{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:25:33Z","timestamp":1750307133842,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":18,"publisher":"ACM","license":[{"start":{"date-parts":[[2011,10,17]],"date-time":"2011-10-17T00:00:00Z","timestamp":1318809600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2011,10,17]]},"DOI":"10.1145\/2046707.2046757","type":"proceedings-article","created":{"date-parts":[[2011,10,18]],"date-time":"2011-10-18T13:02:00Z","timestamp":1318942920000},"page":"423-432","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["Ciphers that securely encipher their own keys"],"prefix":"10.1145","author":[{"given":"Mihir","family":"Bellare","sequence":"first","affiliation":[{"name":"University of California San Diego, San Diego, CA, USA"}]},{"given":"David","family":"Cash","sequence":"additional","affiliation":[{"name":"IBM, Yorktown Heights, USA"}]},{"given":"Sriram","family":"Keelveedhi","sequence":"additional","affiliation":[{"name":"University of California San Diego, San Diego, CA, USA"}]}],"member":"320","published-online":{"date-parts":[[2011,10,17]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-03356-8_35"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-13190-5_22"},{"key":"e_1_3_2_1_3_1","volume-title":"Ciphers that securely encipher their own keys. Cryptology ePrint Archive","author":"Bellare M.","year":"2011","unstructured":"M. Bellare , D. Cash , and S. Keelveedhi . Ciphers that securely encipher their own keys. Cryptology ePrint Archive , 2011 . http:\/\/eprint.iacr.org\/. M. Bellare, D. Cash, and S. Keelveedhi. Ciphers that securely encipher their own keys. Cryptology ePrint Archive, 2011. http:\/\/eprint.iacr.org\/."},{"key":"e_1_3_2_1_4_1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"491","DOI":"10.1007\/3-540-39200-9_31","volume-title":"RKA-PRFs, and applications","author":"Bellare M.","year":"2003","unstructured":"M. Bellare and T. Kohno . A theoretical treatment of related-key attacks: RKA-PRPs , RKA-PRFs, and applications . In E. Biham, editor, Advances in Cryptology -- EUROCRYPT 2003 , volume 2656 of Lecture Notes in Computer Science , pages 491 -- 506 . Springer , May 2003. M. Bellare and T. Kohno. A theoretical treatment of related-key attacks: RKA-PRPs, RKA-PRFs, and applications. In E. Biham, editor, Advances in Cryptology -- EUROCRYPT 2003, volume 2656 of Lecture Notes in Computer Science, pages 491--506. Springer, May 2003."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1007\/11761679_25"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"crossref","unstructured":"J.\n      Black P.\n      Rogaway and \n      T.\n      Shrimpton\n  . \n  Encryption-scheme security in the presence of key-dependent messages\n  . In K. Nyberg and H. M. Heys editors SAC \n  2002\n   9th Annual International Workshop on Selected Areas in Cryptography volume \n  2595\n   of \n  Lecture Notes in Computer Science pages \n  62\n  --\n  75\n  . \n  Springer Aug. 2003.   J. Black P. Rogaway and T. Shrimpton. Encryption-scheme security in the presence of key-dependent messages. In K. Nyberg and H. M. Heys editors SAC 2002 9th Annual International Workshop on Selected Areas in Cryptography volume 2595 of Lecture Notes in Computer Science pages 62--75. Springer Aug. 2003.","DOI":"10.1007\/3-540-36492-7_6"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-85174-5_7"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"crossref","unstructured":"Z.\n      Brakerski S.\n      Goldwasser and \n      Y. T.\n      Kalai\n  . \n  Black-box circular-secure encryption beyond affine functions\n  . In Y. Ishai editor TCC \n  2011\n   8th Theory of Cryptography Conference volume \n  6597\n   of \n  Lecture Notes in Computer Science pages \n  201\n  --\n  218\n  . \n  Springer Mar. 2011.   Z. Brakerski S. Goldwasser and Y. T. Kalai. Black-box circular-secure encryption beyond affine functions. In Y. Ishai editor TCC 2011 8th Theory of Cryptography Conference volume 6597 of Lecture Notes in Computer Science pages 201--218. Springer Mar. 2011.","DOI":"10.1007\/978-3-642-19571-6_13"},{"key":"e_1_3_2_1_9_1","volume-title":"Intel Software Network","author":"Firasta N.","year":"2009","unstructured":"N. Firasta , M. Buxton , P. Jinbo , K. Nasri , and S. Kuo . Intel AVX: New frontiers in performance improvements and energy efficiency . Intel Software Network , 2009 . N. Firasta, M. Buxton, P. Jinbo, K. Nasri, and S. Kuo. Intel AVX: New frontiers in performance improvements and energy efficiency. Intel Software Network, 2009."},{"key":"e_1_3_2_1_10_1","unstructured":"B. Gladman. Brian gladman's aes implementation. http:\/\/gladman.plushost.co.uk\/oldsite\/AES\/index.php.  B. Gladman. Brian gladman's aes implementation. http:\/\/gladman.plushost.co.uk\/oldsite\/AES\/index.php."},{"key":"e_1_3_2_1_11_1","unstructured":"S. Gueron. Advanced encryption standard (AES) instructions set. Intel http:\/\/softwarecommunity.intel.com\/articles\/eng\/3788.htm 2010.  S. Gueron. Advanced encryption standard (AES) instructions set. Intel http:\/\/softwarecommunity.intel.com\/articles\/eng\/3788.htm 2010."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-30556-9_25"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/1315245.1315303"},{"key":"e_1_3_2_1_14_1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"482","DOI":"10.1007\/978-3-540-45146-4_28","volume-title":"Advances in Cryptology -- CRYPTO","author":"Halevi S.","year":"2003","unstructured":"S. Halevi and P. Rogaway . A tweakable enciphering mode . In D. Boneh, editor, Advances in Cryptology -- CRYPTO 2003 , volume 2729 of Lecture Notes in Computer Science , pages 482 -- 499 . Springer , Aug. 2003. S. Halevi and P. Rogaway. A tweakable enciphering mode. In D. Boneh, editor, Advances in Cryptology -- CRYPTO 2003, volume 2729 of Lecture Notes in Computer Science, pages 482--499. Springer, Aug. 2003."},{"key":"e_1_3_2_1_15_1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"292","DOI":"10.1007\/978-3-540-24660-2_23","volume-title":"Topics in Cryptology -- CT-RSA","author":"Halevi S.","year":"2004","unstructured":"S. Halevi and P. Rogaway . A parallelizable enciphering mode . In T. Okamoto, editor, Topics in Cryptology -- CT-RSA 2004 , volume 2964 of Lecture Notes in Computer Science , pages 292 -- 304 . Springer , Feb. 2004. S. Halevi and P. Rogaway. A parallelizable enciphering mode. In T. Okamoto, editor, Topics in Cryptology -- CT-RSA 2004, volume 2964 of Lecture Notes in Computer Science, pages 292--304. Springer, Feb. 2004."},{"key":"e_1_3_2_1_16_1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"31","DOI":"10.1007\/3-540-45708-9_3","volume-title":"Advances in Cryptology -- CRYPTO","author":"Liskov M.","year":"2002","unstructured":"M. Liskov , R. L. Rivest , and D. Wagner . Tweakable block ciphers . In M. Yung, editor, Advances in Cryptology -- CRYPTO 2002 , volume 2442 of Lecture Notes in Computer Science , pages 31 -- 46 . Springer , Aug. 2002. M. Liskov, R. L. Rivest, and D. Wagner. Tweakable block ciphers. In M. Yung, editor, Advances in Cryptology -- CRYPTO 2002, volume 2442 of Lecture Notes in Computer Science, pages 31--46. Springer, Aug. 2002."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1137\/0217022"},{"key":"e_1_3_2_1_18_1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"16","DOI":"10.1007\/978-3-540-30539-2_2","volume-title":"Advances in Cryptology -- ASIACRYPT","author":"Rogaway P.","year":"2004","unstructured":"P. Rogaway . Efficient instantiations of tweakable blockciphers and refinements to modes OCB and PMAC. In P. J. Lee, editor, Advances in Cryptology -- ASIACRYPT 2004 , volume 3329 of Lecture Notes in Computer Science , pages 16 -- 31 . Springer , Dec. 2004. P. Rogaway. Efficient instantiations of tweakable blockciphers and refinements to modes OCB and PMAC. In P. J. Lee, editor, Advances in Cryptology -- ASIACRYPT 2004, volume 3329 of Lecture Notes in Computer Science, pages 16--31. Springer, Dec. 2004."}],"event":{"name":"CCS'11: the ACM Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Chicago Illinois USA","acronym":"CCS'11"},"container-title":["Proceedings of the 18th ACM conference on Computer and communications security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2046707.2046757","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2046707.2046757","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T09:48:42Z","timestamp":1750240122000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2046707.2046757"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,10,17]]},"references-count":18,"alternative-id":["10.1145\/2046707.2046757","10.1145\/2046707"],"URL":"https:\/\/doi.org\/10.1145\/2046707.2046757","relation":{},"subject":[],"published":{"date-parts":[[2011,10,17]]},"assertion":[{"value":"2011-10-17","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}