{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,15]],"date-time":"2025-04-15T22:21:43Z","timestamp":1744755703974},"reference-count":19,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2015,4,10]],"date-time":"2015-04-10T00:00:00Z","timestamp":1428624000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cryptogr. Commun."],"published-print":{"date-parts":[[2015,12]]},"DOI":"10.1007\/s12095-015-0128-7","type":"journal-article","created":{"date-parts":[[2015,4,9]],"date-time":"2015-04-09T05:29:18Z","timestamp":1428557358000},"page":"509-533","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["Improved domain extender for the ideal cipher"],"prefix":"10.1007","volume":"7","author":[{"given":"Chun","family":"Guo","sequence":"first","affiliation":[]},{"given":"Dongdai","family":"Lin","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,4,10]]},"reference":[{"key":"128_CR1","volume-title":"Advances in Cryptology \u2013 CRYPTO 2013, Lecture Notes in Computer Science, vol. 8042, pp. 531\u2013550","author":"E Andreeva","year":"2013","unstructured":"Andreeva, E., Bogdanov, A., Dodis, Y., Mennink, B., Steinberger, J.: On the indifferentiability of key-alternating ciphers. In: Canetti, R., Garay, J. (eds.) Advances in Cryptology \u2013 CRYPTO 2013, Lecture Notes in Computer Science, vol. 8042, pp. 531\u2013550. Springer, Berlin Heidelberg (2013)"},{"key":"128_CR2","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2003, Lecture Notes in Computer Science, vol. 2656, pp. 491\u2013506","author":"M Bellare","year":"2003","unstructured":"Bellare, M., Kohno, T.: A theoretical treatment of related-key attacks: Rka-prps, rka-prfs, and applications. In: Biham, E. (ed.) Advances in Cryptology \u2013 EUROCRYPT 2003, Lecture Notes in Computer Science, vol. 2656, pp. 491\u2013506. Springer, Berlin Heidelberg (2003)"},{"key":"128_CR3","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2008, Lecture Notes in Computer Science, vol. 4965, pp. 181\u2013197","author":"G Bertoni","year":"2008","unstructured":"Bertoni, G., Daemen, J., Peeters, M., Van Assche, G.: On the indifferentiability of the sponge construction. In: Smart, N. (ed.) Advances in Cryptology \u2013 EUROCRYPT 2008, Lecture Notes in Computer Science, vol. 4965, pp. 181\u2013197. Springer, Berlin Heidelberg (2008)"},{"key":"128_CR4","volume-title":"Fast Software Encryption, Lecture Notes in Computer Science, vol. 4047, pp. 328\u2013340","author":"J Black","year":"2006","unstructured":"Black, J.: The ideal-cipher model, revisited: An uninstantiable blockcipher-based hash function. In: Robshaw, M. (ed.) Fast Software Encryption, Lecture Notes in Computer Science, vol. 4047, pp. 328\u2013340. Springer, Berlin Heidelberg (2006)"},{"key":"128_CR5","volume-title":"Advances in Cryptology \u2013 CRYPTO 2002, Lecture Notes in Computer Science, vol. 2442, pp. 320\u2013335","author":"J Black","year":"2002","unstructured":"Black, J., Rogaway, P., Shrimpton, T.: Black-box analysis of the block-cipher-based hash-function constructions from pgv. In: Yung, M. (ed.) Advances in Cryptology \u2013 CRYPTO 2002, Lecture Notes in Computer Science, vol. 2442, pp. 320\u2013335. Springer, Berlin Heidelberg (2002)"},{"key":"128_CR6","doi-asserted-by":"crossref","unstructured":"Cogliati, B., Seurin, Y.: On the provable security of the iterated even-mansour cipher against related-key and chosen-key attacks. In: EUROCRYPT 2015. Lecture Notes in Computer Science. (2015, to appear), full version: http:\/\/eprint.iacr.org\/2015\/069.pdf . Springer, Berlin Heidelberg","DOI":"10.1007\/978-3-662-46800-5_23"},{"key":"128_CR7","volume-title":"Theory of Cryptography, Lecture Notes in Computer Science, vol. 5978, pp. 273\u2013289","author":"JS Coron","year":"2010","unstructured":"Coron, J.S., Dodis, Y., Mandal, A., Seurin, Y.: A domain extender for the ideal cipher. In: Micciancio, D. (ed.) Theory of Cryptography, Lecture Notes in Computer Science, vol. 5978, pp. 273\u2013289. Springer, Berlin Heidelberg (2010)"},{"key":"128_CR8","volume-title":"Advances in Cryptology \u2013 CRYPTO 2005, Lecture Notes in Computer Science, vol. 3621, pp. 430\u2013448","author":"JS Coron","year":"2005","unstructured":"Coron, J.S., Dodis, Y., Malinaud, C., Puniya, P.: Merkle-damg\u00e5rd revisited: How to construct a hash function. In: Shoup, V. (ed.) Advances in Cryptology \u2013 CRYPTO 2005, Lecture Notes in Computer Science, vol. 3621, pp. 430\u2013448. Springer, Berlin Heidelberg (2005)"},{"key":"128_CR9","doi-asserted-by":"crossref","unstructured":"Coron, J.S., Dodis, Y., Mandal, A., Seurin, Y.: A domain extender for the ideal cipher. Cryptology ePrint Archive, Report 2009\/356. http:\/\/eprint.iacr.org\/ (2009)","DOI":"10.1007\/978-3-642-11799-2_17"},{"key":"128_CR10","volume-title":"Advances in Cryptology \u2013 CRYPTO 2008, Lecture Notes in Computer Science, vol. 5157, pp. 1\u201320","author":"JS Coron","year":"2008","unstructured":"Coron, J.S., Patarin, J., Seurin, Y.: The random oracle model and the ideal cipher model are equivalent. In: Wagner, D. (ed.) Advances in Cryptology \u2013 CRYPTO 2008, Lecture Notes in Computer Science, vol. 5157, pp. 1\u201320. Springer, Berlin Heidelberg (2008)"},{"key":"128_CR11","volume-title":"Advances in Cryptology \u2013 CRYPTO 2014, Lecture Notes in Computer Science, vol. 8616, pp. 20\u201338","author":"Y Dai","year":"2014","unstructured":"Dai, Y., Lee, J., Mennink, B., Steinberger, J.: The security of multiple encryption in the ideal cipher model. In: Garay, J., Gennaro, R. (eds.) Advances in Cryptology \u2013 CRYPTO 2014, Lecture Notes in Computer Science, vol. 8616, pp. 20\u201338. Springer, Berlin Heidelberg (2014)"},{"key":"128_CR12","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2013, Lecture Notes in Computer Science, vol. 7881, pp. 664\u2013683","author":"G Demay","year":"2013","unstructured":"Demay, G., Ga\u017ei, P., Hirt, M., Maurer, U.: Resource-restricted indifferentiability. In: Johansson, T., Nguyen, P. (eds.) Advances in Cryptology \u2013 EUROCRYPT 2013, Lecture Notes in Computer Science, vol. 7881, pp. 664\u2013683. Springer, Berlin Heidelberg (2013)"},{"key":"128_CR13","doi-asserted-by":"crossref","unstructured":"Guo, C., Lin, D.: On the indifferentiability of key-alternating feistel ciphers with no key derivation. In: TCC 2015. Lecture Notes in Computer Science. (2015, to appear), full version: http:\/\/eprint.iacr.org\/ . Springer, Berlin Heidelberg","DOI":"10.1007\/978-3-662-46494-6_6"},{"key":"128_CR14","volume-title":"Proceedings of the Forty-third Annual ACM Symposium on Theory of Computing. pp. 89\u201398. STOC \u201911","author":"T Holenstein","year":"2011","unstructured":"Holenstein, T., K\u00fcnzler, R., Tessaro, S.: The equivalence of the random oracle model and the ideal cipher model, revisited. In: Proceedings of the Forty-third Annual ACM Symposium on Theory of Computing. pp. 89\u201398. STOC \u201911. ACM, New York (2011)"},{"key":"128_CR15","volume-title":"Advances in Cryptology \u2013 ASIACRYPT 2013, Lecture Notes in Computer Science, vol. 8269, pp. 444\u2013463","author":"R Lampe","year":"2013","unstructured":"Lampe, R., Seurin, Y.: How to construct an ideal cipher from a small set of public permutations. In: Sako, K., Sarkar, P. (eds.) Advances in Cryptology \u2013 ASIACRYPT 2013, Lecture Notes in Computer Science, vol. 8269, pp. 444\u2013463. Springer, Berlin Heidelberg (2013)"},{"key":"128_CR16","volume-title":"Theory of Cryptography, Lecture Notes in Computer Science, vol. 2951, pp. 21\u201339","author":"U Maurer","year":"2004","unstructured":"Maurer, U., Renner, R., Holenstein, C.: Indifferentiability, impossibility results on reductions, and applications to the random oracle methodology. In: Naor, M. (ed.) Theory of Cryptography, Lecture Notes in Computer Science, vol. 2951, pp. 21\u201339. Springer, Berlin Heidelberg (2004)"},{"key":"128_CR17","volume-title":"Fast Software Encryption, Lecture Notes in Computer Science, vol. 5665, pp. 308\u2013326","author":"K Minematsu","year":"2009","unstructured":"Minematsu, K.: Beyond-birthday-bound security based on tweakable block cipher. In: Dunkelman, O. (ed.) Fast Software Encryption, Lecture Notes in Computer Science, vol. 5665, pp. 308\u2013326. Springer, Berlin Heidelberg (2009)"},{"key":"128_CR18","doi-asserted-by":"crossref","unstructured":"Minematsu, K.: Building blockcipher from small-block tweakable blockcipher. Des. Codes Crypt., 1\u201319 (2013)","DOI":"10.1007\/s10623-013-9882-8"},{"key":"128_CR19","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2011, Lecture Notes in Computer Science, vol. 6632, pp. 487\u2013506","author":"T Ristenpart","year":"2011","unstructured":"Ristenpart, T., Shacham, H., Shrimpton, T.: Careful with composition: Limitations of the indifferentiability framework. In: Paterson, K. (ed.) Advances in Cryptology \u2013 EUROCRYPT 2011, Lecture Notes in Computer Science, vol. 6632, pp. 487\u2013506. Springer, Berlin Heidelberg (2011)"}],"container-title":["Cryptography and Communications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12095-015-0128-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s12095-015-0128-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12095-015-0128-7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,4]],"date-time":"2022-05-04T18:29:41Z","timestamp":1651688981000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s12095-015-0128-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,4,10]]},"references-count":19,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2015,12]]}},"alternative-id":["128"],"URL":"https:\/\/doi.org\/10.1007\/s12095-015-0128-7","relation":{},"ISSN":["1936-2447","1936-2455"],"issn-type":[{"value":"1936-2447","type":"print"},{"value":"1936-2455","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015,4,10]]}}}