{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,28]],"date-time":"2026-02-28T13:01:10Z","timestamp":1772283670730,"version":"3.50.1"},"reference-count":17,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2015,2,26]],"date-time":"2015-02-26T00:00:00Z","timestamp":1424908800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cryptogr. Commun."],"published-print":{"date-parts":[[2015,12]]},"DOI":"10.1007\/s12095-015-0127-8","type":"journal-article","created":{"date-parts":[[2015,2,25]],"date-time":"2015-02-25T07:22:52Z","timestamp":1424848972000},"page":"439-468","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["Another look at XCB"],"prefix":"10.1007","volume":"7","author":[{"given":"Debrup","family":"Chakraborty","sequence":"first","affiliation":[]},{"given":"Vicente","family":"Hernandez-Jimenez","sequence":"additional","affiliation":[]},{"given":"Palash","family":"Sarkar","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,2,26]]},"reference":[{"key":"127_CR1","unstructured":"IEEE Std, 1619. 2-2010: IEEE standard for wide-block encryption for shared storage media. IEEE Computer Society, March 2011 http:\/\/standards.ieee.org\/findstds\/standard\/1619.2-2010.html"},{"key":"127_CR2","doi-asserted-by":"crossref","unstructured":"Chakraborty, D., Nandi, M.: An improved security bound for HCTR. In: Fast Software Encryption - FSE 2008, volume 5086 of Lecture Notes in Computer Science, pp 441\u2013455. Springer (2008)","DOI":"10.1007\/978-3-540-71039-4_18"},{"key":"127_CR3","doi-asserted-by":"crossref","unstructured":"Chakraborty, D., Sarkar, P.: A new mode of encryption providing a tweakable strong pseudo-random permutation. In: Fast Software Encryption - FSE 2008, volume 4047 of Lecture Notes in Computer Science, pp 293\u2013309. Springer (2006)","DOI":"10.1007\/11799313_19"},{"issue":"4","key":"127_CR4","doi-asserted-by":"crossref","first-page":"1683","DOI":"10.1109\/TIT.2008.917623","volume":"54","author":"D Chakraborty","year":"2008","unstructured":"Chakraborty, D., Sarkar, P.: HCH: A new tweakable enciphering scheme using the hash-counter-hash approach. IEEE Trans. Inf. Theory 54(4), 1683\u20131699 (2008)","journal-title":"IEEE Trans. Inf. Theory"},{"key":"127_CR5","doi-asserted-by":"crossref","unstructured":"Halevi, S.: EME \u2217: Extending EME to handle arbitrary-length messages with associated data. In: INDOCRYPT, volume 3348 of Lecture Notes in Computer Science, pp 315\u2013327. Springer (2004)","DOI":"10.1007\/978-3-540-30556-9_25"},{"key":"127_CR6","doi-asserted-by":"crossref","unstructured":"Halevi, S.: Invertible universal hashing and the TET encryption mode. In: CRYPTO, volume 4622 of Lecture Notes in Computer Science, pp 412\u2013429. Springer (2007)","DOI":"10.1007\/978-3-540-74143-5_23"},{"key":"127_CR7","doi-asserted-by":"crossref","unstructured":"Halevi, S., Rogaway, P.: A tweakable enciphering mode. In: CRYPTO, volume 2729 of Lecture Notes in Computer Science, pp 482\u2013499. Springer (2003)","DOI":"10.1007\/978-3-540-45146-4_28"},{"key":"127_CR8","doi-asserted-by":"crossref","unstructured":"Halevi, S., Rogaway, P.: A parallelizable enciphering mode. In: CT-RSA, volume 2964 of Lecture Notes in Computer Science, pp 292\u2013304. Springer (2004)","DOI":"10.1007\/978-3-540-24660-2_23"},{"key":"127_CR9","doi-asserted-by":"crossref","unstructured":"Iwata, T., Ohashi, K., Minematsu, K.: Breaking and repairing GCM security proofs. In: Advances in Cryptology - Crypto 2012, volume 7417 of Lecture Notes in Computer Science, pp 31\u201349. Springer (2012)","DOI":"10.1007\/978-3-642-32009-5_3"},{"issue":"11","key":"127_CR10","doi-asserted-by":"crossref","first-page":"1547","DOI":"10.1109\/TC.2010.64","volume":"59","author":"C Mancillas-L\u00f3pez","year":"2010","unstructured":"Mancillas-L\u00f3pez, C., Chakraborty, D., Rodr\u00edguez-Henr\u00edquez, F.: Reconfigurable hardware implementations of tweakable enciphering schemes. IEEE Trans. Comput. 59(11), 1547\u20131561 (2010)","journal-title":"IEEE Trans. Comput."},{"key":"127_CR11","unstructured":"McGrew, D. A., Fluhrer, S. R.: The extended codebook (XCB) mode of operation. Cryptology ePrint Archive, Report 2004\/278 (2004)"},{"key":"127_CR12","doi-asserted-by":"crossref","unstructured":"McGrew, D.A., Fluhrer, S.R.: The security of the extended codebook (XCB) mode of operation. In: Adams, C., Miri, A., Wiener, M. (eds.) Selected Areas in Cryptography, volume 4876 of Lecture Notes in Computer Science, pp 311\u2013327. Springer Berlin Heidelberg (2007)","DOI":"10.1007\/978-3-540-77360-3_20"},{"key":"127_CR13","unstructured":"McGrew, D. A., Viega, J.: Arbitrary block length mode (2004). http:\/\/grouper.ieee.org\/groups\/1619\/email\/pdf00005.pdf"},{"key":"127_CR14","unstructured":"Motwani, R., Raghavan, P. Randomized algorithms. Cambridge University Press (2007)"},{"key":"127_CR15","doi-asserted-by":"crossref","unstructured":"Sarkar, P.: Improving upon the TET mode of operation. In: ICISC, volume 4817 of Lecture Notes in Computer Science, pp 180\u2013192. Springer (2007)","DOI":"10.1007\/978-3-540-76788-6_15"},{"key":"127_CR16","doi-asserted-by":"crossref","first-page":"4749","DOI":"10.1109\/TIT.2009.2027487","volume":"55","author":"P Sarkar","year":"2009","unstructured":"Sarkar, P.: Efficient tweakable enciphering schemes from (block-wise) universal hash functions. IEEE Trans on Inf Theory. 55, 4749\u20134760 (2009)","journal-title":"IEEE Trans on Inf Theory"},{"key":"127_CR17","doi-asserted-by":"crossref","unstructured":"Wang, P., Feng, D., Wu, W.: HCTR: A variable-input-length enciphering mode. In: CISC, pp 175\u2013188 (2005)","DOI":"10.1007\/11599548_15"}],"container-title":["Cryptography and Communications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12095-015-0127-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s12095-015-0127-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12095-015-0127-8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,21]],"date-time":"2019-08-21T07:06:45Z","timestamp":1566371205000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s12095-015-0127-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,2,26]]},"references-count":17,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2015,12]]}},"alternative-id":["127"],"URL":"https:\/\/doi.org\/10.1007\/s12095-015-0127-8","relation":{},"ISSN":["1936-2447","1936-2455"],"issn-type":[{"value":"1936-2447","type":"print"},{"value":"1936-2455","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015,2,26]]}}}