{"id":"https://openalex.org/W2753034791","doi":"https://doi.org/10.13154/tosc.v2017.i4.240-267","title":"Reconsidering the Security Bound of AES-GCM-SIV","display_name":"Reconsidering the Security Bound of AES-GCM-SIV","publication_year":2017,"publication_date":"2017-12-14","ids":{"openalex":"https://openalex.org/W2753034791","doi":"https://doi.org/10.13154/tosc.v2017.i4.240-267","mag":"2753034791"},"language":"en","primary_location":{"id":"pmh:oai:doaj.org/article:bb430a53d8ea4db39d59572116ca8cce","is_oa":true,"landing_page_url":"https://doaj.org/article/bb430a53d8ea4db39d59572116ca8cce","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"IACR Transactions on Symmetric Cryptology, Pp 240-267 (2017)","raw_type":"article"},"type":"preprint","indexed_in":["datacite","doaj"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://doaj.org/article/bb430a53d8ea4db39d59572116ca8cce","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5038639314","display_name":"Tetsu Iwata","orcid":"https://orcid.org/0000-0002-4729-0979"},"institutions":[{"id":"https://openalex.org/I60134161","display_name":"Nagoya University","ror":"https://ror.org/04chrp450","country_code":"JP","type":"education","lineage":["https://openalex.org/I60134161"]}],"countries":["JP"],"is_corresponding":true,"raw_author_name":"Iwata, Tetsu","raw_affiliation_strings":["Nagoya university;"],"affiliations":[{"raw_affiliation_string":"Nagoya university;","institution_ids":["https://openalex.org/I60134161"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5048055873","display_name":"Yannick Seurin","orcid":"https://orcid.org/0000-0002-2948-9423"},"institutions":[{"id":"https://openalex.org/I4210108273","display_name":"Agence Nationale de S\u00e9curit\u00e9 du M\u00e9dicament et des Produits de Sant\u00e9","ror":"https://ror.org/01g80gk13","country_code":"FR","type":"government","lineage":["https://openalex.org/I4210108273"]}],"countries":["FR"],"is_corresponding":false,"raw_author_name":"Seurin, Yannick","raw_affiliation_strings":["ANSSI, Paris"],"affiliations":[{"raw_affiliation_string":"ANSSI, Paris","institution_ids":["https://openalex.org/I4210108273"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5038639314"],"corresponding_institution_ids":["https://openalex.org/I60134161"],"apc_list":null,"apc_paid":null,"fwci":2.06261674,"has_fulltext":false,"cited_by_count":10,"citation_normalized_percentile":{"value":0.88619643,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":98},"biblio":{"volume":"2017","issue":"4","first_page":"240","last_page":"267"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11130","display_name":"Coding theory and cryptography","score":0.9961000084877014,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/gcm-transcription-factors","display_name":"GCM transcription factors","score":0.6982918381690979},{"id":"https://openalex.org/keywords/authenticated-encryption","display_name":"Authenticated encryption","score":0.662901759147644},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6001579165458679},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5695164799690247},{"id":"https://openalex.org/keywords/cryptographic-nonce","display_name":"Cryptographic nonce","score":0.5242919325828552},{"id":"https://openalex.org/keywords/standardization","display_name":"Standardization","score":0.49556195735931396},{"id":"https://openalex.org/keywords/simple","display_name":"Simple (philosophy)","score":0.4346919059753418},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.42735961079597473},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.41252368688583374},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.28660836815834045}],"concepts":[{"id":"https://openalex.org/C143742823","wikidata":"https://www.wikidata.org/wiki/Q5513004","display_name":"GCM transcription factors","level":4,"score":0.6982918381690979},{"id":"https://openalex.org/C128619300","wikidata":"https://www.wikidata.org/wiki/Q15263584","display_name":"Authenticated encryption","level":3,"score":0.662901759147644},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6001579165458679},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5695164799690247},{"id":"https://openalex.org/C9996903","wikidata":"https://www.wikidata.org/wiki/Q1749235","display_name":"Cryptographic nonce","level":3,"score":0.5242919325828552},{"id":"https://openalex.org/C188087704","wikidata":"https://www.wikidata.org/wiki/Q369577","display_name":"Standardization","level":2,"score":0.49556195735931396},{"id":"https://openalex.org/C2780586882","wikidata":"https://www.wikidata.org/wiki/Q7520643","display_name":"Simple (philosophy)","level":2,"score":0.4346919059753418},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.42735961079597473},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.41252368688583374},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.28660836815834045},{"id":"https://openalex.org/C132651083","wikidata":"https://www.wikidata.org/wiki/Q7942","display_name":"Climate change","level":2,"score":0.0},{"id":"https://openalex.org/C141452985","wikidata":"https://www.wikidata.org/wiki/Q650994","display_name":"General Circulation Model","level":3,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C111472728","wikidata":"https://www.wikidata.org/wiki/Q9471","display_name":"Epistemology","level":1,"score":0.0},{"id":"https://openalex.org/C18903297","wikidata":"https://www.wikidata.org/wiki/Q7150","display_name":"Ecology","level":1,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0}],"mesh":[],"locations_count":3,"locations":[{"id":"pmh:oai:doaj.org/article:bb430a53d8ea4db39d59572116ca8cce","is_oa":true,"landing_page_url":"https://doaj.org/article/bb430a53d8ea4db39d59572116ca8cce","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"IACR Transactions on Symmetric Cryptology, Pp 240-267 (2017)","raw_type":"article"},{"id":"doi:10.13154/tosc.v2017.i4.240-267","is_oa":true,"landing_page_url":"https://doi.org/10.13154/tosc.v2017.i4.240-267","pdf_url":null,"source":{"id":"https://openalex.org/S7407052971","display_name":"UB Bochum","issn_l":null,"issn":[],"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":null,"raw_source_name":null,"raw_type":"article-journal"},{"id":"mag:2753034791","is_oa":false,"landing_page_url":"https://eprint.iacr.org/2017/708.pdf","pdf_url":null,"source":{"id":"https://openalex.org/S2764847869","display_name":"IACR Cryptology ePrint Archive","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":["https://openalex.org/P4322614454"],"host_organization_lineage_names":["Cryptology ePrint Archive"],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":null,"raw_source_name":"IACR Cryptology ePrint Archive","raw_type":null}],"best_oa_location":{"id":"pmh:oai:doaj.org/article:bb430a53d8ea4db39d59572116ca8cce","is_oa":true,"landing_page_url":"https://doaj.org/article/bb430a53d8ea4db39d59572116ca8cce","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"IACR Transactions on Symmetric Cryptology, Pp 240-267 (2017)","raw_type":"article"},"sustainable_development_goals":[{"score":0.6299999952316284,"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W2093324650","https://openalex.org/W2950869347","https://openalex.org/W1518508482","https://openalex.org/W144684806","https://openalex.org/W1834777415","https://openalex.org/W2350392987","https://openalex.org/W2364574135","https://openalex.org/W1200878570","https://openalex.org/W2392927970","https://openalex.org/W2909954218","https://openalex.org/W2124290125","https://openalex.org/W2122316448","https://openalex.org/W2915402442","https://openalex.org/W2383991243","https://openalex.org/W2379966974","https://openalex.org/W2996391450","https://openalex.org/W2370756542","https://openalex.org/W1975783211","https://openalex.org/W2949442491","https://openalex.org/W2042731718"],"abstract_inverted_index":{"We":[0,47],"make":[1],"a":[2,66],"number":[3],"of":[4,79],"remarks":[5],"about":[6],"the":[7,19,30,35,49,53,58,70,77,80],"AES-GCM-SIV":[8],"nonce-misuse":[9],"resistant":[10],"authenticated":[11],"encryption":[12],"scheme":[13,59,81],"currently":[14],"considered":[15],"for":[16,60],"standardization":[17],"by":[18,57],"Crypto":[20],"Forum":[21],"Research":[22],"Group":[23],"(CFRG).":[24],"First,":[25],"we":[26,64],"point":[27],"out":[28],"that":[29],"security":[31,45,54,78],"analysis":[32],"proposed":[33],"in":[34],"ePrint":[36],"report":[37],"2017/168":[38],"is":[39],"incorrect,":[40],"leading":[41],"to":[42,69],"overly":[43],"optimistic":[44],"claims.":[46],"correct":[48],"bound":[50],"and":[51],"re-assess":[52],"guarantees":[55],"offered":[56],"various":[61],"parameters.":[62],"Second,":[63],"suggest":[65],"simple":[67],"modification":[68],"key":[71],"derivation":[72],"function":[73],"which":[74],"would":[75],"improve":[76],"with":[82],"virtually":[83],"no":[84],"efficiency":[85],"penalty.":[86]},"counts_by_year":[{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":2},{"year":2019,"cited_by_count":4},{"year":2018,"cited_by_count":2},{"year":2017,"cited_by_count":1}],"updated_date":"2026-02-09T09:26:11.010843","created_date":"2025-10-10T00:00:00"}
