{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T23:02:34Z","timestamp":1743116554474,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":15,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540442707"},{"type":"electronic","value":"9783540458111"}],"license":[{"start":{"date-parts":[[2002,1,1]],"date-time":"2002-01-01T00:00:00Z","timestamp":1009843200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2002]]},"DOI":"10.1007\/3-540-45811-5_2","type":"book-chapter","created":{"date-parts":[[2007,10,19]],"date-time":"2007-10-19T09:43:51Z","timestamp":1192787031000},"page":"17-31","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["On the Difficulty of Protecting Private Keys in Software"],"prefix":"10.1007","author":[{"given":"Taekyoung","family":"Kwon","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2002,9,5]]},"reference":[{"key":"2_CR1","unstructured":"M. Bellare and R. Sandhu, \u201cThe security of practical two-party RSA signature schemes,\u201d Manuscript, 2001."},{"key":"2_CR2","doi-asserted-by":"crossref","unstructured":"S. Bellovin and M. Merrit, \u201cEncrypted key exchange: Password-based protocols secure against dictionary attacks,\u201d In Proceedings of the IEEE Symposium on Security and Privacy, pp.72\u201384, 1992.","DOI":"10.1145\/168588.168618"},{"key":"2_CR3","doi-asserted-by":"crossref","unstructured":"S. Brands, Rethinking public key infrastructures and digital certificates, The MIT Press, p.11 and pp.219\u2013224, 2000.","DOI":"10.7551\/mitpress\/5931.001.0001"},{"key":"2_CR4","unstructured":"W. Ford and B. Kaliski, \u201cServer-assisted generation of a strong secret from a password,\u201d In Proceedings of the International Workshops on the Enabling Technologies: Infr astructure for Collaborative Enterprise, IEEE, June 2000"},{"key":"2_CR5","unstructured":"R. Ganesan, \u201cYaksha: Augmenting Kerberos with public key cryptography,\u201d In Proceedings of the ISOC Network and Distributed System Security Symposium, February 1995."},{"issue":"5","key":"2_CR6","doi-asserted-by":"publisher","first-page":"648","DOI":"10.1109\/49.223865","volume":"11","author":"L. Gong","year":"1993","unstructured":"L. Gong, M. Lomas, R. Needham, and J. Saltzer, \u201cProtecting poorly chosen secrets from guessing attacks,\u201d IEEE Journal on Selected Areas in Communications, vol.11, no.5, pp.648\u2013656, June 1993.","journal-title":"IEEE Journal on Selected Areas in Communications"},{"key":"2_CR7","unstructured":"D. Hoover, B. Kausik, \u201cSoftware smart cards via cryptographic camouflage,\u201d In Proceedings of the IEEE Symposium on Security and Privacy, 1999, http:\/\/www.arcot.com ."},{"key":"2_CR8","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"344","DOI":"10.1007\/3-540-45353-9_26","volume-title":"Topics in Cryptology-CT-RSA 2001","author":"D. Jablon","year":"2001","unstructured":"D. Jablon, \u201cPassword authentication using multiple servers,\u201d LNCS 2020: Topics in Cryptology-CT-RSA 2001, Springer Verlag, pp.344\u2013360, 2001."},{"key":"2_CR9","doi-asserted-by":"crossref","unstructured":"T. Kwon, \u201cImpersonation attacks on software-only two-factor authentication schemes,\u201d IEEE Communications Letters, Vol.6, Iss.8, August 2002.","DOI":"10.1109\/LCOMM.2002.802034"},{"key":"2_CR10","unstructured":"P. MacKenzie and M. Reiter, \u201cNetworked cryptographic devices resilient to capture,\u201d In Proceedings of the IEEE Symposium on Security and Privacy, 2001, a full and updated version is DIMACS Technical Report 2001-19, May 2001."},{"issue":"11","key":"2_CR11","doi-asserted-by":"publisher","first-page":"584","DOI":"10.1145\/359168.359172","volume":"22","author":"R. Morris","year":"1979","unstructured":"R. Morris and K. Thompson, \u201cPassword security: a case history,\u201d Communications of the ACM, vol.22, no.11, pp.584\u2013597, 1979.","journal-title":"Communications of the ACM"},{"key":"2_CR12","unstructured":"R. Perlman and C. Kaufman, \u201cSecure password-based protocol for downloading a private key,\u201d In Proceedings of the ISOC Network and Distributed System Security Symposium, February 1999."},{"key":"2_CR13","unstructured":"PKCS #1, \u201cRSA cryptography standard,\u201d RSA Laboratories Technical Note, Version 2.0, 1998."},{"key":"2_CR14","unstructured":"PKCS #5, \u201cPassword-based encryption standard,\u201d RSA Laboratories Technical Note, Version 2.0, 1999."},{"key":"2_CR15","doi-asserted-by":"publisher","first-page":"120","DOI":"10.1145\/359340.359342","volume":"21","author":"R. Rivest","year":"1978","unstructured":"R. Rivest, A. Shamir, and L. Adleman, \u201cA method for obtaining digital signatures and public-key cryptosystems,\u201d Communications of the ACM, vol.21, pp.120\u2013126, 1978.","journal-title":"Communications of the ACM"}],"container-title":["Lecture Notes in Computer Science","Information Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-45811-5_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,5,14]],"date-time":"2023-05-14T12:47:35Z","timestamp":1684068455000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-45811-5_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2002]]},"ISBN":["9783540442707","9783540458111"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/3-540-45811-5_2","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2002]]},"assertion":[{"value":"5 September 2002","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}