{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T22:59:34Z","timestamp":1773615574837,"version":"3.50.1"},"reference-count":10,"publisher":"Allerton Press","issue":"8","license":[{"start":{"date-parts":[[2021,12,1]],"date-time":"2021-12-01T00:00:00Z","timestamp":1638316800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2021,12,1]],"date-time":"2021-12-01T00:00:00Z","timestamp":1638316800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Aut. Control Comp. Sci."],"published-print":{"date-parts":[[2021,12]]},"DOI":"10.3103\/s0146411621080344","type":"journal-article","created":{"date-parts":[[2022,3,1]],"date-time":"2022-03-01T03:03:08Z","timestamp":1646103788000},"page":"1180-1187","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["On Cryptographic Properties of the NB-Fi Protocol"],"prefix":"10.3103","volume":"55","author":[{"given":"E. K.","family":"Alekseev","sequence":"first","affiliation":[]},{"given":"L. R.","family":"Akhmetzyanova","sequence":"additional","affiliation":[]},{"given":"V. D.","family":"Nikolaev","sequence":"additional","affiliation":[]},{"given":"S. V.","family":"Smyshlyaev","sequence":"additional","affiliation":[]},{"given":"A. I.","family":"Bondarenko","sequence":"additional","affiliation":[]}],"member":"1627","published-online":{"date-parts":[[2022,3,1]]},"reference":[{"key":"7453_CR1","unstructured":"Predvaritel\u2019nyi natsional\u2019nyi standart Rossiiskoi Federatsii. Informatsionnaya tekhnologiya. Internet veshchei. Protokol besprovodnoi peredachi dannykh na osnove uzkopolosnoi modulyatsii radiosignala (NB-Fi) (Preliminary National Standard of the Russian Federation. Information Technology. Internet of Things. Protocol of Wireless Data Transmission Based on Narrow-Band Modulation of Radio Signal (NB-Fi)), Moscow: Standartinform, 2019."},{"key":"7453_CR2","unstructured":"NB-Fi is the first Russian standard of IoT. RSpectr. https:\/\/www.rspectr.com\/articles\/486\/nb-fi-pervyj-otechestvennyj-standart-iot. Cited March 16, 2020."},{"key":"7453_CR3","series-title":"Security flaws induced by CBC padding\u2014Applications to SSL, IPSEC, WTLS","volume-title":"Advances in Cryptology\u2014EUROCRYPT 2002","author":"S. Vaudenay","year":"2002","unstructured":"Vaudenay, S., Security flaws induced by CBC padding\u2014Applications to SSL, IPSEC, WTLS, Advances in Cryptology\u2014EUROCRYPT 2002, Knudsen, L.R., Ed., Lecture Notes in Computer Science, vol. 2332, Berlin: Springer, 2002, pp. 534\u2013545."},{"key":"7453_CR4","unstructured":"Bard, G.V., The vulnerability of SSL to chosen plaintext attack, in IACR Cryptol. ePprint Arch., Rep. 2004\/111, 2004."},{"key":"7453_CR5","unstructured":"Nozdrunov, V.I., On project of national standard \u201cProtocol of IoT for the interchanging data in narrowband spectrum (NB-Fi)\u201d (brief cryptanalysis), Short talk on CTCrypt, 2018. https:\/\/ctcrypt.ru\/files\/ files\/2018\/Rump\/R02_Nozdrunov.pdf. Cited March 16, 2020."},{"key":"7453_CR6","unstructured":"R 50.1.113\u20132016: Information Technology. Cryptographic Data Security. Cryptographic Algorithms to Accompany the Usage of Digital Signature and Hash Function Algorithms, 2016."},{"key":"7453_CR7","unstructured":"R 1323565.1.026\u20132019: Information Technology. Cryptographic Data Security. Authenticated Encryption Block Cipher Operation Modes, 2019."},{"key":"7453_CR8","series-title":"Authenticated encryption: relations among notions and analysis of the generic composition paradigm","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-44448-3_41","volume-title":"Advance in Cryptology \u2013 ASIACRYPT 2000","author":"M. Bellare","year":"2000","unstructured":"Bellare, M. and Namprempre, C., Authenticated encryption: relations among notions and analysis of the generic composition paradigm,  Advance in Cryptology \u2013 ASIACRYPT 2000, Okamoto, T., Ed., Lecture Notes in Computer Science, vol. 1976, Berlin: Springer, 2000, pp.\u00a0531\u2013545. \u00a0https:\/\/doi.org\/10.1007\/3-540-44448-3_41"},{"key":"7453_CR9","series-title":"From stateless to stateful: generic authentication and authenticated encryption constructions with application to TLS","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-29485-8_4","volume-title":"Topics in Cryptology\u2014CT-RSA 2016","author":"C. Boyd","year":"2016","unstructured":"Boyd, C., Hale, B., Mj\u00f8lsnes, S., and Stebila, D., From stateless to stateful: generic authentication and authenticated encryption constructions with application to TLS, Topics in Cryptology\u2014CT-RSA 2016, Sako, K., Ed., Lecture Notes in Computer Science, vol. 9610, Cham: Springer, 2016, pp. 55\u201371. \u00a0https:\/\/doi.org\/10.1007\/978-3-319-29485-8_4"},{"key":"7453_CR10","doi-asserted-by":"publisher","first-page":"5","DOI":"10.4213\/mvk172","volume":"7","author":"E.K. Alekseev","year":"2016","unstructured":"Alekseev, E.K., Oshkin, I.B., Popov, V.O., and Smyshlyaev, S.V., On the cryptographic properties of algorithms accompanying the applications of standards GOST R 34.11\u20132012 and GOST R 34.10\u20132012, Mat. Vopr. Kriptogr., 2016, vol. 7, no. 1, pp. 5\u201338. \u00a0https:\/\/doi.org\/10.4213\/mvk172","journal-title":"Mat. Vopr. Kriptogr."}],"container-title":["Automatic Control and Computer Sciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.3103\/S0146411621080344.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.3103\/S0146411621080344","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.3103\/S0146411621080344.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T22:01:45Z","timestamp":1773612105000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.3103\/S0146411621080344"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,12]]},"references-count":10,"journal-issue":{"issue":"8","published-print":{"date-parts":[[2021,12]]}},"alternative-id":["7453"],"URL":"https:\/\/doi.org\/10.3103\/s0146411621080344","relation":{},"ISSN":["0146-4116","1558-108X"],"issn-type":[{"value":"0146-4116","type":"print"},{"value":"1558-108X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,12]]},"assertion":[{"value":"29 September 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"29 September 2020","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"3 October 2020","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"1 March 2022","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"The authors declare that they have no conflicts of interest.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"CONFLICT OF INTEREST"}}]}}