{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T12:50:20Z","timestamp":1725454220408},"publisher-location":"New York","reference-count":35,"publisher":"Springer-Verlag","isbn-type":[{"type":"print","value":"0387244859"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/0-387-24486-7_6","type":"book-chapter","created":{"date-parts":[[2005,10,9]],"date-time":"2005-10-09T22:15:45Z","timestamp":1128896145000},"page":"79-95","source":"Crossref","is-referenced-by-count":6,"title":["A Secure Channel Protocol for Multi-Application Smart Cards Based on Public Key Cryptography"],"prefix":"10.1007","author":[{"given":"Konstantinos","family":"Markantonakis","sequence":"first","affiliation":[]},{"given":"Keith","family":"Mayes","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"6_CR1","unstructured":"PC\/SC Workgroup. \u201cSpecifications for PC-ICC Interoperability\u201d. www.smartcardsys.com"},{"key":"6_CR2","unstructured":"OpenCard Consortium. \u201cOpenCard Framework Specification OCF\u201d. www.opencard.org"},{"key":"6_CR3","unstructured":"B. Schneier. \u201cApplied Cryptography\u201d, Second Edition, John Wiley & Sons, 1996."},{"key":"6_CR4","unstructured":"W. Rankl, W. Effing. \u201cSmart Card Handbook\u201d, John Willey and Sons, 1997."},{"key":"6_CR5","volume-title":"Handbook of Applied Cryptography","author":"A. Menezes","year":"1997","unstructured":"A. Menezes, P. van Oorschot, S. Vanstone. \u201cHandbook of Applied Cryptography\u201d, Boca Raton CRC Press, 1997."},{"key":"6_CR6","unstructured":"Global Platform. \u201cOpen Platform Card Specification\u201d, Version 2.1. June 2001. http:\/\/www.globalplatform.org."},{"key":"6_CR7","unstructured":"P.H. Hartel, E.K. de Jong Frz. \u201cSmart Cards And Card Operating Systems\u201d, In J. Bartiett, editor, UNIFORUM' 96, pages 725\u2013730, San-Francisco, California, Feb 1996. Uniforum, Santa Clara, California."},{"key":"6_CR8","unstructured":"C. Markantonakis. \u201cThe Case For A Secure Multi-Application Smart Card Operating System\u201d, Springer-Verlag Lecture Notes in Computer Science Vol. 1396."},{"key":"6_CR9","unstructured":"Javasoft. \u201cJava Card Platform Specifications\u201d, Version 2.2, September 2002. http:\/\/java.sun.com\/products\/javacard\/specs.html"},{"key":"6_CR10","unstructured":"Microsoft. \u201cWindows for Smart Card\u201d. http:\/\/www.microsoft.com\/HWDEV\/TECH\/input\/smartcard\/"},{"key":"6_CR11","unstructured":"MAOSCO. \u201cMULTOS Reference Manual Ver 1.2\u201d. http:\/\/www.multos.com\/"},{"key":"6_CR12","unstructured":"International Organization for Standardization. Gen\u00e8ve, Switzerland. ISO\/IEC 7816-4, Information technology\u2014Identification cards\u2014Integrated circuit(s) cards with contacts\u2014Part 4: Interindustry commands for interchange, 1995."},{"key":"6_CR13","doi-asserted-by":"publisher","first-page":"644","DOI":"10.1109\/TIT.1976.1055638","volume":"22","author":"W. Diffie","year":"1976","unstructured":"W. Diffie, M. Hellman. \u201cNew Directions in Cryptography\u201d, IEEE Transactions on Information Theory, 22:644\u2013654, 1976.","journal-title":"IEEE Transactions on Information Theory"},{"key":"6_CR14","unstructured":"R. Ferreira, R. Malzahn, P. Marissen, J.-J. Quisquater and T. Wille. \u201cFAME: a 3rd generation coprocessor for optimising public key cryptosystems in smart card applications\u201d, Smart Card Research and Advanced Applications \u2014 Cardis '96, Publ. Stichting Mathematisch Centrum, pp. 59\u201372, 1996."},{"key":"6_CR15","unstructured":"T. Boogaerts, \u201cImplementation of elliptic curves cryptosystems for smart cards\u201d, CARDIS 1998, 14\u201316th September 1998."},{"key":"6_CR16","doi-asserted-by":"crossref","first-page":"372","DOI":"10.1007\/10721064_35","volume":"1820","author":"H. Handschuh","year":"2000","unstructured":"H. Handschuh, P. Paillier. &quot;Smart Card Cryptoprocessors for Public Key Cryptography\u201d, In Third Smart Card Research and Advanced Application Conference \u2014 CARDIS'98, Lecture Notes in Computer Science, volume 1820, pages 372\u2013379, Springer-Verlag, 2000.","journal-title":"Third Smart Card Research and Advanced Application Conference \u2014 CARDIS'98"},{"key":"6_CR17","unstructured":"L.C. Guillou, M. Ugon, J.J. Quisquater. \u201cThe Smart Card (A standardised Security Device Dedicated to Public Cryptology)\u201d, in G.J. Simmons, Ed., Contemporary Cryptology: The Science of Information Integrity, ISBN 0879422777."},{"key":"6_CR18","unstructured":"Gemplus. GemXpressoRAD. Gemplus, 2003."},{"key":"6_CR19","unstructured":"Giesecke & Devrient. StarSIM Developer Suite. G&D 2003."},{"key":"6_CR20","unstructured":"J.S. Coron, M. Joye, D. Naccache, P. Paillier. \u201cUniversal padding schemes for RSA\u201d In M. Yung, Ed., Advances in Cryptology-CRYPTO 2002, vol. 2442 of Lecture Notes in Computer Science, pp. 226\u2013241, Springer-Verlag, 2002."},{"key":"6_CR21","unstructured":"J.S. Coron, D. M 'Ra hi, C. Tymen. &quot;Fast generation of pairs (k,[k]P) for Koblitz elliptic curves\u201d In S. Vaudenay and A.M. Youssef, Eds., Selected Areas in Cryptography, vol. 2259 of Lecture Notes in Computer Science, pp. 151\u2013164, Springer-Verlag, 2001."},{"key":"6_CR22","unstructured":"M. Joye, P. Paillier, S. Vaudenay. \u201cEfficient Generation of Prime Numbers\u201d In.K. Ko and C. Paar, Eds., Cryptographic Hardware and Embedded Systems \u2014 CHES 2000, vol. 1965 of Lecture Notes in Computer Science, pp. 340\u2013354, Springer-Verlag, 2000."},{"key":"6_CR23","unstructured":"R. Ferreira, R. Malzahn, P. Marissen, J.J. Quisquater, T. Wille. FAME: A 3rd generation coprocessor for optimising public key cryptosystems in smart card applications, In P. H. Hartel et al., editor(s), Smart Card Research and Advanced Applications \u2014 Cardis '96, pages 59\u201372, Springer-Verlag, 1996."},{"key":"6_CR24","unstructured":"UCL. \u201cA Smarter Chip for Smart cards\u201d. www.dice.ucl.ac.be\/cascade, 1996."},{"key":"6_CR25","first-page":"285","volume":"1820","author":"K. Markantonakis","year":"2000","unstructured":"K. Markantonakis. &quot;Secure Log File Download Mechanisms for Smart Cards&quot;, Third Smart Card Research and Advanced Application Conference (CARDIS'98), September 14\u201316 1998, UCL Louvain-La-Neuve-Belgium, Lecture Notes in Computer Science, volume 1820, pages 285\u2013304, Springer-Verlag, 2000.","journal-title":"Secure Log File Download Mechanisms for Smart Cards"},{"key":"6_CR26","unstructured":"ISO\/IEC 11770-3. \u201cInformation Technology-Security Techniques-Key Management-Part 3: Mechanisms using asymmetric techniques\u201d, ISO 1999."},{"key":"6_CR27","unstructured":"L.G. Wang. \u201cSmart Visa and Java Technology\u201d, June 04, 2001. http:\/\/java.sun.com\/features\/2001\/06\/visa.html"},{"key":"6_CR28","unstructured":"3GPP. \u201cGSM 03.48 Digital Cellular Telecommunications System, SIM Toolkit Secure Messaging\u201d.http:\/\/www.3gpp.org\/ftp\/tsg_cn\/WG4_protocollars\/Temp\/SMG%2323\/TDocs\/P-97-790.pdf"},{"key":"6_CR29","unstructured":"ISO\/1EC 11770-1. \u201cInformation Technology-Security Techniques-Key Management-Part 1: Framework\u201d, 1996."},{"key":"6_CR30","unstructured":"ITU-T X.509. \u201cThe Directory \u2014 Public key and Attribute Certificate Frameworks\u201d."},{"key":"6_CR31","unstructured":"H. Handschuh, P. Paillier. \u201cSmart Card Crypto-Coprocessors for Public-Key Cryptography\u201d, The Technical Newsletter RSA Laboratories, Vol 1, Number 1, Summer 1998."},{"key":"6_CR32","unstructured":"K. Markantonakis. &quot;Is the Performance of the Cryptographic Functions the Real Bottleneck?\", IFIP TC11 16th International Conference on Information Security (IFIP\/SEC'0l), June 11\u201313, 2001, Paris, France, In \"Trusted Information: The New Decade Challenge\", Kluwer Academic Publishers, ISBN 0-7923-7389-8, pages 77\u201392."},{"key":"6_CR33","doi-asserted-by":"crossref","unstructured":"C. Boyd, A. Mathuria, \u201cProtocols For Authentication and Key Establishment\u201d, Springer Verlag in Information Security and Cryptography, June 15, 2003.","DOI":"10.1007\/978-3-662-09527-0"},{"key":"6_CR34","unstructured":"\u201cISO\/IEC 9798-1. Information Technology \u2014 Security Techniques \u2014 Entity Authentication \u2014 Part 1: General\u201d, 1997."},{"key":"6_CR35","unstructured":"D.R Stinson, \u201cCryptography: Theory and Practice\u201d, CRC Press 1995."}],"container-title":["IFIP \u2014 The International Federation for Information Processing","Communications and Multimedia Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/0-387-24486-7_6.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,17]],"date-time":"2020-11-17T19:58:38Z","timestamp":1605643118000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/0-387-24486-7_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["0387244859"],"references-count":35,"URL":"https:\/\/doi.org\/10.1007\/0-387-24486-7_6","relation":{},"subject":[]}}