{"id":"https://openalex.org/W2730386703","doi":"https://doi.org/10.1007/978-3-319-63715-0_24","title":"Insuperability of the Standard Versus Ideal Model Gap for Tweakable Blockcipher Security","display_name":"Insuperability of the Standard Versus Ideal Model Gap for Tweakable Blockcipher Security","publication_year":2017,"publication_date":"2017-01-01","ids":{"openalex":"https://openalex.org/W2730386703","doi":"https://doi.org/10.1007/978-3-319-63715-0_24","mag":"2730386703"},"language":"en","primary_location":{"id":"doi:10.1007/978-3-319-63715-0_24","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-319-63715-0_24","pdf_url":null,"source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},"type":"book-chapter","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://ir.cwi.nl/pub/26758/AUTR2222.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5032130714","display_name":"Bart Mennink","orcid":"https://orcid.org/0000-0001-6679-1878"},"institutions":[{"id":"https://openalex.org/I1341640284","display_name":"Centrum Wiskunde & Informatica","ror":"https://ror.org/00x7ekv49","country_code":"NL","type":"facility","lineage":["https://openalex.org/I1341640284","https://openalex.org/I2800991832"]},{"id":"https://openalex.org/I145872427","display_name":"Radboud University Nijmegen","ror":"https://ror.org/016xsfp80","country_code":"NL","type":"education","lineage":["https://openalex.org/I145872427"]}],"countries":["NL"],"is_corresponding":true,"raw_author_name":"Bart Mennink","raw_affiliation_strings":["CWI, Amsterdam, The Netherlands","Digital Security Group, Radboud University, Nijmegen, The Netherlands"],"affiliations":[{"raw_affiliation_string":"CWI, Amsterdam, The Netherlands","institution_ids":["https://openalex.org/I1341640284"]},{"raw_affiliation_string":"Digital Security Group, Radboud University, Nijmegen, The Netherlands","institution_ids":["https://openalex.org/I145872427"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5032130714"],"corresponding_institution_ids":["https://openalex.org/I1341640284","https://openalex.org/I145872427"],"apc_list":{"value":5000,"currency":"EUR","value_usd":5392},"apc_paid":null,"fwci":2.8254,"has_fulltext":true,"cited_by_count":12,"citation_normalized_percentile":{"value":0.92967896,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"708","last_page":"732"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11130","display_name":"Coding theory and cryptography","score":0.9988999962806702,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9984999895095825,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/rekeying","display_name":"Rekeying","score":0.9141292572021484},{"id":"https://openalex.org/keywords/ideal","display_name":"Ideal (ethics)","score":0.6630436778068542},{"id":"https://openalex.org/keywords/effi","display_name":"Effi","score":0.610957682132721},{"id":"https://openalex.org/keywords/construct","display_name":"Construct (python library)","score":0.5263831615447998},{"id":"https://openalex.org/keywords/cipher","display_name":"Cipher","score":0.524330198764801},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.491624653339386},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.46987348794937134},{"id":"https://openalex.org/keywords/sigma","display_name":"Sigma","score":0.46164196729660034},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.40649956464767456},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.24438592791557312},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.24274691939353943},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.2064310610294342},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.149688720703125},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.0972338318824768},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.0596601665019989},{"id":"https://openalex.org/keywords/key-management","display_name":"Key management","score":0.0593201220035553},{"id":"https://openalex.org/keywords/epistemology","display_name":"Epistemology","score":0.051993995904922485}],"concepts":[{"id":"https://openalex.org/C127150765","wikidata":"https://www.wikidata.org/wiki/Q7310605","display_name":"Rekeying","level":4,"score":0.9141292572021484},{"id":"https://openalex.org/C2776639384","wikidata":"https://www.wikidata.org/wiki/Q840396","display_name":"Ideal (ethics)","level":2,"score":0.6630436778068542},{"id":"https://openalex.org/C2780707294","wikidata":"https://www.wikidata.org/wiki/Q27795853","display_name":"Effi","level":2,"score":0.610957682132721},{"id":"https://openalex.org/C2780801425","wikidata":"https://www.wikidata.org/wiki/Q5164392","display_name":"Construct (python library)","level":2,"score":0.5263831615447998},{"id":"https://openalex.org/C2780221543","wikidata":"https://www.wikidata.org/wiki/Q4681865","display_name":"Cipher","level":3,"score":0.524330198764801},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.491624653339386},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.46987348794937134},{"id":"https://openalex.org/C2778049214","wikidata":"https://www.wikidata.org/wiki/Q7512234","display_name":"Sigma","level":2,"score":0.46164196729660034},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.40649956464767456},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.24438592791557312},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.24274691939353943},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.2064310610294342},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.149688720703125},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.0972338318824768},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0596601665019989},{"id":"https://openalex.org/C17886624","wikidata":"https://www.wikidata.org/wiki/Q1320561","display_name":"Key management","level":3,"score":0.0593201220035553},{"id":"https://openalex.org/C111472728","wikidata":"https://www.wikidata.org/wiki/Q9471","display_name":"Epistemology","level":1,"score":0.051993995904922485},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0}],"mesh":[],"locations_count":4,"locations":[{"id":"doi:10.1007/978-3-319-63715-0_24","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-319-63715-0_24","pdf_url":null,"source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},{"id":"pmh:oai:cwi.nl:26758","is_oa":true,"landing_page_url":"https://ir.cwi.nl/pub/26758","pdf_url":"https://ir.cwi.nl/pub/26758/AUTR2222.pdf","source":{"id":"https://openalex.org/S7407055335","display_name":"Centrum Wiskunde & Informatica (CWI), the national research institute for mathematics and computer science in the Netherlands","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"info:eu-repo/semantics/conferenceObject"},{"id":"pmh:oai:repository.ubn.ru.nl:2066/176578","is_oa":false,"landing_page_url":"https://hdl.handle.net/2066/176578","pdf_url":null,"source":{"id":"https://openalex.org/S4306401067","display_name":"Radboud Repository (Radboud University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I145872427","host_organization_name":"Radboud University Nijmegen","host_organization_lineage":["https://openalex.org/I145872427"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Article in monograph or in proceedings"},{"id":"pmh:ru:oai:repository.ubn.ru.nl:2066/176578","is_oa":false,"landing_page_url":"http://hdl.handle.net/2066/176578","pdf_url":null,"source":{"id":"https://openalex.org/S4306401843","display_name":"Data Archiving and Networked Services (DANS)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I1322597698","host_organization_name":"Royal Netherlands Academy of Arts and Sciences","host_organization_lineage":["https://openalex.org/I1322597698"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Katz, J.; Shacham, H. (ed.), Advances in Cryptology \u2013 CRYPTO 2017: 37th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 20\u201324, 2017, Proceedings, Part II, 708 - 732. Cham : Springer International Publishing","raw_type":"info:eu-repo/semantics/article"}],"best_oa_location":{"id":"pmh:oai:cwi.nl:26758","is_oa":true,"landing_page_url":"https://ir.cwi.nl/pub/26758","pdf_url":"https://ir.cwi.nl/pub/26758/AUTR2222.pdf","source":{"id":"https://openalex.org/S7407055335","display_name":"Centrum Wiskunde & Informatica (CWI), the national research institute for mathematics and computer science in the Netherlands","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"info:eu-repo/semantics/conferenceObject"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G629491556","display_name":null,"funder_award_id":"(NWO)","funder_id":"https://openalex.org/F4320321800","funder_display_name":"Nederlandse Organisatie voor Wetenschappelijk Onderzoek"},{"id":"https://openalex.org/G7010378412","display_name":null,"funder_award_id":"016.Veni","funder_id":"https://openalex.org/F4320321800","funder_display_name":"Nederlandse Organisatie voor Wetenschappelijk Onderzoek"},{"id":"https://openalex.org/G7236394620","display_name":null,"funder_award_id":"016.Veni.173.017","funder_id":"https://openalex.org/F4320321800","funder_display_name":"Nederlandse Organisatie voor Wetenschappelijk Onderzoek"}],"funders":[{"id":"https://openalex.org/F4320321800","display_name":"Nederlandse Organisatie voor Wetenschappelijk Onderzoek","ror":"https://ror.org/04jsz6e67"}],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2730386703.pdf","grobid_xml":"https://content.openalex.org/works/W2730386703.grobid-xml"},"referenced_works_count":58,"referenced_works":["https://openalex.org/W118432913","https://openalex.org/W122619279","https://openalex.org/W142023353","https://openalex.org/W200355028","https://openalex.org/W288546487","https://openalex.org/W617944061","https://openalex.org/W755522289","https://openalex.org/W919227374","https://openalex.org/W989818426","https://openalex.org/W1223230236","https://openalex.org/W1453172084","https://openalex.org/W1489155257","https://openalex.org/W1504211573","https://openalex.org/W1508480257","https://openalex.org/W1511186238","https://openalex.org/W1525837128","https://openalex.org/W1537849967","https://openalex.org/W1551493658","https://openalex.org/W1586481148","https://openalex.org/W1590517425","https://openalex.org/W1655844021","https://openalex.org/W1753861823","https://openalex.org/W1793926990","https://openalex.org/W1826530159","https://openalex.org/W1863270349","https://openalex.org/W1892798954","https://openalex.org/W1958084802","https://openalex.org/W2052267638","https://openalex.org/W2095980913","https://openalex.org/W2109116994","https://openalex.org/W2109394932","https://openalex.org/W2109450547","https://openalex.org/W2113782372","https://openalex.org/W2131300413","https://openalex.org/W2134615993","https://openalex.org/W2136620663","https://openalex.org/W2139747141","https://openalex.org/W2145227448","https://openalex.org/W2146009225","https://openalex.org/W2155115217","https://openalex.org/W2160673637","https://openalex.org/W2169290761","https://openalex.org/W2204642948","https://openalex.org/W2232945818","https://openalex.org/W2290117735","https://openalex.org/W2294144979","https://openalex.org/W2295349647","https://openalex.org/W2295943187","https://openalex.org/W2398602458","https://openalex.org/W2404863376","https://openalex.org/W2408669375","https://openalex.org/W2552378946","https://openalex.org/W2552956646","https://openalex.org/W2739688808","https://openalex.org/W2951778892","https://openalex.org/W3193638959","https://openalex.org/W3204866234","https://openalex.org/W4285719527"],"related_works":["https://openalex.org/W2109538941","https://openalex.org/W126911567","https://openalex.org/W2374662641","https://openalex.org/W2484943245","https://openalex.org/W2176517380","https://openalex.org/W2102218281","https://openalex.org/W2365655038","https://openalex.org/W2391186441","https://openalex.org/W2004745021","https://openalex.org/W2125780140"],"abstract_inverted_index":null,"counts_by_year":[{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":1},{"year":2020,"cited_by_count":6},{"year":2019,"cited_by_count":2},{"year":2018,"cited_by_count":2}],"updated_date":"2026-04-10T15:06:20.359241","created_date":"2025-10-10T00:00:00"}
