Vol. 739, H. Imai, R. Rivest and T. Matsumoto ed., Springer-Verlag, 1991."},{"key":"28_CR8","unstructured":"J. Kilian and P. Rogaway, \u201cHow to protect DES against exhaustive key search\u201d, Advances in Cryptology \u2014 Crypto 96 Proceedings, Lecture Notes in Computer Science Vol. 1109, N. Koblitz ed., Springer-Verlag, 1996."},{"key":"28_CR9","doi-asserted-by":"crossref","unstructured":"M. Matsui, \u201cLinear cryptanalysis method for DES cipher,\u201d Advances in Cryptology \u2014 Eurocrypt 93 Proceedings, Lecture Notes in Computer Science Vol. 765, T. Helleseth ed., Springer-Verlag, 1993.","DOI":"10.1007\/3-540-48285-7_33"},{"issue":"No.1","key":"28_CR10","doi-asserted-by":"crossref","first-page":"55","DOI":"10.1007\/BF02620231","volume":"6","author":"U. Maurer","year":"1993","unstructured":"U. Maurer and J. Massey, \u201cCascade ciphers: The importance of being first,\u201d Journal of Cryptology, Vol. 6, No. 1, 1993, pp. 55\u201361.","journal-title":"Journal of Cryptology"},{"key":"28_CR11","volume-title":"Secrecy, authentication, and public key systems","author":"R. Merkle","year":"1979","unstructured":"R. Merkle, \u201cSecrecy, authentication, and public key systems,\u201d UMI Research Press, Ann Arbor, Michigan, 1979."},{"issue":"n.7","key":"28_CR12","doi-asserted-by":"publisher","first-page":"465","DOI":"10.1145\/358699.358718","volume":"24","author":"R. Merkle","year":"1981","unstructured":"R. Merkle, and M. Hellman, \u201cOn the security of multiple encryption\u201d, Communications of the ACM, vol. 24, n. 7, pp. 465\u2013467, July 1981.","journal-title":"Communications of the ACM"},{"issue":"No.4","key":"28_CR13","doi-asserted-by":"crossref","first-page":"656","DOI":"10.1002\/j.1538-7305.1949.tb00928.x","volume":"28","author":"C. Shannon","year":"1949","unstructured":"C. Shannon, \u201cCommunication theory of secrecy systems,\u201d Bell Systems Technical Journal, Vol. 28, No. 4, 1949, pp. 656\u2013715.","journal-title":"Bell Systems Technical Journal"},{"key":"28_CR14","unstructured":"P. Van Oorschot and M. Wiener, \u201cImproving meet in the middle attacks by orders of magnitude,\u201d Advances in Cryptology \u2014 Crypto 96 Proceedings, Lecture Notes in Computer Science Vol. 1109, N. Koblitz ed., Springer-Verlag, 1996."},{"key":"28_CR15","doi-asserted-by":"crossref","unstructured":"P. Van Oorschot and M. Wiener.\u201cA known plaintext attack on Two-Key Triple Encryption,\u201d Advances in Cryptology \u2014 Eurocrypt 90 Proceedings, Lecture Notes in Computer Science Vol. 473, I. Damg\u00e5rd ed., Springer-Verlag, 1990.","DOI":"10.1007\/3-540-46877-3_29"}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2014 CRYPTO '98"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/BFb0055743","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,7,30]],"date-time":"2021-07-30T09:41:54Z","timestamp":1627638114000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/BFb0055743"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1998]]},"ISBN":["9783540648925","9783540684626"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/bfb0055743","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[1998]]}}}