{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T21:28:18Z","timestamp":1760131698046,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":26,"publisher":"ACM","license":[{"start":{"date-parts":[[2004,10,25]],"date-time":"2004-10-25T00:00:00Z","timestamp":1098662400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2004,10,25]]},"DOI":"10.1145\/1030083.1030095","type":"proceedings-article","created":{"date-parts":[[2005,1,30]],"date-time":"2005-01-30T17:55:16Z","timestamp":1107107716000},"page":"72-81","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":21,"title":["Attacking and repairing the winZip encryption scheme"],"prefix":"10.1145","author":[{"given":"Tadayoshi","family":"Kohno","sequence":"first","affiliation":[{"name":"University of California at San Diego"}]}],"member":"320","published-online":{"date-parts":[[2004,10,25]]},"reference":[{"key":"e_1_3_2_1_1_1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"531","DOI":"10.1007\/3-540-44448-3_41","volume-title":"Advances in Cryptology ASIACRYPT","author":"Bellare M.","year":"2000","unstructured":"M. Bellare and C. Namprempre . Authenticated encryption: Relations among notions and analysis of the generic composition paradigm . In T. Okamoto, editor, Advances in Cryptology ASIACRYPT 2000 , volume 1976 of Lecture Notes in Computer Science , pages 531 -- 545 . Springer-Verlag , Berlin Germany , Dec. 2000.]] M. Bellare and C. Namprempre. Authenticated encryption: Relations among notions and analysis of the generic composition paradigm. In T. Okamoto, editor, Advances in Cryptology ASIACRYPT 2000, volume 1976 of Lecture Notes in Computer Science, pages 531--545. Springer-Verlag, Berlin Germany, Dec. 2000.]]"},{"key":"e_1_3_2_1_2_1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"317","DOI":"10.1007\/3-540-44448-3_24","volume-title":"Advances in Cryptology ASIACRYPT","author":"Bellare M.","year":"2000","unstructured":"M. Bellare and P. Rogaway . Encode-then-encipher encryption: How to exploit nonces or redundancy in plaintexts for efficient cryptography . In T. Okamoto, editor, Advances in Cryptology ASIACRYPT 2000 , volume 1976 of Lecture Notes in Computer Science , pages 317 -- 330 . Springer-Verlag , Berlin Germany , Dec. 2000.]] M. Bellare and P. Rogaway. Encode-then-encipher encryption: How to exploit nonces or redundancy in plaintexts for efficient cryptography. In T. Okamoto, editor, Advances in Cryptology ASIACRYPT 2000, volume 1976 of Lecture Notes in Computer Science, pages 317--330. Springer-Verlag, Berlin Germany, Dec. 2000.]]"},{"issue":"4","key":"e_1_3_2_1_3_1","volume":"88","author":"Benedetto D.","year":"2002","unstructured":"D. Benedetto , E. Caglioti , and V. Loreto . Language trees and Zipping. Physical Review Letters , 88 ( 4 ), Jan. 2002 .]] D. Benedetto, E. Caglioti, and V. Loreto. Language trees and Zipping. Physical Review Letters, 88(4), Jan. 2002.]]","journal-title":"Language trees and Zipping. Physical Review Letters"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_4_1","DOI":"10.1016\/S0020-0190(02)00269-7"},{"key":"e_1_3_2_1_5_1","series-title":"Lecture Notes in Computer Science","volume-title":"Fast Software Encryption ' 94","author":"Biham E.","year":"1994","unstructured":"E. Biham and P. Kocher . A known plaintext attack on the PKZIP stream cipher . In B. Preneel, editor, Fast Software Encryption ' 94 , volume 1008 of Lecture Notes in Computer Science . Springer-Verlag , Berlin Germany , 1994 .]] E. Biham and P. Kocher. A known plaintext attack on the PKZIP stream cipher. In B. Preneel, editor, Fast Software Encryption ' 94, volume 1008 of Lecture Notes in Computer Science. Springer-Verlag, Berlin Germany, 1994.]]"},{"key":"e_1_3_2_1_6_1","series-title":"Lecture Notes in Computer Science","first-page":"451","volume-title":"Advances in Cryptology EUROCRYPT","author":"Canetti R.","year":"2001","unstructured":"R. Canetti and H. Krawczyk . Analysis of key-exchange protocols and their use for building secure channels . In B. Ptzmann, editor, Advances in Cryptology EUROCRYPT 2001 , volume 2045 of Lecture Notes in Computer Science , pages 451 -- 472 . Springer-Verlag , Berlin Germany , 2001.]] R. Canetti and H. Krawczyk. Analysis of key-exchange protocols and their use for building secure channels. In B. Ptzmann, editor, Advances in Cryptology EUROCRYPT 2001, volume 2045 of Lecture Notes in Computer Science, pages 451--472. Springer-Verlag, Berlin Germany, 2001.]]"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_7_1","DOI":"10.5555\/560131"},{"key":"e_1_3_2_1_8_1","volume-title":"IETF RFC 1951","author":"Deutsch P.","year":"1996","unstructured":"P. Deutsch . DEFLATE compressed data format specication version 1.3 . IETF RFC 1951 , May 1996 .]] P. Deutsch. DEFLATE compressed data format specication version 1.3. IETF RFC 1951, May 1996.]]"},{"key":"e_1_3_2_1_9_1","volume-title":"Info-ZIP note","author":"ZIP.","year":"2001","unstructured":"Info- ZIP. Info-ZIP note , 2001 1203, Dec. 2001. Available at ftp:\/\/ftp.info-zip.org\/pub\/infozip\/doc\/appnote-011203-iz.zip.]] Info-ZIP. Info-ZIP note, 20011203, Dec. 2001. Available at ftp:\/\/ftp.info-zip.org\/pub\/infozip\/doc\/appnote-011203-iz.zip.]]"},{"key":"e_1_3_2_1_10_1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"90","DOI":"10.1007\/3-540-45811-5_7","volume-title":"Information Security, 5th International Conference","author":"Jallad K.","year":"2002","unstructured":"K. Jallad , J. Katz , and B. Schneier . Implementation of chosen-ciphertext attacks against PGP and GnuPG . In A. H. Chan and V. D. Gligor, editors, Information Security, 5th International Conference , volume 2433 of Lecture Notes in Computer Science , pages 90 -- 101 . Springer-Verlag , Berlin Germany , 2002 .]] K. Jallad, J. Katz, and B. Schneier. Implementation of chosen-ciphertext attacks against PGP and GnuPG. In A. H. Chan and V. D. Gligor, editors, Information Security, 5th International Conference, volume 2433 of Lecture Notes in Computer Science, pages 90--101. Springer-Verlag, Berlin Germany, 2002.]]"},{"key":"e_1_3_2_1_11_1","volume-title":"July","author":"Jones D. W.","year":"2003","unstructured":"D. W. Jones . The Case of the Diebold FTP Site , July 2003 . Available at http:\/\/www.cs.uiowa.edu\/ jones\/voting\/dieboldftp.html.]] D. W. Jones. The Case of the Diebold FTP Site, July 2003. Available at http:\/\/www.cs.uiowa.edu\/ jones\/voting\/dieboldftp.html.]]"},{"key":"e_1_3_2_1_12_1","volume-title":"Password-based cryptography specication version 2.0. IETF RFC","author":"Kaliski B.","year":"2000","unstructured":"B. Kaliski . PKCS #5 : Password-based cryptography specication version 2.0. IETF RFC 2898, Sept. 2000 .]] B. Kaliski. PKCS #5: Password-based cryptography specication version 2.0. IETF RFC 2898, Sept. 2000.]]"},{"key":"e_1_3_2_1_13_1","volume-title":"Ninth USENIX Security Symposium","author":"Katz J.","year":"2000","unstructured":"J. Katz and B. Schneier . A chosen ciphertext attack against several e-mail encryption protocols . In Ninth USENIX Security Symposium , 2000 .]] J. Katz and B. Schneier. A chosen ciphertext attack against several e-mail encryption protocols. In Ninth USENIX Security Symposium, 2000.]]"},{"key":"e_1_3_2_1_14_1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"284","DOI":"10.1007\/b75241","volume-title":"Fast Software Encryption","author":"Katz J.","year":"2000","unstructured":"J. Katz and M. Yung . Unforgeable encryption and chosen ciphertext secure modes of operation . In B. Schneier, editor, Fast Software Encryption 2000 , volume 1978 of Lecture Notes in Computer Science , pages 284 -- 299 . Springer-Verlag , Berlin Germany , Apr. 2000.]] J. Katz and M. Yung. Unforgeable encryption and chosen ciphertext secure modes of operation. In B. Schneier, editor, Fast Software Encryption 2000, volume 1978 of Lecture Notes in Computer Science, pages 284--299. Springer-Verlag, Berlin Germany, Apr. 2000.]]"},{"key":"e_1_3_2_1_15_1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"263","DOI":"10.1007\/3-540-45661-9_21","volume-title":"Fast Software Encryption","author":"Kelsey J.","year":"2002","unstructured":"J. Kelsey . Compression and information leakage of plaintext . In J. Daemen and V. Rijmen, editors, Fast Software Encryption 2002 , volume 2365 of Lecture Notes in Computer Science , pages 263 -- 276 . Springer-Verlag , Berlin Germany , 2002.]] J. Kelsey. Compression and information leakage of plaintext. In J. Daemen and V. Rijmen, editors, Fast Software Encryption 2002, volume 2365 of Lecture Notes in Computer Science, pages 263--276. Springer-Verlag, Berlin Germany, 2002.]]"},{"key":"e_1_3_2_1_17_1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"310","DOI":"10.1007\/3-540-44647-8_19","volume-title":"Advances in Cryptology CRYPTO","author":"Krawczyk H.","year":"2001","unstructured":"H. Krawczyk . The order of encryption and authentication for protecting communications (or: How secure is SSL?) . In J. Kilian, editor, Advances in Cryptology CRYPTO 2001 , volume 2139 of Lecture Notes in Computer Science , pages 310 -- 331 . Springer-Verlag , Berlin Germany , Aug. 2001.]] H. Krawczyk. The order of encryption and authentication for protecting communications (or: How secure is SSL?). In J. Kilian, editor, Advances in Cryptology CRYPTO 2001, volume 2139 of Lecture Notes in Computer Science, pages 310--331. Springer-Verlag, Berlin Germany, Aug. 2001.]]"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_18_1","DOI":"10.5555\/646767.704312"},{"unstructured":"PKWARE. APPNOTE.TXT - .ZIP File Format Specication Apr. 2004. Version 6.2.0 available at http:\/\/www.pkware.com\/products\/enterprise\/white_papers\/appnote.txt.]]  PKWARE. APPNOTE.TXT - .ZIP File Format Specication Apr. 2004. Version 6.2.0 available at http:\/\/www.pkware.com\/products\/enterprise\/white_papers\/appnote.txt.]]","key":"e_1_3_2_1_19_1"},{"unstructured":"PKWARE. APPNOTE.TXT-.ZIP File Format Specication Jan. 2004. Version 6.1.0 replaced by {19}.]]  PKWARE. APPNOTE.TXT-.ZIP File Format Specication Jan. 2004. Version 6.1.0 replaced by {19}.]]","key":"e_1_3_2_1_20_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_21_1","DOI":"10.1145\/586110.586125"},{"key":"e_1_3_2_1_22_1","series-title":"Lecture Notes in Computer Science","first-page":"124","volume-title":"Fast Software Encryption","author":"Stay M.","year":"2001","unstructured":"M. Stay . ZIP attacks with reduced known plaintext . In M. Matsui, editor, Fast Software Encryption 2001 , volume 2355 of Lecture Notes in Computer Science , pages 124 -- 134 . Springer-Verlag , Berlin Germany , 2001.]] M. Stay. ZIP attacks with reduced known plaintext. In M. Matsui, editor, Fast Software Encryption 2001, volume 2355 of Lecture Notes in Computer Science, pages 124--134. Springer-Verlag, Berlin Germany, 2001.]]"},{"key":"e_1_3_2_1_23_1","volume-title":"Proceedings of the Second USENIX Workshop on Electronic Commerce","author":"Wagner D.","year":"1996","unstructured":"D. Wagner and B. Schneier . Analysis of the SSL 3.0 protocol . In Proceedings of the Second USENIX Workshop on Electronic Commerce , 1996 .]] D. Wagner and B. Schneier. Analysis of the SSL 3.0 protocol. In Proceedings of the Second USENIX Workshop on Electronic Commerce, 1996.]]"},{"unstructured":"WinZip Computing Inc. AES encryption information: Encryption specication AE-2 Jan. 2004. Version 1.02 available at http:\/\/www.winzip.com\/aes_info.htm.]]  WinZip Computing Inc. AES encryption information: Encryption specication AE-2 Jan. 2004. Version 1.02 available at http:\/\/www.winzip.com\/aes_info.htm.]]","key":"e_1_3_2_1_24_1"},{"unstructured":"WinZip Computing Inc. Download WinZip add-ons Apr. 2004. Available at http:\/\/www.winzip.com\/daddons.htm.]]  WinZip Computing Inc. Download WinZip add-ons Apr. 2004. Available at http:\/\/www.winzip.com\/daddons.htm.]]","key":"e_1_3_2_1_25_1"},{"unstructured":"WinZip Computing Inc. Homepage Mar. 2004. Available at http:\/\/www.winzip.com\/.]]  WinZip Computing Inc. Homepage Mar. 2004. Available at http:\/\/www.winzip.com\/.]]","key":"e_1_3_2_1_26_1"},{"unstructured":"WinZip Computing Inc. What's new in WinZip 9.0 Mar. 2004. Available at http:\/\/www.winzip.com\/whatsnew90.htm.]]  WinZip Computing Inc. What's new in WinZip 9.0 Mar. 2004. Available at http:\/\/www.winzip.com\/whatsnew90.htm.]]","key":"e_1_3_2_1_27_1"}],"event":{"sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control","ACM Association for Computing Machinery"],"acronym":"CCS04","name":"CCS04: 11th ACM Conference on Computer and Communications Security 2004","location":"Washington DC USA"},"container-title":["Proceedings of the 11th ACM conference on Computer and communications security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1030083.1030095","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1030083.1030095","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T16:25:07Z","timestamp":1750263907000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1030083.1030095"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004,10,25]]},"references-count":26,"alternative-id":["10.1145\/1030083.1030095","10.1145\/1030083"],"URL":"https:\/\/doi.org\/10.1145\/1030083.1030095","relation":{},"subject":[],"published":{"date-parts":[[2004,10,25]]},"assertion":[{"value":"2004-10-25","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}