{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,4]],"date-time":"2022-04-04T17:07:35Z","timestamp":1649092055319},"reference-count":22,"publisher":"Springer Science and Business Media LLC","issue":"7","license":[{"start":{"date-parts":[[2014,7,1]],"date-time":"2014-07-01T00:00:00Z","timestamp":1404172800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Datenschutz Datensich"],"published-print":{"date-parts":[[2014,7]]},"DOI":"10.1007\/s11623-014-0204-8","type":"journal-article","created":{"date-parts":[[2014,7,31]],"date-time":"2014-07-31T05:36:05Z","timestamp":1406784965000},"page":"445-451","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Die Zukunft der Kryptographie"],"prefix":"10.1007","volume":"38","author":[{"given":"Tibor","family":"Jager","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,8,1]]},"reference":[{"key":"204_CR1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-88702-7","volume-title":"Post-Quantum Cryptography","author":"D J Bernstein","year":"2009","unstructured":"Bernstein, D. J., Buchmann, J., Dahmen, E. Post-Quantum Cryptography. Springer-Verlag, 2009."},{"key":"204_CR2","volume-title":"Chosen Ciphertext Attacks Against Protocols Based on the RSA Encryption Standard PKCS #1. Advances in Cryptology \u2014 CRYPTO\u2019 98. Springer-Verlag","author":"D Bleichenbacher","year":"1998","unstructured":"Bleichenbacher, D. Chosen Ciphertext Attacks Against Protocols Based on the RSA Encryption Standard PKCS #1. Advances in Cryptology \u2014 CRYPTO\u2019 98. Springer-Verlag, 1998."},{"key":"204_CR3","volume-title":"The Heartbleed Bug","author":"Codenomicon Ltd.","year":"2014","unstructured":"Codenomicon Ltd. The Heartbleed Bug. 15. April 2014. \n                    http:\/\/heartbleed.com\/"},{"key":"204_CR4","volume-title":"XML Encryption Syntax and Processing. W3C Recommendation","author":"D Eastlake","year":"2002","unstructured":"Eastlake, D., Reagle, J. XML Encryption Syntax and Processing. W3C Recommendation, 10 December 2002. \n                    http:\/\/www.w3.org\/TR\/xmlenc-core\/"},{"key":"204_CR5","volume-title":"XML Encryption Syntax and Processing Version 1.1. W3C Recommendation","author":"D Eastlake","year":"2013","unstructured":"Eastlake, D., Reagle, J., Hirsch, F., Roessler, T. XML Encryption Syntax and Processing Version 1.1. W3C Recommendation, 11 April 2013. \n                    http:\/\/www.w3.org\/TR\/xmlenc-core1\/"},{"key":"204_CR6","volume-title":"ACM Conference on Computer and Communications Security, CCS\u201912. ACM","author":"M Georgiev","year":"2012","unstructured":"Georgiev M., Iyengar, S., Jana, S., Anubhai, R., Boneh, D., Shmatikov, V. The most dangerous code in the world: validating SSL certificates in non-browser software. ACM Conference on Computer and Communications Security, CCS\u201912. ACM 2012."},{"key":"204_CR7","volume-title":"Critical crypto bug leaves Linux, hundreds of apps open to eavesdropping. arstechnica","author":"D Goodin","year":"2014","unstructured":"Goodin, D. Critical crypto bug leaves Linux, hundreds of apps open to eavesdropping. arstechnica, 4. M\u00e4rz 2014. \n                    http:\/\/arstechnica.com\/security\/2014\/03\/critical-crypto-bug-leaves-linux-hundreds-of-apps-opentoeavesdropping\/"},{"key":"204_CR8","volume-title":"Hackers break SSL encryption used by millions of sites. The Register","author":"D Goodin","year":"2011","unstructured":"Goodin, D. Hackers break SSL encryption used by millions of sites. The Register, 19. September 2011. \n                    http:\/\/www.theregister.co.uk\/2011\/09\/19\/beast_exploits_paypal_ssl\/"},{"key":"204_CR9","volume-title":"A fast quantum mechanical algorithm for database search. 28th Annual ACM Symposium on the Theory of Computing \u2014 STOC 1996. ACM","author":"L K Grover","year":"1996","unstructured":"Grover, L. K. A fast quantum mechanical algorithm for database search. 28th Annual ACM Symposium on the Theory of Computing \u2014 STOC 1996. ACM 1996."},{"key":"204_CR10","volume-title":"20th Annual Network and Distributed System Security Symposium, NDSS 2013. The Internet Society","author":"T Jager","year":"2013","unstructured":"Jager, T., Paterson, K. G., Somorovsky, J. One Bad Apple: Backwards Compatibility Attacks on State-of-the-Art Cryptography. 20th Annual Network and Distributed System Security Symposium, NDSS 2013. The Internet Society, 2013."},{"key":"204_CR11","volume-title":"Computer Security \u2014 ESORICS 2012. Springer-Verlag","author":"T Jager","year":"2012","unstructured":"Jager, T., Schinzel, S., Somorovsky, J. Bleichenbacher\u2019s Attack Strikes again: Breaking PKCS#1 v1.5 in XML Encryption. Computer Security \u2014 ESORICS 2012. Springer-Verlag, 2012."},{"key":"204_CR12","volume-title":"How to Break XML Encryption. ACM Conference on Computer and Communications Security","author":"T Jager","year":"2011","unstructured":"Jager, T., Somorovsky, J. How to Break XML Encryption. ACM Conference on Computer and Communications Security, CCS 2011. ACM, 2011."},{"key":"204_CR13","unstructured":"Jones, M., Hildebrand, J., JSON Web Encryption (JWE) \n                    http:\/\/tools.ietf.org\/html\/draft-ietf-jose-json-web-encryption-25"},{"key":"204_CR14","volume-title":"Apple\u2019s SSL\/TLS Bug","author":"Adam Langley","year":"2014","unstructured":"Langley, Adam. Apple\u2019s SSL\/TLS Bug. 22. Februar 2014. \n                    https:\/\/www.imperial violet.org\/2014\/02\/22\/applebug.html"},{"key":"204_CR15","volume-title":"Nasa buys into\u2019 quantum\u2019 computer. BBC News website","author":"A Mansfield","year":"2013","unstructured":"Mansfield, A. Nasa buys into\u2019 quantum\u2019 computer. BBC News website, 16. Mai 2013. \n                    http:\/\/www.bbc.com\/news\/science-environment-22554494"},{"key":"204_CR16","unstructured":"Meyer, C., Somorovsky, J., Weiss, E., Schwenk, J., Schinzel, S., Tews, E. Revisiting SSL\/TLS Implementations: New Bleichenbacher Side Channels and Attacks. Wird noch ver\u00f6ffentlicht."},{"key":"204_CR17","volume-title":"Padding Oracle Attacks on the ISO CBC Mode Encryption Standard. Topics in Cryptology \u2014 CT-RSA 2004","author":"K G Paterson","year":"2004","unstructured":"Paterson, K. G., Yau, A. K. L. Padding Oracle Attacks on the ISO CBC Mode Encryption Standard. Topics in Cryptology \u2014 CT-RSA 2004. Springer-Verlag, 2004."},{"key":"204_CR18","volume-title":"NSA seeks to build quantum computer that could crack most types of encryption","author":"S Rich","year":"2014","unstructured":"Rich, S., Gellman, B. NSA seeks to build quantum computer that could crack most types of encryption. The Washington Post news website, 2. Januar 2014."},{"key":"204_CR19","unstructured":"Rincon, P. Study doubts quantum computer speed. BBC News website, 17. Januar 2014. \n                    http:\/\/www.bbc.com\/news\/science-environment-25787226"},{"key":"204_CR20","volume-title":"SIAM Journal on Computing","author":"P W Shor","year":"1997","unstructured":"Shor, P. W. Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer. SIAM Journal on Computing, 1997."},{"key":"204_CR21","volume-title":"Advances in Cryptology \u2014 EUROCRYPT 2002","author":"S Vaudenay","year":"2002","unstructured":"Vaudenay, S. Security Flaws Induced by CBC Padding \u2014 Applications to SSL, IPSEC, WTLS \u2026. Advances in Cryptology \u2014 EUROCRYPT 2002. Springer-Verlag, 2002."},{"key":"204_CR22","volume-title":"Ruhr-Universit\u00e4t Bochum, Pressemeldung Nr 56","author":"J Weiler","year":"2014","unstructured":"Weiler, J. Kritische Sicherheitsl\u00fccken entdeckt: TLS-Verschl\u00fcsselung f\u00fcr Java liereren Wegen knacken. Ruhr-Universit\u00e4t Bochum, Pressemeldung Nr 56, 23. April 2014. \n                    http:\/\/aktuell.ruhr-uni-bochum.de\/pm2014\/pm00056.html.de"}],"container-title":["Datenschutz und Datensicherheit - DuD"],"original-title":[],"language":"de","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-014-0204-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11623-014-0204-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-014-0204-8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-014-0204-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T14:22:43Z","timestamp":1559398963000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11623-014-0204-8"}},"subtitle":["\u00dcber Quantencomputer und den Einsatz von Kryptographie in der Praxis"],"short-title":[],"issued":{"date-parts":[[2014,7]]},"references-count":22,"journal-issue":{"issue":"7","published-print":{"date-parts":[[2014,7]]}},"alternative-id":["204"],"URL":"https:\/\/doi.org\/10.1007\/s11623-014-0204-8","relation":{},"ISSN":["1614-0702","1862-2607"],"issn-type":[{"value":"1614-0702","type":"print"},{"value":"1862-2607","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014,7]]}}}