{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,1,6]],"date-time":"2024-01-06T12:18:43Z","timestamp":1704543523420},"reference-count":5,"publisher":"International Academy Publishing (IAP)","issue":"9","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["JCP"],"DOI":"10.4304\/jcp.8.9.2262-2268","type":"journal-article","created":{"date-parts":[[2013,9,6]],"date-time":"2013-09-06T16:57:20Z","timestamp":1378486640000},"source":"Crossref","is-referenced-by-count":3,"title":["The Security of Key Derivation Functions in WINRAR"],"prefix":"10.17706","volume":"8","author":[{"given":"Jie","family":"Chen","sequence":"first","affiliation":[]},{"given":"Jun","family":"Zhou","sequence":"additional","affiliation":[]},{"given":"Kun","family":"Pan","sequence":"additional","affiliation":[]},{"given":"Shuqiang","family":"Lin","sequence":"additional","affiliation":[]},{"given":"Cuicui","family":"Zhao","sequence":"additional","affiliation":[]},{"given":"Xiaochao","family":"Li","sequence":"additional","affiliation":[]}],"member":"7163","published-online":{"date-parts":[[2013,9,1]]},"reference":[{"key":"ref1","doi-asserted-by":"crossref","DOI":"10.1201\/9781420010756","volume-title":"Yehuda Lindell Introduction to Modern Cryptography Principles and Protocols","author":"Katz","year":"2007","unstructured":"[1] Jonathan Katz, Yehuda Lindell, Introduction to Modern Cryptography: Principles and Protocols. Chapman & Hall \/ CRC Press, 2007."},{"key":"ref2","first-page":"245","article-title":"Yao, Yiqun Lisa Yin, \"Design and analysis of password-based key derivation functions,\" Topics in Cryptology \u2013 CT-RSA 2005, San Francisco, CA, USA","volume":"3376","author":"Frances","year":"2005","unstructured":"[3] Frances F. Yao, Yiqun Lisa Yin, \"Design and analysis of password-based key derivation functions,\" Topics in Cryptology \u2013 CT-RSA 2005, San Francisco, CA, USA, Lecture Notes in Computer Science, 2005, Vol.3376, pp. 245-261.","journal-title":"Lect Notes Comput Sci","ISSN":"http:\/\/id.crossref.org\/issn\/0302-9743","issn-type":"print"},{"key":"ref3","first-page":"2186","article-title":"A new one-pass authenticated encryption model","volume":"37","author":"Jin","year":"2009","unstructured":"[6] XU Jin, WEN Qiao-yan, WANG Da-yin, \"A new one-pass authenticated encryption model,\" Acta Electronica Sinica, Vol.37, pp. 2186-2192, Oct 2009.","journal-title":"Acta Electronica Sinica"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/11761679_25"},{"issue":"8","key":"ref5","first-page":"101","article-title":"Security Analysis of Key Derivation Function in File Authentication Scheme","volume":"38","author":"Zou","year":"2012","unstructured":"[11] Mei Zou, Hongwei Wu, Jun Zhou, Xiaochao Li, \"Security Analysis of Key Derivation Function in File Authentication Scheme,\" Journal of Computer Engineering, Vol.38 (8), pp101-104, April 2012.","journal-title":"Journal of Computer Engineering"}],"container-title":["Journal of Computers"],"original-title":[],"deposited":{"date-parts":[[2019,7,23]],"date-time":"2019-07-23T14:30:58Z","timestamp":1563892258000},"score":1,"resource":{"primary":{"URL":"http:\/\/ojs.academypublisher.com\/index.php\/jcp\/article\/view\/9323"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,9,1]]},"references-count":5,"journal-issue":{"issue":"9","published-online":{"date-parts":[[2013,9,1]]}},"URL":"https:\/\/doi.org\/10.4304\/jcp.8.9.2262-2268","relation":{},"ISSN":["1796-203X"],"issn-type":[{"value":"1796-203X","type":"print"}],"subject":[],"published":{"date-parts":[[2013,9,1]]}}}