{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T23:00:32Z","timestamp":1740178832575,"version":"3.37.3"},"reference-count":10,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2017,8,1]],"date-time":"2017-08-01T00:00:00Z","timestamp":1501545600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Hardw Syst Secur"],"published-print":{"date-parts":[[2017,9]]},"DOI":"10.1007\/s41635-017-0010-5","type":"journal-article","created":{"date-parts":[[2017,8,1]],"date-time":"2017-08-01T11:22:23Z","timestamp":1501586543000},"page":"282-296","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Gain: Practical Key-Recovery Attacks on Round-Reduced PAEQ"],"prefix":"10.1007","volume":"1","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-4668-073X","authenticated-orcid":false,"given":"Dhiman","family":"Saha","sequence":"first","affiliation":[]},{"given":"Sourya","family":"Kakarla","sequence":"additional","affiliation":[]},{"given":"Srinath","family":"Mandava","sequence":"additional","affiliation":[]},{"given":"Dipanwita Roy","family":"Chowdhury","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,8,1]]},"reference":[{"key":"10_CR1","doi-asserted-by":"crossref","unstructured":"Al Fardan NJ, Paterson KG (2013) Lucky thirteen: breaking the TLS and DTLS record protocols. In: IEEE Symposium on security and privacy 2013. IEEE, pp 526\u2013540","DOI":"10.1109\/SP.2013.42"},{"key":"10_CR2","unstructured":"Biryukov A, Khovratovich D (2014) PAEQ v1. \n                        http:\/\/competitions.cr.yp.to\/round1\/paeqv1.pdf"},{"key":"10_CR3","doi-asserted-by":"crossref","unstructured":"Bagheri N, Mendel F, Sasaki Y (2016) Improved rebound attacks on AESQ: core permutation of CAESAR candidate PAEQ. In: 21st Australasian conference on information security and privacy - ACISP 2016. Springer, pp 301\u2013316","DOI":"10.1007\/978-3-319-40367-0_19"},{"key":"10_CR4","doi-asserted-by":"publisher","unstructured":"Biryukov A, Khovratovich D (2014) PAEQ: parallelizable permutation-based authenticated encryption. In: Information security - 17th international conference, ISC 2014, Hong Kong, China, October 12-14, 2014. Proceedings. Springer, pp 72\u201389. doi:\n                        10.1007\/978-3-319-13257-0_5","DOI":"10.1007\/978-3-319-13257-0_5"},{"key":"10_CR5","unstructured":"Boura C, Chakraborti A, Leurent G, Paul G, Saha D, Soleimany H, Suder V (2016) Key recovery attack against 2.5-round \u03c0-Cipher. In: Fast software encryption - 23rd international workshop, FSE 2016, Bochum, Germany, March 20\u201323, 2016. Revised Selected Papers. Springer, pp 535\u2013553"},{"key":"10_CR6","unstructured":"CAESAR (2014) Competition for authenticated encryption: security, applicability, and robustness. \n                        http:\/\/competitions.cr.yp.to\/caesar.html\/"},{"key":"10_CR7","unstructured":"Duong T, Rizzo J (2011) Here come the XOR ninjas. White paper. Netifera"},{"key":"10_CR8","unstructured":"Gligoroski D, Mihajloska H, Samardjiska S, Jacobsen H, El-Hadedy M, Jensen R, Otte D (2014) \u03c0-Cipher v2.0. Submission to the CAESAR competition. \n                        http:\/\/competitions.cr.yp.to\/caesar-submissions.html\/"},{"key":"10_CR9","doi-asserted-by":"crossref","unstructured":"Saha D, Chowdhury DR (2016) EnCounter: on breaking the nonce barrier in differential fault analysis with a case-study on PAEQ. In: International conference on cryptographic hardware and embedded systems. Springer, pp 581\u2013601","DOI":"10.1007\/978-3-662-53140-2_28"},{"key":"10_CR10","doi-asserted-by":"crossref","unstructured":"Saha D, Kakarla S, Mandava S, Chowdhury DR (2016) Gain: practical key-recovery attacks on round-reduced PAEQ. In: SPACE, lecture notes in computer science, vol 10076. Springer, pp 194\u2013210","DOI":"10.1007\/978-3-319-49445-6_11"}],"container-title":["Journal of Hardware and Systems Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s41635-017-0010-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s41635-017-0010-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s41635-017-0010-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,12,20]],"date-time":"2017-12-20T10:36:43Z","timestamp":1513766203000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s41635-017-0010-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,8,1]]},"references-count":10,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2017,9]]}},"alternative-id":["10"],"URL":"https:\/\/doi.org\/10.1007\/s41635-017-0010-5","relation":{},"ISSN":["2509-3428","2509-3436"],"issn-type":[{"type":"print","value":"2509-3428"},{"type":"electronic","value":"2509-3436"}],"subject":[],"published":{"date-parts":[[2017,8,1]]}}}