{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,9,2]],"date-time":"2023-09-02T22:28:33Z","timestamp":1693693713786},"reference-count":22,"publisher":"Informa UK Limited","issue":"3","content-domain":{"domain":["www.tandfonline.com"],"crossmark-restriction":true},"short-container-title":["Cryptologia"],"published-print":{"date-parts":[[2016,5,3]]},"DOI":"10.1080\/01611194.2015.1055386","type":"journal-article","created":{"date-parts":[[2015,11,17]],"date-time":"2015-11-17T14:51:43Z","timestamp":1447771903000},"page":"285-302","update-policy":"http:\/\/dx.doi.org\/10.1080\/tandf_crossmark_01","source":"Crossref","is-referenced-by-count":3,"title":["PFC-CTR, PFC-OCB: Efficient stream cipher modes of authencryption"],"prefix":"10.1080","volume":"40","author":[{"given":"Tzonelih","family":"Hwang","sequence":"first","affiliation":[]},{"given":"Prosanta","family":"Gope","sequence":"additional","affiliation":[]}],"member":"301","published-online":{"date-parts":[[2015,11,17]]},"reference":[{"key":"CIT0001","doi-asserted-by":"crossref","unstructured":"Bellare, B., A. Desai, D. Pointcheval, and P. Rogaway. 1998. Relations among notions of security for public-key encryption schemes. Proceedings of CRYPTO\u201998 Advances in Cryptology, LNCS Vol. 1462, Springer-Verlag, 1462.","DOI":"10.1007\/BFb0055718"},{"key":"CIT0002","unstructured":"Bellare, M., A. Desai, E. JokiPii, and P. Rogaway. 1997. A concrete security treatment of symmetric encryption: Analysis of the DES modes of operation. Proceedings of the 38th Symposium on Foundations of Computer Science, Santa Barbara, California, USA, IEEE. http:\/\/www-cse.ucsd.edu\/users\/mihir."},{"key":"CIT0003","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-008-9026-x"},{"key":"CIT0004","doi-asserted-by":"crossref","unstructured":"Bellare, M., P. Rogaway, and D. Wagner. 2004. The EAX mode of operation. Proceedings of Fast Software Encryption, New Delhi, India, LNCS Vol. 3017, Springer-Verlag, 3017.","DOI":"10.1007\/978-3-540-25937-4_25"},{"key":"CIT0005","unstructured":"Dolev, D., C. Dwork, and M. Naor. n.d. Non-malleable cryptography. Proceedings of the 23rd Annual Symposium on the Theory of Computing, San Francisco, CA, USA."},{"key":"CIT0006","unstructured":"Ferguson, N., D. Whiting, B. Schneier, J. Kelsey, S. Lucks, and T. Kohno. 2003. Helix: Fast encryption and authentication in a single cryptographic primitive. Proceedings of Fast Software Encryption, 10th International Workshop, Lund, Sweden, LNCS, Springer-Verlag, 330\u201346."},{"key":"CIT0007","doi-asserted-by":"crossref","unstructured":"Gligor, V., and P. Donescu. 2001. Fast encryption and authentication: XCBC encryption and XECB authentication modes. Proceedings of 2nd NIST Workshop on AES Modes of Operation, Santa Barbara, CA.","DOI":"10.1007\/3-540-45473-X_8"},{"key":"CIT0008","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-015-2344-z"},{"key":"CIT0009","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2015.2416396"},{"key":"CIT0010","doi-asserted-by":"publisher","DOI":"10.1109\/JSEN.2015.2441113"},{"key":"CIT0011","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-013-1501\u20135"},{"key":"CIT0012","doi-asserted-by":"publisher","DOI":"10.1080\/01611194.2014.988366"},{"key":"CIT0013","unstructured":"ISO\/IEC 9797. 1989. Data cryptographic techniques\u2014Data integrity mechanism using a cryptographic check function employing a block cipher algorithm. http:\/\/www.iso.org\/iso\/iso_catalogue\/catalogue_ics\/catalogue_detail_ics.htm?csnumber=17659."},{"key":"CIT0014","doi-asserted-by":"crossref","unstructured":"Jutla, C. 2001. Encryption modes with almost free message integrity. Proceedings of EUROCRYPT 2001 Advances in Cryptology, Insbruck, Austria, LNCS Vol. 2045, Springer-Verlag, 2045, 529\u201344.","DOI":"10.1007\/3-540-44987-6_32"},{"key":"CIT0015","author":"Karlof C.","year":"2004","journal-title":"ACM SenSys 2004"},{"key":"CIT0016","unstructured":"Kohno, T., J. Viega, and D. Whiting. 2004. CWC: A high-performance conventional authenticated encryption mode. Proceedings of Fast Software Encryption, New Delhi, India, LNCS, Vol. 3017, Springer-Verlag, 3017."},{"key":"CIT0017","unstructured":"Muller, F. 2004. Differential attacks against the Helix stream-cipher. Proceedings of Fast Software Encryption, New Delhi, India, LNCS, Vol. 3017, Springer-Verlag, 3017, 94\u2013108."},{"key":"CIT0018","doi-asserted-by":"crossref","unstructured":"Rogaway, P. 2004. Efficient instantiations of tweakable blockciphers and refinements to modes OCB and PMAC. Proceedings of ASIACRYPT 2004, LNCS, Vol. 3329, Springer, Heidelberg.","DOI":"10.1007\/978-3-540-30539-2_2"},{"key":"CIT0019","doi-asserted-by":"publisher","DOI":"10.1145\/937527.937529"},{"key":"CIT0020","doi-asserted-by":"publisher","DOI":"10.1080\/01611191003598295"},{"key":"CIT0021","unstructured":"Watanabe, D., and S. Furuya. 2004. A MAC forgery attack on SOBER-128. Proceedings of Fast Software Encryption, New Delhi, India, LNCS Springer-Verlag, 3017, 472\u201382."},{"key":"CIT0022","unstructured":"Zoltak, B. n.d. VMPC-MAC: A stream-cipher based authenticated encryption Scheme. https:\/\/eprint.iacr.org\/2004\/301.pdf."}],"container-title":["Cryptologia"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/www.tandfonline.com\/doi\/pdf\/10.1080\/01611194.2015.1055386","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,1]],"date-time":"2019-09-01T16:30:53Z","timestamp":1567355453000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.tandfonline.com\/doi\/full\/10.1080\/01611194.2015.1055386"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,11,17]]},"references-count":22,"journal-issue":{"issue":"3","published-online":{"date-parts":[[2015,10,19]]},"published-print":{"date-parts":[[2016,5,3]]}},"alternative-id":["10.1080\/01611194.2015.1055386"],"URL":"https:\/\/doi.org\/10.1080\/01611194.2015.1055386","relation":{},"ISSN":["0161-1194","1558-1586"],"issn-type":[{"value":"0161-1194","type":"print"},{"value":"1558-1586","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015,11,17]]},"assertion":[{"value":"The publishing and review policy for this title is described in its Aims & Scope.","order":1,"name":"peerreview_statement","label":"Peer Review Statement"},{"value":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=ucry20","URL":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=ucry20","order":2,"name":"aims_and_scope_url","label":"Aim & Scope"}]}}