{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,11]],"date-time":"2026-02-11T12:58:55Z","timestamp":1770814735476,"version":"3.50.1"},"reference-count":48,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2022,12,5]],"date-time":"2022-12-05T00:00:00Z","timestamp":1670198400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2022,12,5]],"date-time":"2022-12-05T00:00:00Z","timestamp":1670198400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Front. Comput. Sci."],"published-print":{"date-parts":[[2023,8]]},"DOI":"10.1007\/s11704-022-1466-1","type":"journal-article","created":{"date-parts":[[2022,12,5]],"date-time":"2022-12-05T12:06:07Z","timestamp":1670241967000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Universal tweakable Even-Mansour cipher and its applications"],"prefix":"10.1007","volume":"17","author":[{"given":"Ping","family":"Zhang","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,12,5]]},"reference":[{"key":"1466_CR1","doi-asserted-by":"publisher","unstructured":"Qiao C, Brown K N, Zhang F, Tian Z. Federated adaptive asynchronous clustering algorithm for wireless mesh networks. IEEE Transactions on Knowledge and Data Engineering, 2021, DOI: https:\/\/doi.org\/10.1109\/TKDE.2021.3119550","DOI":"10.1109\/TKDE.2021.3119550"},{"issue":"5","key":"1466_CR2","doi-asserted-by":"publisher","first-page":"3242","DOI":"10.1109\/JIOT.2020.3002255","volume":"8","author":"M Shafiq","year":"2021","unstructured":"Shafiq M, Tian Z, Bashir A K, Du X, Guizani M. CorrAUC: a malicious bot-IoT traffic detection method in IoT network using machine-learning techniques. IEEE Internet of Things Journal, 2021, 8(5): 3242\u20133254","journal-title":"IEEE Internet of Things Journal"},{"key":"1466_CR3","doi-asserted-by":"publisher","unstructured":"Lu H, Jin C, Helu X, Du X, Guizani M, Tian Z. DeepAutoD: research on distributed machine learning oriented scalable mobile communication security unpacking system. IEEE Transactions on Network Science and Engineering, 2021, DOI: https:\/\/doi.org\/10.1109\/TNSE.2021.3100750","DOI":"10.1109\/TNSE.2021.3100750"},{"issue":"8","key":"1466_CR4","doi-asserted-by":"publisher","first-page":"5810","DOI":"10.1109\/TII.2020.3038761","volume":"17","author":"C Luo","year":"2021","unstructured":"Luo C, Tan Z, Min G, Gan J, Shi W, Tian Z. A novel web attack detection system for internet of things via ensemble classification. IEEE Transactions on Industrial Informatics, 2021, 17(8): 5810\u20135818","journal-title":"IEEE Transactions on Industrial Informatics"},{"issue":"1","key":"1466_CR5","doi-asserted-by":"publisher","first-page":"225","DOI":"10.1109\/TCSS.2019.2946181","volume":"7","author":"J Qiu","year":"2020","unstructured":"Qiu J, Chai Y, Tian Z, Du X, Guizani M. Automatic concept extraction based on semantic graphs from big data in smart city. IEEE Transactions on Computational Social Systems, 2020, 7(1): 225\u2013233","journal-title":"IEEE Transactions on Computational Social Systems"},{"key":"1466_CR6","doi-asserted-by":"crossref","unstructured":"Liskov M, Rivest R L, Wagner D. Tweakable block ciphers. In: Proceedings of the 22nd Annual International Cryptology Conference. 2002, 31\u201346","DOI":"10.1007\/3-540-45708-9_3"},{"key":"1466_CR7","doi-asserted-by":"crossref","unstructured":"Halevi S, Rogaway P. A tweakable enciphering mode. In: Proceedings of the 23rd Annual International Cryptology Conference. 2003, 482\u2013499","DOI":"10.1007\/978-3-540-45146-4_28"},{"key":"1466_CR8","doi-asserted-by":"crossref","unstructured":"Halevi S, Rogaway P. A parallelizable enciphering mode. In: Proceedings of Cryptographers\u2019 Track at the RSA Conference. 2004, 292\u2013304","DOI":"10.1007\/978-3-540-24660-2_23"},{"key":"1466_CR9","doi-asserted-by":"crossref","unstructured":"Rogaway P, Zhang H. Online ciphers from tweakable blockciphers. In: Proceedings of Cryptographers\u2019 Track at the RSA Conference 2011. 2011, 237\u2013249","DOI":"10.1007\/978-3-642-19074-2_16"},{"issue":"2","key":"1466_CR10","doi-asserted-by":"publisher","first-page":"1","DOI":"10.46586\/tosc.v2020.i2.1-39","volume":"2020","author":"A Chakraborti","year":"2020","unstructured":"Chakraborti A, Nandi M, Talnikar S, Yasuda K. On the composition of single-keyed tweakable even-mansour for achieving BBB security. IACR Transactions on Symmetric Cryptology, 2020, 2020(2): 1\u201339","journal-title":"IACR Transactions on Symmetric Cryptology"},{"key":"1466_CR11","doi-asserted-by":"crossref","unstructured":"Rogaway P. Efficient instantiations of tweakable blockciphers and refinements to modes OCB and PMAC. In: Proceedings of the 10th International Conference on the Theory and Application of Cryptology and Information Security. 2004, 16\u201331","DOI":"10.1007\/978-3-540-30539-2_2"},{"issue":"5","key":"1466_CR12","doi-asserted-by":"publisher","first-page":"1991","DOI":"10.1109\/TIT.2008.920247","volume":"54","author":"D Chakraborty","year":"2008","unstructured":"Chakraborty D, Sarkar P. A general construction of tweakable block ciphers and different modes of operations. IEEE Transactions on Information Theory, 2008, 54(5): 1991\u20132006","journal-title":"IEEE Transactions on Information Theory"},{"key":"1466_CR13","doi-asserted-by":"crossref","unstructured":"Landecker W, Shrimpton T, Terashima R S. Tweakable blockciphers with beyond birthday-bound security. In: Proceedings of the 32nd Annual Cryptology Conference. 2012, 14\u201330","DOI":"10.1007\/978-3-642-32009-5_2"},{"key":"1466_CR14","doi-asserted-by":"crossref","unstructured":"Krovetz T, Rogaway P. The software performance of authenticated-encryption modes. In: Proceedings of the 18th International Workshop on Fast Software Encryption. 2011, 306\u2013327","DOI":"10.1007\/978-3-642-21702-9_18"},{"key":"1466_CR15","doi-asserted-by":"crossref","unstructured":"Andreeva E, Bogdanov A, Luykx A, Mennink B, Tischhauser E, Yasuda K. Parallelizable and authenticated online ciphers. In: Proceedings of the 19th International Conference on the Theory and Application of Cryptology and Information Security. 2013, 424\u2013443","DOI":"10.1007\/978-3-642-42033-7_22"},{"key":"1466_CR16","doi-asserted-by":"crossref","unstructured":"Granger R, Jovanovic P, Mennink B, Neves S. Improved masking for tweakable blockciphers with applications to authenticated encryption. In: Proceedings of the 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques. 2016, 263\u2013293","DOI":"10.1007\/978-3-662-49890-3_11"},{"issue":"11","key":"1466_CR17","doi-asserted-by":"publisher","first-page":"3318","DOI":"10.1109\/TC.2016.2529618","volume":"65","author":"L Bossuet","year":"2016","unstructured":"Bossuet L, Datta N, Mancillas-L\u00f3pez C, Nandi M. ELmD: a pipelineable authenticated encryption and its hardware implementation. IEEE Transactions on Computers, 2016, 65(11): 3318\u20133331","journal-title":"IEEE Transactions on Computers"},{"key":"1466_CR18","doi-asserted-by":"crossref","unstructured":"Peyrin T, Seurin Y. Counter-in-tweak: authenticated encryption modes for tweakable block ciphers. In: Proceedings of the 36th Annual International Cryptology Conference. 2016, 33\u201363","DOI":"10.1007\/978-3-662-53018-4_2"},{"issue":"2","key":"1466_CR19","doi-asserted-by":"publisher","first-page":"1","DOI":"10.46586\/tosc.v2017.i2.1-26","volume":"2017","author":"Y Naito","year":"2017","unstructured":"Naito Y. Tweakable blockciphers for efficient authenticated encryptions with beyond the birthday-bound security. IACR Transactions on Symmetric Cryptology, 2017, 2017(2): 1\u201326","journal-title":"IACR Transactions on Symmetric Cryptology"},{"issue":"2","key":"1466_CR20","doi-asserted-by":"publisher","first-page":"1","DOI":"10.46586\/tosc.v2019.i2.1-54","volume":"2019","author":"Z Bao","year":"2019","unstructured":"Bao Z, Guo J, Iwata T, Minematsu K. ZOCB and ZOTR: tweakable blockcipher modes for authenticated encryption with full absorption. IACR Transactions on Symmetric Cryptology, 2019, 2019(2): 1\u201354","journal-title":"IACR Transactions on Symmetric Cryptology"},{"issue":"1","key":"1466_CR21","first-page":"66","volume":"2020","author":"Y Naito","year":"2020","unstructured":"Naito Y, Sugawara T. Lightweight authenticated encryption mode of operation for tweakable block ciphers. IACR Transactions on Cryptographic Hardware and Embedded Systems, 2020, 2020(1): 66\u201394","journal-title":"IACR Transactions on Cryptographic Hardware and Embedded Systems"},{"key":"1466_CR22","doi-asserted-by":"crossref","unstructured":"Naito Y, Sasaki Y, Sugawara T. Lightweight authenticated encryption mode suitable for threshold implementation. In: Proceedings of the 39th Annual International Conference on the Theory and Applications of Cryptographic Techniques. 2020, 705\u2013735","DOI":"10.1007\/978-3-030-45724-2_24"},{"key":"1466_CR23","doi-asserted-by":"crossref","unstructured":"Cogliati B, Lampe R, Seurin Y. Tweaking even-mansour ciphers. In: Proceedings of the 35th Annual Cryptology Conference. 2015, 189\u2013208","DOI":"10.1007\/978-3-662-47989-6_9"},{"key":"1466_CR24","doi-asserted-by":"crossref","unstructured":"Cogliati B, Seurin Y. Beyond-birthday-bound security for tweakable even-mansour ciphers with linear tweak and key mixing. In: Proceedings of the 21st International Conference on the Theory and Application of Cryptology and Information Security. 2015, 134\u2013158","DOI":"10.1007\/978-3-662-48800-3_6"},{"key":"1466_CR25","doi-asserted-by":"crossref","unstructured":"Mennink B. XPX: generalized tweakable even-mansour with improved security guarantees. In: Proceedings of the 36th Annual International Cryptology Conference. 2016, 64\u201394","DOI":"10.1007\/978-3-662-53018-4_3"},{"key":"1466_CR26","doi-asserted-by":"crossref","unstructured":"Reyhanitabar R, Vaudenay S, Viz\u00e1r D. Misuse-resistant variants of the OMD authenticated encryption mode. In: Proceedings of the 8th International Conference on Provable Security. 2014, 55\u201370","DOI":"10.1007\/978-3-319-12475-9_5"},{"key":"1466_CR27","doi-asserted-by":"crossref","unstructured":"Reyhanitabar R, Vaudenay S, Viz\u00e1r D. Boosting OMD for almost free authentication of associated data. In: Proceedings of the 22nd International Workshop on Fast Software Encryption. 2015, 411\u2013427","DOI":"10.1007\/978-3-662-48116-5_20"},{"key":"1466_CR28","doi-asserted-by":"crossref","unstructured":"Jean J, Nikoli\u0107 I, Peyrin T. Tweaks and keys for block ciphers: the TWEAKEY framework. In: Proceedings of the 20th International Conference on the Theory and Application of Cryptology and Information Security. 2014, 274\u2013288","DOI":"10.1007\/978-3-662-45608-8_15"},{"key":"1466_CR29","doi-asserted-by":"crossref","unstructured":"Biham E. New types of cryptanalytic attacks using related keys. In: Proceedings of Workshop on the Theory and Application of Cryptographic Techniques Lofthus. 1993, 398\u2013409","DOI":"10.1007\/3-540-48285-7_34"},{"issue":"4","key":"1466_CR30","doi-asserted-by":"publisher","first-page":"229","DOI":"10.1007\/BF00203965","volume":"7","author":"E Biham","year":"1994","unstructured":"Biham E. New types of cryptanalytic attacks using related keys. Journal of Cryptology, 1994, 7(4): 229\u2013246","journal-title":"Journal of Cryptology"},{"key":"1466_CR31","doi-asserted-by":"crossref","unstructured":"Bellare M, Kohno T. A theoretical treatment of related-key attacks: rkaprps, rka-prfs, and applications. In: Proceedings of International Conference on the Theory and Applications of Cryptographic Techniques. 2003, 491\u2013506","DOI":"10.1007\/3-540-39200-9_31"},{"issue":"6","key":"1466_CR32","doi-asserted-by":"publisher","first-page":"1261","DOI":"10.1007\/s11390-018-1886-4","volume":"33","author":"P Zhang","year":"2018","unstructured":"Zhang P, Hu H-G. Generalized tweakable even-mansour cipher and its applications. Journal of Computer Science and Technology, 2018, 33(6): 1261\u20131277","journal-title":"Journal of Computer Science and Technology"},{"key":"1466_CR33","doi-asserted-by":"crossref","unstructured":"Fouque P A, Joux A, Mavromati C. Multi-user collisions: applications to discrete logarithm, even-mansour and PRINCE. In: Proceedings of the 20th International Conference on the Theory and Application of Cryptology and Information Security. 2014, 420\u2013438","DOI":"10.1007\/978-3-662-45611-8_22"},{"key":"1466_CR34","doi-asserted-by":"crossref","unstructured":"Mouha N, Luykx A. Multi-key security: the even-mansour construction revisited. In: Proceedings of the 35th Annual Cryptology Conference. 2015, 209\u2013223","DOI":"10.1007\/978-3-662-47989-6_10"},{"key":"1466_CR35","doi-asserted-by":"crossref","unstructured":"Bellare M, Tackmann B. The multi-user security of authenticated encryption: AES-GCM in TLS 1.3. In: Proceedings of the 36th Annual International Cryptology Conference. 2016, 247\u2013276","DOI":"10.1007\/978-3-662-53018-4_10"},{"key":"1466_CR36","doi-asserted-by":"crossref","unstructured":"Hoang V T, Tessaro S. Key-alternating ciphers and key-length extension: exact bounds and multi-user security. In: Proceedings of the 36th Annual International Cryptology Conference. 2016, 3\u201332","DOI":"10.1007\/978-3-662-53018-4_1"},{"issue":"2","key":"1466_CR37","doi-asserted-by":"publisher","first-page":"288","DOI":"10.46586\/tosc.v2016.i2.288-306","volume":"2016","author":"Z Guo","year":"2017","unstructured":"Guo Z, Wu W, Liu R, Zhang L. Multi-key analysis of tweakable even-mansour with applications to minalpher and OPP. IACR Transactions on Symmetric Cryptology, 2017, 2016(2): 288\u2013306","journal-title":"IACR Transactions on Symmetric Cryptology"},{"issue":"3","key":"1466_CR38","doi-asserted-by":"publisher","first-page":"139102","DOI":"10.1007\/s11432-018-9757-4","volume":"64","author":"P Zhang","year":"2021","unstructured":"Zhang P, Yuan Q, Hu H, Wang P. Multi-user security of the tweakable Even-Mansour cipher. Science China Information Sciences, 2021, 64(3): 139102","journal-title":"Science China Information Sciences"},{"key":"1466_CR39","doi-asserted-by":"crossref","unstructured":"Dutta A. Minimizing the two-round tweakable Even-Mansour cipher. In: Proceedings of the 26th International Conference on the Theory and Application of Cryptology and Information Security. 2020, 601\u2013629","DOI":"10.1007\/978-3-030-64837-4_20"},{"issue":"4","key":"1466_CR40","doi-asserted-by":"publisher","first-page":"71","DOI":"10.46586\/tosc.v2020.i4.71-87","volume":"2020","author":"H Kim","year":"2020","unstructured":"Kim H, Lee Y, Lee J. Forking tweakable Even-Mansour ciphers. IACR Transactions on Symmetric Cryptology, 2020, 2020(4): 71\u201387","journal-title":"IACR Transactions on Symmetric Cryptology"},{"issue":"4","key":"1466_CR41","doi-asserted-by":"publisher","first-page":"547","DOI":"10.1007\/s00145-008-9024-z","volume":"21","author":"C S Jutla","year":"2008","unstructured":"Jutla C S. Encryption modes with almost free message integrity. Journal of Cryptology, 2008, 21(4): 547\u2013578","journal-title":"Journal of Cryptology"},{"key":"1466_CR42","doi-asserted-by":"crossref","unstructured":"Patarin J. The \u201ccoefficients H\u201d technique. In: Proceedings of the 15th International Conference on Selected Areas in Cryptography. 2008, 328\u2013345","DOI":"10.1007\/978-3-642-04159-4_21"},{"issue":"3","key":"1466_CR43","doi-asserted-by":"publisher","first-page":"365","DOI":"10.1145\/937527.937529","volume":"6","author":"P Rogaway","year":"2003","unstructured":"Rogaway P, Bellare M, Black J. OCB: a block-cipher mode of operation for efficient authenticated encryption. ACM Transactions on Information and System Security, 2003, 6(3): 365\u2013403","journal-title":"ACM Transactions on Information and System Security"},{"issue":"10","key":"1466_CR44","doi-asserted-by":"publisher","first-page":"5366","DOI":"10.1109\/TIT.2010.2059636","volume":"56","author":"K Kurosawa","year":"2010","unstructured":"Kurosawa K. Power of a public random permutation and its application to authenticated encryption. IEEE Transactions on Information Theory, 2010, 56(10): 5366\u20135374","journal-title":"IEEE Transactions on Information Theory"},{"key":"1466_CR45","unstructured":"Kuwakado H, Morii M. Security on the quantum-type Even-Mansour cipher. In: Proceedings of 2012 International Symposium on Information Theory and its Applications. 2012, 312\u2013316"},{"issue":"4","key":"1466_CR46","doi-asserted-by":"publisher","first-page":"39","DOI":"10.46586\/tosc.v2018.i4.39-61","volume":"2018","author":"P Crowley","year":"2018","unstructured":"Crowley P, Biggers E. Adiantum: length-preserving encryption for entry-level processors. IACR Transactions on Symmetric Cryptology, 2018, 2018(4): 39\u201361","journal-title":"IACR Transactions on Symmetric Cryptology"},{"issue":"2","key":"1466_CR47","doi-asserted-by":"publisher","first-page":"153","DOI":"10.1007\/s00145-006-0225-z","volume":"20","author":"J Hastad","year":"2007","unstructured":"Hastad J. The security of the IAPM and IACBC modes. Journal of Cryptology, 2007, 20(2): 153\u2013163","journal-title":"Journal of Cryptology"},{"issue":"1","key":"1466_CR48","doi-asserted-by":"publisher","first-page":"337","DOI":"10.46586\/tosc.v2021.i1.337-377","volume":"2021","author":"A Hosoyamada","year":"2021","unstructured":"Hosoyamada A, Iwata T. Provably quantum-secure tweakable block ciphers. IACR Transactions on Symmetric Cryptology, 2021, 2021(1): 337\u2013377","journal-title":"IACR Transactions on Symmetric Cryptology"}],"container-title":["Frontiers of Computer Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11704-022-1466-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11704-022-1466-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11704-022-1466-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,18]],"date-time":"2024-09-18T20:23:59Z","timestamp":1726691039000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11704-022-1466-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,12,5]]},"references-count":48,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2023,8]]}},"alternative-id":["1466"],"URL":"https:\/\/doi.org\/10.1007\/s11704-022-1466-1","relation":{},"ISSN":["2095-2228","2095-2236"],"issn-type":[{"value":"2095-2228","type":"print"},{"value":"2095-2236","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,12,5]]},"assertion":[{"value":"25 August 2021","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"22 June 2022","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"5 December 2022","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}],"article-number":"174807"}}