{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T13:48:40Z","timestamp":1725630520867},"reference-count":18,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,6]]},"DOI":"10.1109\/eit.2014.6871757","type":"proceedings-article","created":{"date-parts":[[2014,8,18]],"date-time":"2014-08-18T17:03:43Z","timestamp":1408381423000},"page":"173-178","source":"Crossref","is-referenced-by-count":2,"title":["The efficiency of block ciphers in Galois\/Counter Mode in IPsec-based virtual private networks"],"prefix":"10.1109","author":[{"given":"Alexander","family":"Uskov","sequence":"first","affiliation":[]},{"given":"Hayk","family":"Avagyan","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"year":"2005","author":"ferguson","journal-title":"Authentication Weakness in GCM","key":"17"},{"year":"0","journal-title":"Crypto++ (2013) Crypto++ 5 6 0","key":"18"},{"year":"2013","journal-title":"Modes Development","key":"15"},{"year":"2006","author":"stinson","journal-title":"Cryptography Theory and Practice","key":"16"},{"key":"13","article-title":"The security and performance of the galois\/counter mode (GCM) of operation","author":"mcgrew","year":"2004","journal-title":"The Journal of the International Association for Cryptologie Research"},{"year":"2005","author":"mcgrew","journal-title":"The Galois\/Counter Mode of Operation (GCM)","key":"14"},{"key":"11","doi-asserted-by":"crossref","DOI":"10.6028\/NIST.SP.800-38a","author":"dworkin","year":"2001","journal-title":"Recommendation for Block Cipher Modes of Operation"},{"year":"2013","author":"bernstein","journal-title":"Failures of Secret-key Cryptography","key":"12"},{"year":"2007","author":"carmouche","journal-title":"IPsec Virtual Private Network Fundamentals","key":"3"},{"year":"2006","author":"lewis","journal-title":"Comparing Designing and Deploying VPNs","key":"2"},{"year":"2013","author":"bergman","journal-title":"Hacking Exposed Mobile Security Secrets and Solutions","key":"1"},{"key":"10","article-title":"Evaluation of some blockcipher modes of operation","author":"rogaway","year":"2011","journal-title":"Evaluation Carried Out for the Cryptography Research and Evaluation Committees (CRYPTREC) for the Government of Japan"},{"year":"2007","author":"mogollon","journal-title":"Cryptography and Security Services Mechanisms and Applications","key":"7"},{"year":"2002","author":"shneyderman","journal-title":"Mobile VPN Delivering Advanced Services in Next Generation Wireless Systems","key":"6"},{"year":"2005","author":"bollapragada","journal-title":"IPSec VPN Design","key":"5"},{"key":"4","doi-asserted-by":"crossref","DOI":"10.6028\/NIST.SP.800-77","author":"frankel","year":"2005","journal-title":"Guide to IPsec VPNs Recommendations of the National Institute of Standards and Technology"},{"key":"9","first-page":"31","article-title":"IPsec VPN-based security of web-based rich multimedia systems","author":"uskov","year":"2013","journal-title":"Proceedings of the 6th International Conference on Intelligent Interactive Multimedia Systems and Services (IIMSS-2013)"},{"doi-asserted-by":"publisher","key":"8","DOI":"10.1109\/TrustCom.2012.187"}],"event":{"name":"2014 IEEE International Conference on Electro\/Information Technology (EIT)","start":{"date-parts":[[2014,6,5]]},"location":"Milwaukee, WI, USA","end":{"date-parts":[[2014,6,7]]}},"container-title":["IEEE International Conference on Electro\/Information Technology"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6863137\/6871745\/06871757.pdf?arnumber=6871757","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,8,23]],"date-time":"2020-08-23T08:47:02Z","timestamp":1598172422000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6871757\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,6]]},"references-count":18,"URL":"https:\/\/doi.org\/10.1109\/eit.2014.6871757","relation":{},"subject":[],"published":{"date-parts":[[2014,6]]}}}