{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,10]],"date-time":"2025-12-10T12:17:42Z","timestamp":1765369062572},"reference-count":21,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2016,1,22]],"date-time":"2016-01-22T00:00:00Z","timestamp":1453420800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"name":"Conacyt, Mexico","award":["166763"],"award-info":[{"award-number":["166763"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int. J. Inf. Secur."],"published-print":{"date-parts":[[2016,8]]},"DOI":"10.1007\/s10207-015-0313-x","type":"journal-article","created":{"date-parts":[[2016,1,22]],"date-time":"2016-01-22T02:05:32Z","timestamp":1453428332000},"page":"413-432","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":14,"title":["A cryptographic study of tokenization systems"],"prefix":"10.1007","volume":"15","author":[{"given":"Sandra","family":"D\u00edaz-Santiago","sequence":"first","affiliation":[]},{"given":"Lil Mar\u00eda","family":"Rodr\u00edguez-Henr\u00edquez","sequence":"additional","affiliation":[]},{"given":"Debrup","family":"Chakraborty","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,1,22]]},"reference":[{"key":"313_CR1","doi-asserted-by":"crossref","unstructured":"Bellare, M., Ristenpart, T., Rogaway, P., Stegers T.: Format-preserving encryption. In: Jacobson Jr., M.J., Rijmen V., Safavi-Naini R., (eds.), Selected Areas in Cryptography, volume 5867 of Lecture Notes in Computer Science, pp. 295\u2013312. Springer (2009)","DOI":"10.1007\/978-3-642-05445-7_19"},{"key":"313_CR2","unstructured":"Bellare, M., Rogaway, P., Spies, T.: The FFX Mode of Operation for Format-Preserving Encryption. NIST submission (2010). http:\/\/csrc.nist.gov\/groups\/ST\/toolkit\/BCM\/documents\/proposedmodes\/ffx\/ffx-spec"},{"key":"313_CR3","doi-asserted-by":"crossref","unstructured":"Berbain, C., Gilbert, H.: On the security of IV dependent stream ciphers. In: Biryukov, A., (ed.) FSE, volume 4593 of Lecture Notes in Computer Science, pp. 254\u2013273. Springer (2007)","DOI":"10.1007\/978-3-540-74619-5_17"},{"key":"313_CR4","doi-asserted-by":"crossref","unstructured":"Black, J., Rogaway, P.: Ciphers with arbitrary finite domains. In: Preneel, B., (ed.) CT-RSA, volume 2271 of Lecture Notes in Computer Science, pp. 114\u2013130. Springer (2002)","DOI":"10.1007\/3-540-45760-7_9"},{"key":"313_CR5","unstructured":"Brier, E., Peyrin, T., Stern, J.: BPS: A Format-Preserving Encryption Proposal. NIST submission (2010). http:\/\/csrc.nist.gov\/groups\/ST\/toolkit\/BCM\/documents\/proposedmodes\/bps\/bps-spec"},{"key":"313_CR6","unstructured":"CardHub: Number of Credit Cards and Credit Card Holders (2012). http:\/\/www.cardhub.com\/edu\/number-of-credit-cards\/"},{"key":"313_CR7","unstructured":"EMV: Payment Tokenisation Specification. Technical Framework (2014). https:\/\/www.emvco.com\/specifications.aspx?id=263"},{"key":"313_CR8","doi-asserted-by":"crossref","unstructured":"Hoang, V.T., Morris, B., Rogaway, P.: An enciphering scheme based on a card shuffle. In: Safavi-Naini, R., Canetti, R. (eds.) CRYPTO, volume 7417 of Lecture Notes in Computer Science, pp. 1\u201313. Springer (2012)","DOI":"10.1007\/978-3-642-32009-5_1"},{"key":"313_CR9","unstructured":"ISO\/IEC 7812\u20131: Identification Cards-Identification of Issuers-Part 1: Numbering System (2006)"},{"key":"313_CR10","doi-asserted-by":"crossref","unstructured":"Liskov, M., Rivest, R.L., Wagner, D.: Tweakable block ciphers. In: Yung, M. (ed.) CRYPTO, volume 2442 of Lecture Notes in Computer Science, pp. 31\u201346. Springer (2002)","DOI":"10.1007\/3-540-45708-9_3"},{"key":"313_CR11","doi-asserted-by":"crossref","unstructured":"Morris, B., Rogaway, P., Stegers, T.: How to encipher messages on a small domain. In: Halevi, S. (ed.) CRYPTO, volume 5677 of Lecture Notes in Computer Science, pp. 286\u2013302. Springer (2009)","DOI":"10.1007\/978-3-642-03356-8_17"},{"key":"313_CR12","unstructured":"PCI Security Standards Council: Payment Card Industry Data Security Standard Version 1.2 (2008). https:\/\/www.pcisecuritystandards.org\/security_standards\/pci_dss.shtml"},{"key":"313_CR13","unstructured":"PCI Security Standards Council: Information Supplement: PCI DSS Tokenization Guidelines (2011). https:\/\/www.pcisecuritystandards.org\/documents\/Tokenization_Guidelines_Info_Supplement"},{"key":"313_CR14","unstructured":"PCI Security Standards Council: Tokenization Product Security Guidelines-Irreversible and Reversible Tokens (2015). https:\/\/www.pcisecuritystandards.org\/documents\/Tokenization_Product_Security_Guidelines"},{"key":"313_CR15","doi-asserted-by":"crossref","unstructured":"Ristenpart, T., Yilek, S.: The mix-and-cut shuffle: Small-domain encryption secure against n queries. In: Canetti, R., Garay, J.A. (eds.) CRYPTO (1), volume 8042 of Lecture Notes in Computer Science, pp. 392\u2013409. Springer (2013)","DOI":"10.1007\/978-3-642-40041-4_22"},{"key":"313_CR16","doi-asserted-by":"crossref","unstructured":"Robshaw, M.J.B., Billet, O. (eds.): New Stream Cipher Designs-The eSTREAM Finalists, volume 4986 of Lecture Notes in Computer Science. Springer (2008)","DOI":"10.1007\/978-3-540-68351-3"},{"key":"313_CR17","unstructured":"RSA White Paper: Tokenization: What Next After PCI (2012). http:\/\/www.emc.com\/collateral\/white-papers\/h11918-wp-tokenization-rsa-dpm"},{"key":"313_CR18","unstructured":"Securosis White Paper: Tokenization Guidance: How to Reduce pci Compliance Costs (2011). http:\/\/gateway.elavon.com\/documents\/Tokenization_Guidelines_White_Paper"},{"key":"313_CR19","unstructured":"Securosis White Paper: Tokenization vs. Encryption: Options for Compliance (2011). https:\/\/securosis.com\/research\/publication\/tokenization-vs.-encryption-options-for-compliance"},{"key":"313_CR20","first-page":"254","volume":"2012","author":"E Stefanov","year":"2012","unstructured":"Stefanov, E., Shi, E.: Fastprp: fast pseudo-random permutations for small domains. IACR Cryptol. ePrint Arch. 2012, 254 (2012)","journal-title":"IACR Cryptol. ePrint Arch."},{"key":"313_CR21","unstructured":"Voltage Security White Paper: Payment Security Solution\u2014Processor Edition (2012). http:\/\/www.voltage.com\/wp-content\/uploads\/Voltage_White_Paper_SecureData_PaymentsProcessorEdition"}],"container-title":["International Journal of Information Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-015-0313-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10207-015-0313-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-015-0313-x","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,3]],"date-time":"2019-09-03T18:38:01Z","timestamp":1567535881000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10207-015-0313-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,1,22]]},"references-count":21,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2016,8]]}},"alternative-id":["313"],"URL":"https:\/\/doi.org\/10.1007\/s10207-015-0313-x","relation":{},"ISSN":["1615-5262","1615-5270"],"issn-type":[{"value":"1615-5262","type":"print"},{"value":"1615-5270","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,1,22]]}}}