{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:27:15Z","timestamp":1750220835226,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":35,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,10,22]],"date-time":"2019-10-22T00:00:00Z","timestamp":1571702400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,10,22]]},"DOI":"10.1145\/3331453.3361676","type":"proceedings-article","created":{"date-parts":[[2019,10,21]],"date-time":"2019-10-21T13:34:22Z","timestamp":1571664862000},"page":"1-5","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["XKX Does Not Preserve Unpredictability"],"prefix":"10.1145","author":[{"given":"Ying","family":"Zou","sequence":"first","affiliation":[{"name":"Department of Computer Science and Engineering, Shanghai Jiao Tong University, Shanghai, China and Shanghai Business School, Shanghai, China"}]},{"given":"Xiangyang","family":"Zhang","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, Shanghai Jiao Tong University, Shanghai, China"}]},{"given":"Lei","family":"Wang","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, Shanghai Jiao Tong University, Shanghai, China"}]}],"member":"320","published-online":{"date-parts":[[2019,10,22]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"ASIACRYPT","author":"Wang Lei","year":"2016","unstructured":"Lei Wang , Jian Guo , Guoyan Zhang , Jingyuan Zhao , and Dawu Gu(2016). How to Build Fully Secure Tweakable Blockciphers from Classical Blockciphers.In: Cheon J., Takagi T. (eds.). Advances in Cryptology-ASIACRYPT 2016 . ASIACRYPT 2016 . Lecture Notes in Computer Science, vol 10031. Springer, Berlin, Heidelberg. Lei Wang, Jian Guo, Guoyan Zhang, Jingyuan Zhao, and Dawu Gu(2016). How to Build Fully Secure Tweakable Blockciphers from Classical Blockciphers.In: Cheon J., Takagi T. (eds.). Advances in Cryptology-ASIACRYPT 2016. ASIACRYPT 2016. Lecture Notes in Computer Science, vol 10031. Springer, Berlin, Heidelberg."},{"key":"e_1_3_2_1_2_1","unstructured":"Richard Schroeppel and Hilarie Orman(1998). The Hasty Pudding Cipher. AES candidate submitted to NIST.  Richard Schroeppel and Hilarie Orman(1998). The Hasty Pudding Cipher. AES candidate submitted to NIST."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45708-9_3"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-42033-7_22"},{"key":"e_1_3_2_1_5_1","volume-title":"ASIACRYPT","author":"Jean J\u00e9r\u00e9my","year":"2014","unstructured":"J\u00e9r\u00e9my Jean , Ivica Nikolic and Thomas Peyrin(2014). Tweaks and Keys for Block Ciphers: The TWEAKEY Framework. In: Sarkar P., Iwata T. (eds.). Advances in Cryptology-ASIACRYPT 2014 . ASIACRYPT 2014 . Lecture Notes in Computer Science, vol 8874. Springer, Berlin, Heidelberg. J\u00e9r\u00e9my Jean, Ivica Nikolic and Thomas Peyrin(2014). Tweaks and Keys for Block Ciphers: The TWEAKEY Framework. In: Sarkar P., Iwata T. (eds.). Advances in Cryptology-ASIACRYPT 2014. ASIACRYPT 2014. Lecture Notes in Computer Science, vol 8874. Springer, Berlin, Heidelberg."},{"key":"e_1_3_2_1_6_1","volume-title":"ASIACRYPT","author":"Phillip","year":"2004","unstructured":"Phillip Rogaway(2004). Efficient Instantiations of Tweakable Blockciphers and Refinements to Modes OCB and PMAC. In: Lee P.J. (ed.). Advances in Cryptology-ASIACRYPT 2004 . ASIACRYPT 2004 . Lecture Notes in Computer Science, vol 3329. Springer, Berlin, Heidelberg. Phillip Rogaway(2004). Efficient Instantiations of Tweakable Blockciphers and Refinements to Modes OCB and PMAC. In: Lee P.J. (ed.). Advances in Cryptology-ASIACRYPT 2004. ASIACRYPT 2004. Lecture Notes in Computer Science, vol 3329. Springer, Berlin, Heidelberg."},{"volume-title":"ACM CCS 01: 8th Conference on Computer and Communications Security, 196--205","author":"Rogaway Phillip","key":"e_1_3_2_1_7_1","unstructured":"Phillip Rogaway , Mihir Bellare , John Black , and Ted Krovetz(2001). OCB A block-cipher mode of operation for efficient authenticated encryption . In ACM CCS 01: 8th Conference on Computer and Communications Security, 196--205 , Philadelphia, PA, USA , November 5-8. ACM Press . Phillip Rogaway, Mihir Bellare, John Black, and Ted Krovetz(2001). OCB A block-cipher mode of operation for efficient authenticated encryption. In ACM CCS 01: 8th Conference on Computer and Communications Security, 196--205, Philadelphia, PA, USA, November 5-8. ACM Press."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2008.917623"},{"volume-title":"Recommendation for Block Cipher Modes of Operation: The XTS-AES Mode for Confidentiality on Storage Devices","author":"Morris J.","key":"e_1_3_2_1_9_1","unstructured":"Morris J. Dworkin(2010). SP 800--38e. Recommendation for Block Cipher Modes of Operation: The XTS-AES Mode for Confidentiality on Storage Devices . Technical Report. NIST, Gaithersburg, MD , United States . Morris J. Dworkin(2010). SP 800--38e. Recommendation for Block Cipher Modes of Operation: The XTS-AES Mode for Confidentiality on Storage Devices. Technical Report. NIST, Gaithersburg, MD, United States."},{"key":"e_1_3_2_1_10_1","series-title":"Lecture Notes in Computer Science","volume-title":"Progress in Cryptology - INDOCRYPT 2007: 8th International Conference in Cryptology in India","author":"Minematsu Kazuhiko","unstructured":"Kazuhiko Minematsu and Toshiyasu Matsushima(2007). Tweakable enciphering schemes from hash-sum-expansion . In: Srinathan K., Rangan C.P., Yung M. (eds.). Progress in Cryptology - INDOCRYPT 2007: 8th International Conference in Cryptology in India , volume 4859 of Lecture Notes in Computer Science , 252--267, Chennai, India, December 9-13. Springer , Heidelberg, Germany. Kazuhiko Minematsu and Toshiyasu Matsushima(2007). Tweakable enciphering schemes from hash-sum-expansion. In: Srinathan K., Rangan C.P., Yung M. (eds.). Progress in Cryptology - INDOCRYPT 2007: 8th International Conference in Cryptology in India, volume 4859 of Lecture Notes in Computer Science, 252--267, Chennai, India, December 9-13. Springer, Heidelberg, Germany."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2009.2027487"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/11599548_15"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-30556-9_25"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-45146-4_28"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-24660-2_23"},{"key":"e_1_3_2_1_16_1","unstructured":"Niels Ferguson Stefan Lucks Bruce Schneier Doug Whiting Mihir Bellare Tadayoshi Kohno Jon Callas and Jesse Walker(2008). The SKEIN Hash Function Family. NIST SHA-3 Competition.  Niels Ferguson Stefan Lucks Bruce Schneier Doug Whiting Mihir Bellare Tadayoshi Kohno Jon Callas and Jesse Walker(2008). The SKEIN Hash Function Family. NIST SHA-3 Competition."},{"key":"e_1_3_2_1_17_1","volume-title":"Fast Software Encryption. FSE 2000","author":"Mercy Paul","year":"1978","unstructured":"Paul Crowley(2001). Mercy : A Fast Large Block Cipher for Disk Sector Encryption. In: Goos G., Hartmanis J., van Leeuwen J., Schneier B. (eds.) . Fast Software Encryption. FSE 2000 . Lecture Notes in Computer Science, vol 1978 . Springer, Berlin, Heidelberg. Paul Crowley(2001). Mercy: A Fast Large Block Cipher for Disk Sector Encryption. In: Goos G., Hartmanis J., van Leeuwen J., Schneier B. (eds.). Fast Software Encryption. FSE 2000. Lecture Notes in Computer Science, vol 1978. Springer, Berlin, Heidelberg."},{"key":"e_1_3_2_1_18_1","unstructured":"Rich Schroeppel(1998). The Hasty Pudding Cipher. NIST AES Proposal.  Rich Schroeppel(1998). The Hasty Pudding Cipher. NIST AES Proposal."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-88733-1_2"},{"key":"e_1_3_2_1_20_1","volume-title":"ASIACRYPT","author":"Goldenberg David","year":"2007","unstructured":"David Goldenberg , Susan Hohenberger , Moses Liskov , Elizabeth Crump Schwartz and Hakan Seyalioglu(2007). On Tweaking Luby-Rackoff Blockciphers. In: Kurosawa K. (ed.). Advances in Cryptology - ASIACRYPT 2007 . ASIACRYPT 2007 . Lecture Notes in Computer Science, vol 4833. Springer, Berlin, Heidelberg. David Goldenberg, Susan Hohenberger, Moses Liskov, Elizabeth Crump Schwartz and Hakan Seyalioglu(2007). On Tweaking Luby-Rackoff Blockciphers. In: Kurosawa K. (ed.). Advances in Cryptology - ASIACRYPT 2007. ASIACRYPT 2007. Lecture Notes in Computer Science, vol 4833. Springer, Berlin, Heidelberg."},{"key":"e_1_3_2_1_21_1","volume-title":"Fast Software Encryption. FSE","author":"Bart","year":"2015","unstructured":"Bart Mennink(2015). Optimally Secure Tweakable Blockciphers . In: Leander G. (ed.). Fast Software Encryption. FSE 2015 . Lecture Notes in Computer Science, vol 9054. Springer , Berlin, Heidelberg. Bart Mennink(2015). Optimally Secure Tweakable Blockciphers. In: Leander G. (ed.). Fast Software Encryption. FSE 2015. Lecture Notes in Computer Science, vol 9054. Springer, Berlin, Heidelberg."},{"key":"e_1_3_2_1_22_1","series-title":"Lecture Notes in Computer Science","volume-title":"Progress in Cryptology - INDOCRYPT 2006: 7th International Conference in Cryptology in India","author":"Chakraborty Debrup","unstructured":"Debrup Chakraborty and Palash Sarkar(2006). HCH: A new tweakable enciphering scheme using the hash-encrypt-hash approach . In Barua R., Lange T. (eds.). Progress in Cryptology - INDOCRYPT 2006: 7th International Conference in Cryptology in India , volume 4329 of Lecture Notes in Computer Science , 287--302, Kolkata, India, December 11-13. Springer , Heidelberg, Germany. Debrup Chakraborty and Palash Sarkar(2006). HCH: A new tweakable enciphering scheme using the hash-encrypt-hash approach. In Barua R., Lange T. (eds.). Progress in Cryptology - INDOCRYPT 2006: 7th International Conference in Cryptology in India, volume 4329 of Lecture Notes in Computer Science, 287--302, Kolkata, India, December 11-13. Springer, Heidelberg, Germany."},{"key":"e_1_3_2_1_23_1","volume-title":"Selected Areas in Cryptography. SAC","author":"Kazuhiko","year":"2006","unstructured":"Kazuhiko Minematsu(2006). Improved Security Analysis of XEX and LRW Modes . In: Biham E., Youssef A.M. (eds.). Selected Areas in Cryptography. SAC 2006 . Lecture Notes in Computer Science, vol 4356. Springer , Berlin, Heidelberg. Kazuhiko Minematsu(2006). Improved Security Analysis of XEX and LRW Modes. In: Biham E., Youssef A.M. (eds.). Selected Areas in Cryptography. SAC 2006. Lecture Notes in Computer Science, vol 4356. Springer, Berlin, Heidelberg."},{"key":"e_1_3_2_1_24_1","volume-title":"CRYPTO","author":"Landecker Will","year":"2012","unstructured":"Will Landecker , Thomas Shrimpton and R. Seth Terashima(2012). Tweakable Blockciphers with Beyond Birthday-Bound Security. In: Safavi-Naini R., Canetti R. (eds.). Advances in Cryptology - CRYPTO 2012 . CRYPTO 2012 . Lecture Notes in Computer Science, vol 7417. Springer, Berlin, Heidelberg. Will Landecker, Thomas Shrimpton and R. Seth Terashima(2012). Tweakable Blockciphers with Beyond Birthday-Bound Security. In: Safavi-Naini R., Canetti R. (eds.). Advances in Cryptology - CRYPTO 2012. CRYPTO 2012. Lecture Notes in Computer Science, vol 7417. Springer, Berlin, Heidelberg."},{"key":"e_1_3_2_1_25_1","volume-title":"Fast Software Encryption. FSE","author":"Lampe Rodolphe","year":"2013","unstructured":"Rodolphe Lampe and Yannick Seurin(2013). Tweakable Blockciphers with Asymptotically Optimal Security . In: Moriai S. (ed.). Fast Software Encryption. FSE 2013 . Lecture Notes in Computer Science, vol 8424. Springer , Berlin, Heidelberg. Rodolphe Lampe and Yannick Seurin(2013). Tweakable Blockciphers with Asymptotically Optimal Security. In: Moriai S. (ed.). Fast Software Encryption. FSE 2013. Lecture Notes in Computer Science, vol 8424. Springer, Berlin, Heidelberg."},{"key":"e_1_3_2_1_26_1","volume-title":"Fast Software Encryption. FSE","author":"Kazuhiko","year":"2009","unstructured":"Kazuhiko Minematsu(2009). Beyond-Birthday-Bound Security Based on Tweakable Block Cipher . In: Dunkelman O. (ed.). Fast Software Encryption. FSE 2009 . Lecture Notes in Computer Science, vol 5665. Springer , Berlin, Heidelberg. Kazuhiko Minematsu(2009). Beyond-Birthday-Bound Security Based on Tweakable Block Cipher. In: Dunkelman O. (ed.). Fast Software Encryption. FSE 2009. Lecture Notes in Computer Science, vol 5665. Springer, Berlin, Heidelberg."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-27239-9_5"},{"key":"e_1_3_2_1_28_1","volume-title":"Advances in Cryptology - CRYPTO","author":"Inoue Akiko","year":"2019","unstructured":"Akiko Inoue , Tetsu Iwata , Kazuhiko Minematsu and Bertram Poettering(2019). Cryptanalysis of OCB2: Attacks on Authenticity and Confidentiality . In: Boldyreva A., Micciancio D. (eds.) Advances in Cryptology - CRYPTO 2019 . CRYPTO 2019. Lecture Notes in Computer Science, vol 11692. Springer , Cham. Akiko Inoue, Tetsu Iwata, Kazuhiko Minematsu and Bertram Poettering(2019). Cryptanalysis of OCB2: Attacks on Authenticity and Confidentiality. In: Boldyreva A., Micciancio D. (eds.) Advances in Cryptology - CRYPTO 2019. CRYPTO 2019. Lecture Notes in Computer Science, vol 11692. Springer, Cham."},{"key":"e_1_3_2_1_29_1","volume-title":"FSE","author":"Zhang Liting","year":"2010","unstructured":"Liting Zhang , Wenling Wu , Peng Wang , Lei Zhang , Shuang Wu , and Bo Liang(2010). Constructing Rate-1 MA Cs from Related-Key Unpredictable Block Ciphers : PGV Model Revisited. In: Hong S., Iwata T. (eds.) Fast Software Encryption . FSE 2010 . Lecture Notes in Computer Science, vol 6147. Springer, Berlin, Heidelberg Liting Zhang, Wenling Wu, Peng Wang, Lei Zhang, Shuang Wu, and Bo Liang(2010). Constructing Rate-1 MACs from Related-Key Unpredictable Block Ciphers: PGV Model Revisited. In: Hong S., Iwata T. (eds.) Fast Software Encryption. FSE 2010. Lecture Notes in Computer Science, vol 6147. Springer, Berlin, Heidelberg"},{"key":"e_1_3_2_1_30_1","first-page":"2","article-title":"Tweakable Blockciphers for Efficient Authenticated Encryptions with Beyond the Birthday - Bound Security","volume":"2017","author":"Naito Yusuke","year":"2017","unstructured":"Yusuke Naito ( 2017 ). Tweakable Blockciphers for Efficient Authenticated Encryptions with Beyond the Birthday - Bound Security . IACR Transactions on Symmetric Cryptology. 2017 , 2 (Jun. 2017), 1--26. Yusuke Naito(2017). Tweakable Blockciphers for Efficient Authenticated Encryptions with Beyond the Birthday - Bound Security. IACR Transactions on Symmetric Cryptology. 2017, 2 (Jun. 2017), 1--26.","journal-title":"IACR Transactions on Symmetric Cryptology."},{"key":"e_1_3_2_1_31_1","volume-title":"XHX - A Framework for Optimally Secure Tweakable Block Ciphers from Classical Block Ciphers and Universal Hashing. Progress in Cryptology -LATINCRYPT, 207--227","author":"Jha Ashwin","year":"2017","unstructured":"Ashwin Jha , Eik List , Kazuhiko Minematsu , Sweta Mishra , and Mridul Nandi ( 2017 ). XHX - A Framework for Optimally Secure Tweakable Block Ciphers from Classical Block Ciphers and Universal Hashing. Progress in Cryptology -LATINCRYPT, 207--227 . Ashwin Jha, Eik List, Kazuhiko Minematsu, Sweta Mishra, and Mridul Nandi (2017). XHX - A Framework for Optimally Secure Tweakable Block Ciphers from Classical Block Ciphers and Universal Hashing. Progress in Cryptology -LATINCRYPT, 207--227."},{"key":"e_1_3_2_1_32_1","volume-title":"The Definition and Software Performance of Hashstream, a Fast Length-Flexible PRF. Cryptography","author":"Ted","year":"2018","unstructured":"Ted Krovetz(2018). The Definition and Software Performance of Hashstream, a Fast Length-Flexible PRF. Cryptography 2018 , 2(4). 31--50. Ted Krovetz(2018). The Definition and Software Performance of Hashstream, a Fast Length-Flexible PRF. Cryptography 2018, 2(4). 31--50."},{"key":"e_1_3_2_1_33_1","volume-title":"Tweaking a block cipher: multi-user beyond-birthday-bound security in the standard model","author":"Beno\u00eet","year":"2018","unstructured":"Beno\u00eet Cogliati1(2018). Tweaking a block cipher: multi-user beyond-birthday-bound security in the standard model . In: T. Iwata. (ed.). Designs, Codes and Cryptography . 2018 vol 86: 2747--2763. Beno\u00eet Cogliati1(2018). Tweaking a block cipher: multi-user beyond-birthday-bound security in the standard model. In: T. Iwata. (ed.). Designs, Codes and Cryptography. 2018 vol 86: 2747--2763."},{"key":"e_1_3_2_1_34_1","volume-title":"Progress in Cryptology - LATINCRYPT","author":"Yusuke","year":"2017","unstructured":"Yusuke Naito(2019). Improved XKX - Based AEAD Scheme: Removing the Birthday Terms . In: Lange T., Dunkelman O. (eds.) Progress in Cryptology - LATINCRYPT 2017 . LATINCRYPT 2017. Lecture Notes in Computer Science, vol 11368. Springer , Cham. Yusuke Naito(2019). Improved XKX - Based AEAD Scheme: Removing the Birthday Terms. In: Lange T., Dunkelman O. (eds.) Progress in Cryptology - LATINCRYPT 2017. LATINCRYPT 2017. Lecture Notes in Computer Science, vol 11368. Springer, Cham."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-44598-6"}],"event":{"name":"CSAE 2019: The 3rd International Conference on Computer Science and Application Engineering","acronym":"CSAE 2019","location":"Sanya China"},"container-title":["Proceedings of the 3rd International Conference on Computer Science and Application Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3331453.3361676","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3331453.3361676","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:13:38Z","timestamp":1750202018000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3331453.3361676"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,10,22]]},"references-count":35,"alternative-id":["10.1145\/3331453.3361676","10.1145\/3331453"],"URL":"https:\/\/doi.org\/10.1145\/3331453.3361676","relation":{},"subject":[],"published":{"date-parts":[[2019,10,22]]},"assertion":[{"value":"2019-10-22","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}