{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,7]],"date-time":"2025-12-07T13:07:09Z","timestamp":1765112829886,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":21,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,10,30]],"date-time":"2017-10-30T00:00:00Z","timestamp":1509321600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100003977","name":"Israel Science Foundation","doi-asserted-by":"publisher","award":["1018\/16"],"award-info":[{"award-number":["1018\/16"]}],"id":[{"id":"10.13039\/501100003977","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,10,30]]},"DOI":"10.1145\/3133956.3133992","type":"proceedings-article","created":{"date-parts":[[2017,10,27]],"date-time":"2017-10-27T12:48:18Z","timestamp":1509108498000},"page":"1019-1036","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":18,"title":["Better Bounds for Block Cipher Modes of Operation via Nonce-Based Key Derivation"],"prefix":"10.1145","author":[{"given":"Shay","family":"Gueron","sequence":"first","affiliation":[{"name":"University of Haifa and Amazon Web Services, Haifa, Israel"}]},{"given":"Yehuda","family":"Lindell","sequence":"additional","affiliation":[{"name":"Bar-Ilan University, Ramat Gan, Israel"}]}],"member":"320","published-online":{"date-parts":[[2017,10,30]]},"reference":[{"key":"e_1_3_2_2_1_1","unstructured":"BoringSSL https:\/\/boringssl.googlesource.com\/boringssl\/"},{"key":"e_1_3_2_2_2_1","unstructured":"RFC5077: Transport Layer Security (TLS) Session Resumption without Server-Side State https:\/\/tools.ietf.org\/html\/rfc5077#section-4"},{"key":"e_1_3_2_2_3_1","first-page":"546","volume-title":"Springer (LNCS 1976","author":"Abdalla A.","year":"2000","unstructured":"A. Abdalla and M. Bellare. Increasing the Lifetime of a Key: A Comparative Analysis of the Security of Re-keying Techniques. In textitASIACRYPT 2000, Springer (LNCS 1976), pages 546--559, 2000."},{"key":"e_1_3_2_2_4_1","unstructured":"E. Barker and J. Kelsey. Recommendation for Random Number Generation Using Deterministic Random Bit Generators NIST Special Publication 800--90A.http:\/\/nvlpubs.nist.gov\/nistpubs\/SpecialPublications\/NIST.SP.800--90Ar1.pdf"},{"key":"e_1_3_2_2_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978423"},{"key":"e_1_3_2_2_6_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0020-0190(02)00269-7"},{"key":"e_1_3_2_2_7_1","volume-title":"the 10th USENIX Workshop on Offensive Technologies (WOOT 16)","author":"Bock H.","year":"2016","unstructured":"H. Bock, A. Zauner, S. Devlin, J. Somorovsky and P. Jovanovic.Nonce-Disrespecting Adversaries: Practical Forgery Attacks on GCM in TLS. In the 10th USENIX Workshop on Offensive Technologies (WOOT 16), 2016."},{"key":"e_1_3_2_2_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-63697-9_17"},{"key":"e_1_3_2_2_9_1","volume-title":"Recommendation for Block Cipher Modes of Operation:Galois\/Counter Mode (GCM) for Confidentiality and Authentication. textitFederalInformation Processing Standard Publication FIPS 800--38D","author":"Dworkin M.","year":"2006","unstructured":"M. Dworkin. Recommendation for Block Cipher Modes of Operation:Galois\/Counter Mode (GCM) for Confidentiality and Authentication. textitFederalInformation Processing Standard Publication FIPS 800--38D, 2006.http:\/\/csrc.nist.gov\/publications\/nistpubs\/800--38D\/SP-800--38D.pdf"},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-017--9253-0"},{"key":"e_1_3_2_2_11_1","volume-title":"Manuscript","author":"Gilboa S.","year":"2016","unstructured":"S. Gilboa and S. Gueron. The Advantage of Truncated Permutations. Manuscript, 2016. https:\/\/arxiv.org\/abs\/1610.02518."},{"key":"e_1_3_2_2_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813613"},{"key":"e_1_3_2_2_14_1","unstructured":"S. Gueron A. Langley Y. Lindell. https:\/\/tools.ietf.org\/html\/draft-irtf-cfrg-gcmsiv"},{"key":"e_1_3_2_2_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813619"},{"key":"e_1_3_2_2_16_1","unstructured":".A. McGrew and J. ViegaThe Galois\/Counter Mode of Operation (GCM). http:\/\/csrc.nist.gov\/groups\/ST\/toolkit\/BCM\/documents\/proposedmodes\/gcm\/gcm-spec.pdf"},{"key":"e_1_3_2_2_17_1","first-page":"343","volume-title":"ViegaThe Security and Performance of the Galois\/Counter Mode (GCM) of Operation. In textitINDOCRYPT","author":"McGrew A.","year":"2004","unstructured":".A. McGrew and J. ViegaThe Security and Performance of the Galois\/Counter Mode (GCM) of Operation. In textitINDOCRYPT 2004, Springer (LNCS 3348), pages 343--355, 2004."},{"key":"e_1_3_2_2_18_1","first-page":"209","volume-title":"Proceedings Part I","author":"Mouha N.","year":"2015","unstructured":"N. Mouha, A. Luykx. Multi-key Security: The Even-Mansour Construction Revisited. Advances in Cryptology -- CRYPTO 2015, Proceedings Part I, pp. 209--223 (2015)."},{"key":"e_1_3_2_2_19_1","unstructured":"QUIC a multiplexed stream transport over UDP. https:\/\/www.chromium.org\/quic."},{"volume-title":"Rogaway and T. Shrimpton. Deterministic Authenticated Encryption: A Provable-Security Treatment of the Key-Wrap Problem. In EUROCRYPT 2006","year":"2006","key":"e_1_3_2_2_20_1","unstructured":". Rogaway and T. Shrimpton. Deterministic Authenticated Encryption: A Provable-Security Treatment of the Key-Wrap Problem. In EUROCRYPT 2006, Springer (LNCS 4004), pages 373--390, 2006."},{"key":"e_1_3_2_2_21_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1467-9574.1978.tb01387.x"},{"key":"e_1_3_2_2_22_1","doi-asserted-by":"publisher","DOI":"10.1007\/11927587_5"}],"event":{"name":"CCS '17: 2017 ACM SIGSAC Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Dallas Texas USA","acronym":"CCS '17"},"container-title":["Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3133956.3133992","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3133956.3133992","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T02:13:26Z","timestamp":1750212806000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3133956.3133992"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,10,30]]},"references-count":21,"alternative-id":["10.1145\/3133956.3133992","10.1145\/3133956"],"URL":"https:\/\/doi.org\/10.1145\/3133956.3133992","relation":{},"subject":[],"published":{"date-parts":[[2017,10,30]]},"assertion":[{"value":"2017-10-30","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}