{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T18:28:23Z","timestamp":1761676103969},"reference-count":34,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2013,9,27]],"date-time":"2013-09-27T00:00:00Z","timestamp":1380240000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Des. Codes Cryptogr."],"published-print":{"date-parts":[[2015,3]]},"DOI":"10.1007\/s10623-013-9882-8","type":"journal-article","created":{"date-parts":[[2013,9,26]],"date-time":"2013-09-26T15:34:08Z","timestamp":1380209648000},"page":"645-663","source":"Crossref","is-referenced-by-count":13,"title":["Building blockcipher from small-block tweakable blockcipher"],"prefix":"10.1007","volume":"74","author":[{"given":"Kazuhiko","family":"Minematsu","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2013,9,27]]},"reference":[{"key":"9882_CR1","doi-asserted-by":"crossref","unstructured":"Shannon C.: Communication theory of secrecy systems. Bell Syst. Tech. J. 28, 656\u2013715 (1949).","DOI":"10.1002\/j.1538-7305.1949.tb00928.x"},{"key":"9882_CR2","unstructured":"Luby M., Rackoff C.: How to construct pseudorandom permutations from pseudorandom functions. SIAM J. Comput. 17(2), 373\u2013386 (1988)."},{"key":"9882_CR3","unstructured":"Goldreich O.: Modern Cryptography, Probabilistic Proofs, and Pseudorandomness. Springer, New York (1998)."},{"key":"9882_CR4","unstructured":"Patarin J.: Security of random Feistel schemes with 5 or more rounds. In: Franklin M.K. (ed.) CRYPTO. Lecture Notes in Computer Science, vol. 3152, pp. 106\u2013122. Springer, Heidelberg (2004)."},{"key":"9882_CR5","unstructured":"Maurer U.M., Pietrzak K.: The security of many-round Luby\u2013Rackoff pseudo-random permutations. In: Biham E. (ed.) EUROCRYPT. Lecture Notes in Computer Science, vol. 2656, pp. 544\u2013561. Springer, Heidelberg (2003)."},{"key":"9882_CR6","unstructured":"Morris B., Rogaway P., Stegers T.: How to encipher messages on a small domain. In: Halevi S. (ed.) CRYPTO. Lecture Notes in Computer Science, vol. 5677, pp. 286\u2013302. Springer, Berlin, Heidelberg (2009)."},{"key":"9882_CR7","doi-asserted-by":"crossref","unstructured":"Naor M., Reingold O.: On the construction of pseudorandom permutations: Luby\u2013Rackoff revisited. J. Cryptol. 12(1), 29\u201366 (1999).","DOI":"10.1007\/PL00003817"},{"key":"9882_CR8","unstructured":"Minematsu K.: Beyond-birthday-bound security based on tweakable block cipher. In: Dunkelman O. (ed.) FSE. Lecture Notes in Computer Science, vol. 5665, pp. 308\u2013326. Springer, Berlin, Heidelberg (2009)."},{"key":"9882_CR9","unstructured":"Liskov M., Rivest R.L., Wagner D.: Tweakable block ciphers. In: Yung M. (ed.) CRYPTO. Lecture Notes in Computer Science, vol. 2442, pp. 31\u201346. Springer, Berlin (2002)."},{"key":"9882_CR10","unstructured":"Skein Hash Function. SHA-3 Submission, http:\/\/www.skein-hash.info\/ (2008). Accessed 25 Sept 2013."},{"key":"9882_CR11","unstructured":"Rogaway P.: Efficient instantiations of tweakable blockciphers and refinements to modes OCB and PMAC. In: Lee P.J. (ed.) ASIACRYPT. Lecture Notes in Computer Science, vol. 3329, pp. 16\u201331. Springer, Heidelberg (2004)."},{"key":"9882_CR12","unstructured":"Rogaway P., Zhang H.: Online ciphers from tweakable blockciphers. In: Kiayias A. (ed.) CT-RSA. Lecture Notes in Computer Science, vol. 6558, pp. 237\u2013249. Springer, Berlin (2011)."},{"key":"9882_CR13","unstructured":"Coron J.S., Dodis Y., Mandal A., Seurin Y.: A domain extender for the ideal cipher. In: Micciancio D. (ed.) TCC. Lecture Notes in Computer Science, vol. 5978, pp. 273\u2013289. Springer, Heidelberg (2010)."},{"key":"9882_CR14","unstructured":"Minematsu K., Iwata T.: Building blockcipher from tweakable blockcipher: extending FSE 2009 proposal. In: Chen L. (ed.) IMA International Conference. Lecture Notes in Computer Science, vol. 7089, pp. 391\u2013412. Springer, Berlin (2011)."},{"key":"9882_CR15","unstructured":"Schneier B., Kelsey J.: Unbalanced Feistel networks and block cipher design. In: Gollmann D. (ed.) FSE. Lecture Notes in Computer Science, vol. 1039, pp. 121\u2013144. Springer, Heidelberg (1996)."},{"key":"9882_CR16","unstructured":"Halevi S., Rogaway P.: A tweakable enciphering mode. In: Boneh D. (ed.) CRYPTO. Lecture Notes in Computer Science, vol. 2729, pp. 482\u2013499. Springer, Heidelberg (2003)."},{"key":"9882_CR17","unstructured":"Bellare M., Ristenpart T., Rogaway P., Stegers T.: Format-preserving encryption. In: Jacobson Jr M.J., Rijmen V., Safavi-Naini R. (eds.) Selected Areas in Cryptography. Lecture Notes in Computer Science, vol. 5867, pp. 295\u2013312. Springer, Berlin, Heidelberg (2009)."},{"key":"9882_CR18","unstructured":"Visa Best Practices for Tokenization Version 1.0, http:\/\/usa.visa.com\/download\/merchants\/tokenization_best_practices.pdf . Accessed 25 Sept 2013."},{"key":"9882_CR19","unstructured":"Maurer U.M.: Indistinguishability of random systems. In: Knudsen L.R. (ed.) EUROCRYPT. Lecture Notes in Computer Science, vol. 2332, pp. 110\u2013132. Springer, Berlin (2002)."},{"key":"9882_CR20","unstructured":"Jetchev D., \u00d6zen O., Stam M.: Understanding adaptivity: random systems revisited. In: Wang X., Sako K. (eds.) ASIACRYPT. Lecture Notes in Computer Science, vol. 7658, pp. 313\u2013330. Springer, Berlin, Heidelberg (2012)."},{"key":"9882_CR21","unstructured":"Bellare M., Rogaway P., Spies T.: The FFX mode of operation for format-preserving encryption, http:\/\/csrc.nist.gov\/groups\/ST\/toolkit\/BCM\/documents\/proposedmodes\/ffx\/ffx-spec.pdf\/ (2010). Accessed 25 Sept 2013."},{"key":"9882_CR22","unstructured":"Bellare M., Desai A., Jokipii E., Rogaway P.: A concrete security treatment of symmetric encryption. In: FOCS, pp. 394\u2013403. IEEE Computer Society, Los Alamitos (1997)."},{"key":"9882_CR23","unstructured":"Schroeppel R.: Hasty pudding cipher. AES Submission, http:\/\/www.cs.arizona.edu\/rcs\/hpc\/ (1998). Accessed 25 Sept 2013."},{"key":"9882_CR24","unstructured":"Crowley P.: Mercy: a fast large block cipher for disk sector encryption. In: Schneier B. (ed.) FSE. Lecture Notes in Computer Science, vol. 1978, pp. 49\u201363. Springer, New York (2000)."},{"key":"9882_CR25","unstructured":"Fluhrer S.R.: Cryptanalysis of the Mercy block cipher. In: Matsui M. (ed.) FSE. Lecture Notes in Computer Science, vol. 2355, pp. 28\u201336. Springer, Berlin, Heidelberg (2001)."},{"key":"9882_CR26","unstructured":"Minematsu K.: Improved security analysis of XEX and LRW modes. In: Biham E., Youssef A.M. (eds.) Selected Areas in Cryptography. Lecture Notes in Computer Science, vol. 4356, pp. 96\u2013113. Springer, Berlin (2006)."},{"key":"9882_CR27","unstructured":"Bellare M., Krovetz T., Rogaway P.: Luby\u2013Rackoff backwards: increasing security by making block ciphers non-invertible. In: Nyberg K. (ed.) EUROCRYPT. Lecture Notes in Computer Science, vol. 1403, pp. 266\u2013280. Springer, Heidelberg (1998)."},{"key":"9882_CR28","unstructured":"Landecker W., Shrimpton T., Terashima R.S.: Tweakable blockciphers with beyond birthday-bound security. In: Safavi-Naini R., Canetti R. (eds.) CRYPTO. Lecture Notes in Computer Science, vol. 7417, pp. 14\u201330. Springer, Berlin, Heidelberg (2012)."},{"key":"9882_CR29","doi-asserted-by":"crossref","unstructured":"Lampe R., Seurin Y.: Tweakable blockciphers with asymptotically optimal security. In: Pre-proceedings of Fast Software Encryption (2013).","DOI":"10.1007\/978-3-662-43933-3_8"},{"key":"9882_CR30","unstructured":"Gladman B.: http:\/\/www.gladman.me.uk\/ . Accessed 25 Sept 2013."},{"key":"9882_CR31","unstructured":"Brier E., Peyrin T., Stern J.: BPS: a format-preserving encryption proposal, http:\/\/csrc.nist.gov\/groups\/ST\/toolkit\/BCM\/documents\/proposedmodes\/bps\/bps-spec.pdf\/ (2010). Accessed 25 Sept 2013."},{"key":"9882_CR32","unstructured":"Fisher-Yates Shuffle. Wikipedia Entry, http:\/\/en.wikipedia.org\/wiki\/Fisher-Yates_shuffle\/ . Accessed 25 Sept 2013."},{"key":"9882_CR33","unstructured":"Vance J.: VAES3 scheme for FFX: An addendum to \u201cThe FFX Mode of Operation for Format-Preserving Encryption\u201d. NIST CSRC, http:\/\/csrc.nist.gov\/groups\/ST\/toolkit\/BCM\/documents\/proposedmodes\/ffx\/ffx-ad-VAES3.pdf\/ (2011). Accessed 25 Sept 2013."},{"key":"9882_CR34","unstructured":"Granboulan L., Pornin T.: Perfect block ciphers with small blocks. In: Biryukov A. (ed.) FSE. Lecture Notes in Computer Science, vol. 4593, pp. 452\u2013465. Springer, Heidelberg (2007)."}],"container-title":["Designs, Codes and Cryptography"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-013-9882-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10623-013-9882-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-013-9882-8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,7,25]],"date-time":"2019-07-25T23:17:42Z","timestamp":1564096662000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10623-013-9882-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,9,27]]},"references-count":34,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2015,3]]}},"alternative-id":["9882"],"URL":"https:\/\/doi.org\/10.1007\/s10623-013-9882-8","relation":{},"ISSN":["0925-1022","1573-7586"],"issn-type":[{"value":"0925-1022","type":"print"},{"value":"1573-7586","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013,9,27]]}}}