{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,19]],"date-time":"2026-02-19T05:48:13Z","timestamp":1771480093614,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":13,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540643821","type":"print"},{"value":"9783540697671","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1998]]},"DOI":"10.1007\/bfb0030415","type":"book-chapter","created":{"date-parts":[[2006,1,25]],"date-time":"2006-01-25T10:24:34Z","timestamp":1138184674000},"page":"121-134","source":"Crossref","is-referenced-by-count":38,"title":["Secure applications of low-entropy keys"],"prefix":"10.1007","author":[{"given":"John","family":"Kelsey","sequence":"first","affiliation":[]},{"given":"Bruce","family":"Schneier","sequence":"additional","affiliation":[]},{"given":"Chris","family":"Hall","sequence":"additional","affiliation":[]},{"given":"David","family":"Wagner","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2005,6,17]]},"reference":[{"key":"11_CR1","unstructured":"M. Abadi, personal communication."},{"key":"11_CR2","unstructured":"[BDRSSTW96] M. Blaze, W. Diffie, R. Rivest, B. Schneier, T. Shimomura, E. Thompson, and M. Wiener, \u201cMinimal Key Lengths for Symmetric Ciphers to Provide Adequate Commercial Security,\u201d January 1996."},{"key":"11_CR3","doi-asserted-by":"crossref","unstructured":"H. Dobbertin, A. Bosselaers, and B. Preneel, \u201cRIPEMD-160: A Strengthened Version of RIPEMD,\u201d Fast Software Encryption: Third International Workshop, Cambrdige, UK, February 1996 Proceedings, Springer-Verlag, 1996, pp. 71\u201382.","DOI":"10.1007\/3-540-60865-6_44"},{"issue":"4","key":"11_CR4","doi-asserted-by":"crossref","first-page":"401","DOI":"10.1109\/TIT.1980.1056220","volume":"26","author":"M.E. Hellman","year":"1980","unstructured":"M.E. Hellman, \u201cA Cryptanalytic Time-Memory Trade Off,\u201d IEEE Transactions on Information Theory, v. 26, n. 4, Jul 1980, pp. 401\u2013406.","journal-title":"IEEE Transactions on Information Theory"},{"key":"11_CR5","unstructured":"D. Knuth, The Art of Computer Programming: Volume 2, Seminumerical Algorithms, Addison-Wesley, 1981."},{"issue":"2","key":"11_CR6","doi-asserted-by":"crossref","first-page":"171","DOI":"10.1016\/0167-4048(96)00003-X","volume":"15","author":"U. Manber","year":"1996","unstructured":"U. Manber, \u201cA Simple Scheme to Make Passwords Based on One-Way Functions Much Harder to Crack,\u201d Computers & Security, v. 15, n. 2, 1996, pp. 171\u2013176.","journal-title":"Computers & Security"},{"key":"11_CR7","doi-asserted-by":"crossref","unstructured":"R.H. Morris and K. Thompson, \u201cUNIX Password Security,\u201d Communications of the ACM, v. 22, n. 11, Nov 1979.","DOI":"10.1145\/359168.359172"},{"key":"11_CR8","unstructured":"National Bureau of Standards, NBS FIPS PUB 46, \u201cData Encryption Standard,\u201d National Bureau of Standards, U.S. Department of Commerce, Jan 1977."},{"key":"11_CR9","unstructured":"National Institute of Standards and Technology, NIST FIPS PUB 180, \u201cSecure Hash Standard,\u201d U.S. Department of Commerce, May 93."},{"key":"11_CR10","doi-asserted-by":"crossref","unstructured":"J.-J. Quisquater, Y. Desmedt, and M. Davio, \u201cThe Importance of \u2018Good\u2019 Key Schemes (How to Make a Secure DES with \u2264 48 Bit Keys?),\u201d Advances in Cryptology\u2014CRYPTO '85 Proceedings, Springer-Verlag, 1986, pp. 537\u2013542.","DOI":"10.1007\/3-540-39799-X_43"},{"key":"11_CR11","unstructured":"B. Schneier, Applied Cryptography, Second Edition, John Wiley & Sons, 1996."},{"key":"11_CR12","unstructured":"Peter Trei, personal communication, 1997."},{"key":"11_CR13","unstructured":"M. Wiener, \u201cEfficient DES Key Search,\u201d TR-244, School of Computer Science, Carleton Unversity, May 1994."}],"container-title":["Lecture Notes in Computer Science","Information Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/BFb0030415","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,4,16]],"date-time":"2019-04-16T10:39:02Z","timestamp":1555411142000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/BFb0030415"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1998]]},"ISBN":["9783540643821","9783540697671"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/bfb0030415","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[1998]]}}}