{"id":"https://openalex.org/W1487818404","doi":"https://doi.org/10.1002/sec.733","title":"Critical analysis of counter mode with cipher block chain message authentication mode protocol\u2014CCMP","display_name":"Critical analysis of counter mode with cipher block chain message authentication mode protocol\u2014CCMP","publication_year":2013,"publication_date":"2013-03-22","ids":{"openalex":"https://openalex.org/W1487818404","doi":"https://doi.org/10.1002/sec.733","mag":"1487818404"},"language":"en","primary_location":{"is_oa":false,"landing_page_url":"https://doi.org/10.1002/sec.733","pdf_url":null,"source":{"id":"https://openalex.org/S120683614","display_name":"Security and Communication Networks","issn_l":"1939-0122","issn":["1939-0122","1939-0114"],"is_oa":true,"is_in_doaj":false,"is_indexed_in_scopus":false,"is_core":true,"host_organization":"https://openalex.org/P4310319869","host_organization_name":"Hindawi Publishing Corporation","host_organization_lineage":["https://openalex.org/P4310319869"],"host_organization_lineage_names":["Hindawi Publishing Corporation"],"type":"journal"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},"type":"article","type_crossref":"journal-article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5054625832","display_name":"Idris Ahmed","orcid":null},"institutions":[{"id":"https://openalex.org/I151939572","display_name":"Athlone Institute of Technology","ror":"https://ror.org/02dyxwz31","country_code":"IE","type":"funder","lineage":["https://openalex.org/I151939572"]}],"countries":["IE"],"is_corresponding":false,"raw_author_name":"Idris Ahmed","raw_affiliation_strings":["Software Research Institute Athlone Institute of Technology Dublin Road Athlone Ireland"],"affiliations":[{"raw_affiliation_string":"Software Research Institute Athlone Institute of Technology Dublin Road Athlone Ireland","institution_ids":["https://openalex.org/I151939572"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5082060220","display_name":"Anne James","orcid":"https://orcid.org/0000-0001-9274-7803"},"institutions":[{"id":"https://openalex.org/I73417466","display_name":"Coventry University","ror":"https://ror.org/01tgmhj36","country_code":"GB","type":"funder","lineage":["https://openalex.org/I73417466"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Anne James","raw_affiliation_strings":["Faculty of Engineering and Computing Coventry University Coventry CV1 5FB U.K."],"affiliations":[{"raw_affiliation_string":"Faculty of Engineering and Computing Coventry University Coventry CV1 5FB U.K.","institution_ids":["https://openalex.org/I73417466"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5057407138","display_name":"Dhananjay Singh","orcid":"https://orcid.org/0000-0003-3822-9348"},"institutions":[{"id":"https://openalex.org/I83436808","display_name":"Hankuk University of Foreign Studies","ror":"https://ror.org/051q2m369","country_code":"KR","type":"funder","lineage":["https://openalex.org/I83436808"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Dhananjay Singh","raw_affiliation_strings":["Department of Electronics Engineering Hankuk University of Foreign Studies 89, Wangsan\u2010ri, Mohyeon\u2010myeon Cheoin\u2010gu, Yongin\u2010si Gyeonggi\u2010do 449\u2010791 South Korea"],"affiliations":[{"raw_affiliation_string":"Department of Electronics Engineering Hankuk University of Foreign Studies 89, Wangsan\u2010ri, Mohyeon\u2010myeon Cheoin\u2010gu, Yongin\u2010si Gyeonggi\u2010do 449\u2010791 South Korea","institution_ids":["https://openalex.org/I83436808"]}]}],"institution_assertions":[],"countries_distinct_count":3,"institutions_distinct_count":3,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":{"value":2100,"currency":"USD","value_usd":2100},"apc_paid":null,"fwci":0.756,"has_fulltext":true,"fulltext_origin":"ngrams","cited_by_count":10,"citation_normalized_percentile":{"value":0.836008,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":85,"max":86},"biblio":{"volume":"7","issue":"2","first_page":"293","last_page":"308"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11130","display_name":"Coding theory and cryptography","score":0.9994,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9993,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/authenticated-encryption","display_name":"Authenticated Encryption","score":0.59807837},{"id":"https://openalex.org/keywords/mode","display_name":"Mode (computer interface)","score":0.57513386},{"id":"https://openalex.org/keywords/random-oracle","display_name":"Random oracle","score":0.41062197}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.71106267},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.6740092},{"id":"https://openalex.org/C60448319","wikidata":"https://www.wikidata.org/wiki/Q154021","display_name":"Block cipher mode of operation","level":2,"score":0.64112836},{"id":"https://openalex.org/C106544461","wikidata":"https://www.wikidata.org/wiki/Q543151","display_name":"Block cipher","level":3,"score":0.59830236},{"id":"https://openalex.org/C128619300","wikidata":"https://www.wikidata.org/wiki/Q15263584","display_name":"Authenticated encryption","level":3,"score":0.59807837},{"id":"https://openalex.org/C48677424","wikidata":"https://www.wikidata.org/wiki/Q6888088","display_name":"Mode (computer interface)","level":2,"score":0.57513386},{"id":"https://openalex.org/C55166926","wikidata":"https://www.wikidata.org/wiki/Q2892946","display_name":"Oracle","level":2,"score":0.5570736},{"id":"https://openalex.org/C94520183","wikidata":"https://www.wikidata.org/wiki/Q190746","display_name":"Advanced Encryption Standard","level":3,"score":0.55703735},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.4980862},{"id":"https://openalex.org/C94284585","wikidata":"https://www.wikidata.org/wiki/Q228184","display_name":"Random oracle","level":4,"score":0.41062197},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.3296705},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.21920168},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.09753388},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.08518502},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"is_oa":false,"landing_page_url":"https://doi.org/10.1002/sec.733","pdf_url":null,"source":{"id":"https://openalex.org/S120683614","display_name":"Security and Communication Networks","issn_l":"1939-0122","issn":["1939-0122","1939-0114"],"is_oa":true,"is_in_doaj":false,"is_indexed_in_scopus":false,"is_core":true,"host_organization":"https://openalex.org/P4310319869","host_organization_name":"Hindawi Publishing Corporation","host_organization_lineage":["https://openalex.org/P4310319869"],"host_organization_lineage_names":["Hindawi Publishing Corporation"],"type":"journal"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false}],"best_oa_location":null,"sustainable_development_goals":[],"grants":[],"datasets":[],"versions":[],"referenced_works_count":23,"referenced_works":["https://openalex.org/W124625691","https://openalex.org/W13103650","https://openalex.org/W1578627459","https://openalex.org/W1596153847","https://openalex.org/W1649758727","https://openalex.org/W1802259427","https://openalex.org/W1996182770","https://openalex.org/W2032798087","https://openalex.org/W2062003350","https://openalex.org/W2072234079","https://openalex.org/W2103687166","https://openalex.org/W2109068395","https://openalex.org/W2112006428","https://openalex.org/W2133065964","https://openalex.org/W2134079148","https://openalex.org/W2145227448","https://openalex.org/W2145994227","https://openalex.org/W2165214731","https://openalex.org/W2167569963","https://openalex.org/W2171795845","https://openalex.org/W2267202467","https://openalex.org/W4241299894","https://openalex.org/W4285719527"],"related_works":["https://openalex.org/W612677566","https://openalex.org/W4253338219","https://openalex.org/W3082110959","https://openalex.org/W3031390999","https://openalex.org/W2766321958","https://openalex.org/W2698153239","https://openalex.org/W2522069694","https://openalex.org/W2405883016","https://openalex.org/W2125214861","https://openalex.org/W2059218952"],"abstract_inverted_index":{"ABSTRACT":[0],"CCM/CCMP":[1,29,35,52,91],"is":[2,12,22,30,36,53,58,74],"a":[3,32,75],"two\u2010cycle":[4],"authenticate":[5],"and":[6,18,27,45,96,122,136,147,156,163,166,170],"encrypt":[7],"(AE)":[8],"mode.":[9,67],"One":[10],"cycle":[11,21],"used":[13,23,167],"to":[14,24,83,103,174],"perform":[15],"confidentiality":[16],"computations,":[17],"the":[19,90,105,116,143,152,157,179],"second":[20],"compute":[25],"authenticity":[26],"integrity.":[28],"also":[31,108,131],"generic":[33],"composition.":[34],"actually":[37],"made":[38],"up":[39],"of":[40,89],"two":[41],"separate":[42],"modes,":[43],"CBC\u2010MAC":[44,95],"AES":[46,97],"counter":[47,98,154],"mode":[48,81,99],"amalgamated":[49,102],"together.":[50],"Although":[51],"an":[54,60,79,85],"AE":[55,80,146],"mode,":[56,155],"it":[57,73],"not":[59,82],"authenticated":[61],"encryption":[62,158],"with":[63,160],"associated":[64],"data":[65],"(AEAD)":[66],"Previous":[68,87],"research":[69,140],"has":[70,126,132],"suggested":[71],"that":[72,94,110],"major":[76,134,145],"deficiency":[77],"for":[78],"be":[84],"AEAD.":[86],"critiques":[88],"have":[92],"shown":[93],"were":[100],"poorly":[101],"create":[104],"CCM/CCMP.":[106,180],"They":[107],"showed":[109],"CCMP,":[111],"which":[112],"was":[113],"ratified":[114],"by":[115],"IEEE":[117],"802.11i":[118],"workgroup":[119],"in":[120,124,178],"2003":[121],"implemented":[123],"WPA2,":[125],"some":[127,133],"security":[128],"issues.":[129,138],"It":[130],"efficiency":[135],"complexity":[137],"This":[139],"work":[141],"reviewed":[142],"current":[144],"AEAD":[148],"modes":[149],"such":[150],"as":[151],"Galois":[153],"system":[159],"keyed":[161],"integrity":[162],"managed":[164],"oracle":[165],"critical":[168],"analysis":[169,172],"statistical":[171],"approaches":[173],"identify":[175],"more":[176],"deficiencies":[177],"Copyright":[181],"\u00a9":[182],"2013":[183],"John":[184],"Wiley":[185],"&":[186],"Sons,":[187],"Ltd.":[188]},"abstract_inverted_index_v3":null,"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W1487818404","counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":1},{"year":2020,"cited_by_count":4},{"year":2019,"cited_by_count":1},{"year":2018,"cited_by_count":1},{"year":2015,"cited_by_count":2}],"updated_date":"2025-02-22T20:33:15.336134","created_date":"2016-06-24"}