{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T09:02:55Z","timestamp":1743152575562,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":31,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783662481158"},{"type":"electronic","value":"9783662481165"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-662-48116-5_15","type":"book-chapter","created":{"date-parts":[[2015,8,11]],"date-time":"2015-08-11T08:21:35Z","timestamp":1439281295000},"page":"297-316","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":9,"title":["Practical Cryptanalysis of the Open Smart Grid Protocol"],"prefix":"10.1007","author":[{"given":"Philipp","family":"Jovanovic","sequence":"first","affiliation":[]},{"given":"Samuel","family":"Neves","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,8,12]]},"reference":[{"key":"15_CR1","unstructured":"Approval of OSGP as an ETSI Standard (2012). \n                      http:\/\/www.etsi.org\/news-events\/news\/382-news-release-18-january-2012"},{"key":"15_CR2","doi-asserted-by":"crossref","unstructured":"Albrecht, M.R., Paterson, K.G., Watson, G.J.: Plaintext recovery attacks against SSH. In: Proceedings of the 2009 30th IEEE Symposium on Security and Privacy, SP 2009, pp. 16\u201326. IEEE Computer Society (2009)","DOI":"10.1109\/SP.2009.5"},{"key":"15_CR3","unstructured":"AlFardan, N.J., Bernstein, D.J., Paterson, K.G., Poettering, B., Schuldt, J.C.N.: On the security of RC4 in TLS. In: King, S.T. (ed.) Proceedings of the 22th USENIX Security Symposium, Washington, DC, USA, 14\u201316 August 2013, pp. 305\u2013320. USENIX Association (2013)"},{"key":"15_CR4","unstructured":"AlFardan, N.J., Paterson, K.G.: Lucky thirteen: breaking the TLS and DTLS record protocols. In: 2013 IEEE Symposium on Security and Privacy, SP 2013, Berkeley, CA, USA, 19\u201322 May 2013, pp. 526\u2013540. IEEE Computer Society (2013). \n                      http:\/\/ieeexplore.ieee.org\/xpl\/mostRecentIssue.jsp?punumber=6547086"},{"key":"15_CR5","unstructured":"ANSI: Protocol Specification For Interfacing to Data Communication Networks. ANSI C12.22-2008, American National Standards Institute, January 2009"},{"key":"15_CR6","unstructured":"ANSI: Control Network Protocol Specification. ANSI\/CEA-709.1-C, American National Standards Institute, December 2010"},{"key":"15_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"531","DOI":"10.1007\/3-540-44448-3_41","volume-title":"Advances in Cryptology - ASIACRYPT 2000","author":"M Bellare","year":"2000","unstructured":"Bellare, M., Namprempre, C.: Authenticated encryption: relations among notions and analysis of the generic composition paradigm. In: Okamoto, T. (ed.) ASIACRYPT 2000. LNCS, vol. 1976, pp. 531\u2013545. Springer, Heidelberg (2000)"},{"key":"15_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"389","DOI":"10.1007\/978-3-540-25937-4_25","volume-title":"Fast Software Encryption","author":"M Bellare","year":"2004","unstructured":"Bellare, M., Rogaway, P., Wagner, D.: The EAX mode of operation. In: Roy, B., Meier, W. (eds.) FSE 2004. LNCS, vol. 3017, pp. 389\u2013407. Springer, Heidelberg (2004)"},{"key":"15_CR9","unstructured":"Bernstein, D.J.: Cryptographic competitions \u2013 Disasters (2014). \n                      http:\/\/competitions.cr.yp.to\/disasters.html\n                      \n                    . Accessed 27 January 2014"},{"key":"15_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"583","DOI":"10.1007\/978-3-540-45146-4_34","volume-title":"Advances in Cryptology - CRYPTO 2003","author":"B Canvel","year":"2003","unstructured":"Canvel, B., Hiltgen, A.P., Vaudenay, S., Vuagnoux, M.: Password interception in a SSL\/TLS channel. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol. 2729, pp. 583\u2013599. Springer, Heidelberg (2003)"},{"key":"15_CR11","unstructured":"Daum, M.: Cryptanalysis of Hash functions of the MD4-family. Ph.D. thesis, Ruhr University Bochum, May 2005. \n                      http:\/\/www-brs.ub.ruhr-uni-bochum.de\/netahtml\/HSS\/Diss\/DaumMagnus\/"},{"key":"15_CR12","unstructured":"Duong, T., Rizzo, J.: Here Come The \n                      \n                        \n                      \n                      $$\\oplus $$\n                      \n                        \n                          \u2295\n                        \n                      \n                     Ninjas (Unpublished, May 2011)"},{"key":"15_CR13","unstructured":"Echelon Corporation: LonTalk Protocol Specification, version 3.0 (1994)"},{"key":"15_CR14","unstructured":"Echelon Corporation: 90\u00a0Million Energy-Aware LonWorks Devices Worldwide (2010). \n                      http:\/\/www.businesswire.com\/news\/home\/20100412005544\/en\/90-Million-Energy-Aware-LonWorks-Devices-Worldwide"},{"key":"15_CR15","unstructured":"ETSI: Open Smart Grid Protocol (OSGP). Reference DGS\/OSG-001, European Telecommunications Standards Institute, Sophia Antipolis Cedex - France, January 2012. \n                      http:\/\/www.osgp.org\/"},{"key":"15_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/3-540-45537-X_1","volume-title":"Selected Areas in Cryptography","author":"SR Fluhrer","year":"2001","unstructured":"Fluhrer, S.R., Mantin, I., Shamir, A.: Weaknesses in the key scheduling algorithm of RC4. In: Vaudenay, S., Youssef, A.M. (eds.) SAC 2001. LNCS, vol. 2259, pp. 1\u201324. Springer, Heidelberg (2001)"},{"key":"15_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1007\/3-540-44706-7_2","volume-title":"Fast Software Encryption","author":"SR Fluhrer","year":"2001","unstructured":"Fluhrer, S.R., McGrew, D.A.: Statistical analysis of the alleged RC4 keystream generator. In: Schneier, B. (ed.) FSE 2000. LNCS, vol. 1978, pp. 19\u201330. Springer, Heidelberg (2001)"},{"issue":"1","key":"15_CR18","doi-asserted-by":"publisher","first-page":"67","DOI":"10.1007\/s00145-012-9138-1","volume":"27","author":"SS Gupta","year":"2014","unstructured":"Gupta, S.S., Maitra, S., Paul, G., Sarkar, S.: (Non-)Random sequences from (non-)random permutations - analysis of RC4 stream cipher. J. Cryptology 27(1), 67\u2013108 (2014)","journal-title":"J. Cryptology"},{"key":"15_CR19","unstructured":"IEEE: Draft Standard for Communications Protocol Aboard Passenger Trains. IEEE P1473\/D8, July 2010. \n                      http:\/\/ieeexplore.ieee.org\/servlet\/opac?punumber=5511471"},{"key":"15_CR20","unstructured":"ISO: Information Technology \u2013 Interconnection of Information Technology Equipment \u2013 Home Electronic System (HES) Architecture \u2013 Medium-independent Protocol Based on ANSI\/CEA-709.1-B. ISO\/IEC CD 14543-6-1:2006, International Organization for Standardization (2006). \n                      http:\/\/hes-standards.org\/doc\/SC25_WG1_N1229.pdf"},{"key":"15_CR21","unstructured":"ISO: Information Technology - Control Network Protocol - Part 1: Protocol Stack. ISO\/IEC 14908\u20131:2012, International Organization for Standardization, Geneva, Switzerland (2012)"},{"key":"15_CR22","unstructured":"Kursawe, K., Peters, C.: Structural Weaknesses in the Open Smart Grid Protocol. Cryptology ePrint Archive, Report 2015\/088 (2015). \n                      https:\/\/eprint.iacr.org\/2015\/088"},{"key":"15_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"336","DOI":"10.1007\/3-540-45473-X_28","volume-title":"Fast Software Encryption","author":"H Lipmaa","year":"2002","unstructured":"Lipmaa, H., Moriai, S.: Efficient algorithms for computing differential properties of addition. In: Matsui, M. (ed.) FSE 2001. LNCS, vol. 2355, pp. 336\u2013350. Springer, Heidelberg (2002)"},{"key":"15_CR24","unstructured":"LonMark International: LON and BACnet: History and Approach. \n                      http:\/\/www.lonmark.org\/connection\/presentations\/2012\/Q2\/Light-Building\/06+LON+and+BACnet-+History+and-Newron+System.pdf"},{"key":"15_CR25","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"327","DOI":"10.1007\/978-3-662-43933-3_17","volume-title":"Fast Software Encryption","author":"K Minematsu","year":"2014","unstructured":"Minematsu, K., Lucks, S., Morita, H., Iwata, T.: Attacks and security proofs of EAX-prime. In: Moriai, S. (ed.) FSE 2013. LNCS, vol. 8424, pp. 327\u2013347. Springer, Heidelberg (2014)"},{"key":"15_CR26","unstructured":"M\u00f6ller, B., Duong, T., Kotowicz, K.: This POODLE Bites: Exploiting The SSL 3.0 Fallback, October 2014. \n                      https:\/\/www.openssl.org\/bodo\/ssl-poodle.pdf"},{"key":"15_CR27","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"74","DOI":"10.1007\/978-3-642-19574-7_5","volume-title":"Selected Areas in Cryptography","author":"P Sepehrdad","year":"2011","unstructured":"Sepehrdad, P., Vaudenay, S., Vuagnoux, M.: Discovery and exploitation of new biases in RC4. In: Biryukov, A., Gong, G., Stinson, D.R. (eds.) SAC 2010. LNCS, vol. 6544, pp. 74\u201391. Springer, Heidelberg (2011)"},{"key":"15_CR28","unstructured":"Standardization Administration of China: Control Network LONWORKS Technology Specification \u2013 Part 1: Protocol Specification. GB\/Z 20177.1-2006 (2006)"},{"key":"15_CR29","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"188","DOI":"10.1007\/978-3-540-77535-5_14","volume-title":"Information Security Applications","author":"E Tews","year":"2008","unstructured":"Tews, E., Weinmann, R.-P., Pyshkin, A.: Breaking 104\u00a0bit WEP in less than 60\u00a0s. In: Kim, S., Yung, M., Lee, H.-W. (eds.) WISA 2007. LNCS, vol. 4867, pp. 188\u2013202. Springer, Heidelberg (2008)"},{"key":"15_CR30","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"534","DOI":"10.1007\/3-540-46035-7_35","volume-title":"Advances in Cryptology - EUROCRYPT 2002","author":"S Vaudenay","year":"2002","unstructured":"Vaudenay, S.: Security flaws induced by CBC padding - applications to SSL, IPSEC, WTLS. In: Knudsen, L.R. (ed.) EUROCRYPT 2002. LNCS, vol. 2332, pp. 534\u2013546. Springer, Heidelberg (2002)"},{"key":"15_CR31","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"344","DOI":"10.1007\/978-3-540-77360-3_22","volume-title":"Selected Areas in Cryptography","author":"S Vaudenay","year":"2007","unstructured":"Vaudenay, S., Vuagnoux, M.: Passive\u2013only key recovery attacks on RC4. In: Adams, C., Miri, A., Wiener, M. (eds.) SAC 2007. LNCS, vol. 4876, pp. 344\u2013359. Springer, Heidelberg (2007)"}],"container-title":["Lecture Notes in Computer Science","Fast Software Encryption"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-662-48116-5_15","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,30]],"date-time":"2019-05-30T12:34:27Z","timestamp":1559219667000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-662-48116-5_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783662481158","9783662481165"],"references-count":31,"URL":"https:\/\/doi.org\/10.1007\/978-3-662-48116-5_15","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]},"assertion":[{"value":"12 August 2015","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}