{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,11]],"date-time":"2026-02-11T13:09:50Z","timestamp":1770815390454,"version":"3.50.1"},"reference-count":11,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2024,6,3]],"date-time":"2024-06-03T00:00:00Z","timestamp":1717372800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,6,3]],"date-time":"2024-06-03T00:00:00Z","timestamp":1717372800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Comput Virol Hack Tech"],"DOI":"10.1007\/s11416-024-00528-y","type":"journal-article","created":{"date-parts":[[2024,6,3]],"date-time":"2024-06-03T15:01:54Z","timestamp":1717426914000},"page":"513-523","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["On improved security bounds of one block ciphers mode of operation for protection of block-oriented system storage devices"],"prefix":"10.1007","volume":"20","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-5464-4045","authenticated-orcid":false,"given":"Georgii","family":"Firsov","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3186-0471","authenticated-orcid":false,"given":"Alisa","family":"Koreneva","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,6,3]]},"reference":[{"key":"528_CR1","unstructured":"Russian National Bureau of Standards: R 1323565.1.042-2022. Information technology. Cryptographic protection of information. Block ciphers mode of operation designed to protect of data storage medium with a block-oriented structure (2022)"},{"key":"528_CR2","unstructured":"Bogdanov, D., Nozdrunov, V.: Some properties of one mode of operation of block ciphers. In: 10th Workshop on Current Trends in Cryptology (CTCrypt 2021). Pre-proceedings, pp. 12\u201317 (2021)"},{"key":"528_CR3","unstructured":"National Institute of Standards and Technology: SP 800\u201338E. The XTS-AES Mode for Confidentiality on Storage Devices, Recommendation for Block Cipher Modes of Operation (2010)"},{"key":"528_CR4","doi-asserted-by":"publisher","first-page":"103","DOI":"10.1007\/978-3-030-38471-5_5","volume-title":"Selected Areas in Cryptography\u2014SAC 2019","author":"T Isobe","year":"2020","unstructured":"Isobe, T., Minematsu, K.: Plaintext recovery attacks against XTS beyond collisions. In: Paterson, K.G., Stebila, D. (eds.) Selected Areas in Cryptography\u2014SAC 2019, pp. 103\u2013123. Springer, Cham (2020)"},{"issue":"3","key":"528_CR5","doi-asserted-by":"publisher","first-page":"691","DOI":"10.25559\/SITITO.18.202203.691-701","volume":"18","author":"G Firsov","year":"2022","unstructured":"Firsov, G., Koreneva, A.: On one block cipher mode of operation used to protect data on block-oriented storage devices. Mod. Inf. Technol. IT Educ. 18(3), 691\u2013701 (2022). https:\/\/doi.org\/10.25559\/SITITO.18.202203.691-701","journal-title":"Mod. Inf. Technol. IT Educ."},{"key":"528_CR6","unstructured":"Russian National Bureau of Standards: GOST 34.12-2018. Information technology. Cryptographic protection of information. Block ciphers (2018)"},{"key":"528_CR7","doi-asserted-by":"publisher","first-page":"412","DOI":"10.1007\/978-3-540-74143-5_23","volume-title":"Advances in Cryptology\u2014CRYPTO 2007","author":"S Halevi","year":"2007","unstructured":"Halevi, S.: Invertible universal hashing and the TET encryption mode. In: Menezes, A. (ed.) Advances in Cryptology\u2014CRYPTO 2007, pp. 412\u2013429. Springer, Berlin, Heidelberg (2007)"},{"issue":"10","key":"528_CR8","doi-asserted-by":"publisher","first-page":"4749","DOI":"10.1109\/TIT.2009.2027487","volume":"55","author":"P Sarkar","year":"2009","unstructured":"Sarkar, P.: Efficient tweakable enciphering schemes from (block-wise) universal hash functions. IEEE Trans. Inf. Theory 55(10), 4749\u20134760 (2009). https:\/\/doi.org\/10.1109\/TIT.2009.2027487","journal-title":"IEEE Trans. Inf. Theory"},{"key":"528_CR9","unstructured":"Bellare, M., Rogaway, P.: Introduction to Modern Cryptography. https:\/\/cseweb.ucsd.edu\/~mihir\/papers\/br-book.pdf (2005)"},{"key":"528_CR10","unstructured":"Firsov, G., Koreneva, A.: Characteristics of one block cipher mode of operation proposed to protect block-oriented system storage devices. In: RusCrypto 2023. https:\/\/www.ruscrypto.ru\/resource\/archive\/rc2023\/files\/02_koreneva_firsov.zip (2023)"},{"key":"528_CR11","doi-asserted-by":"crossref","unstructured":"Halevi, S., Rogaway, P.: A tweakable enciphering mode. In: Boneh, D. (ed.) Advances in Cryptology\u2014CRYPTO 2003, pp. 482\u2013499. Springer, Berlin, Heidelberg (2003)","DOI":"10.1007\/978-3-540-45146-4_28"}],"updated-by":[{"DOI":"10.1007\/s11416-025-00562-4","type":"correction","label":"Correction","source":"publisher","updated":{"date-parts":[[2025,7,8]],"date-time":"2025-07-08T00:00:00Z","timestamp":1751932800000}}],"container-title":["Journal of Computer Virology and Hacking Techniques"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11416-024-00528-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11416-024-00528-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11416-024-00528-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,10]],"date-time":"2025-07-10T08:45:36Z","timestamp":1752137136000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11416-024-00528-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,6,3]]},"references-count":11,"journal-issue":{"issue":"3","published-online":{"date-parts":[[2024,9]]}},"alternative-id":["528"],"URL":"https:\/\/doi.org\/10.1007\/s11416-024-00528-y","relation":{"correction":[{"id-type":"doi","id":"10.1007\/s11416-025-00562-4","asserted-by":"object"}]},"ISSN":["2263-8733"],"issn-type":[{"value":"2263-8733","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,6,3]]},"assertion":[{"value":"24 September 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"10 May 2024","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"3 June 2024","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"8 July 2025","order":4,"name":"change_date","label":"Change Date","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"Correction","order":5,"name":"change_type","label":"Change Type","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"A Correction to this paper has been published:","order":6,"name":"change_details","label":"Change Details","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"https:\/\/doi.org\/10.1007\/s11416-025-00562-4","URL":"https:\/\/doi.org\/10.1007\/s11416-025-00562-4","order":7,"name":"change_details","label":"Change Details","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors have no relevant financial or non-financial interests to disclose.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}