{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,6]],"date-time":"2026-05-06T16:08:49Z","timestamp":1778083729528,"version":"3.51.4"},"publisher-location":"New York, NY","reference-count":25,"publisher":"Springer New York","isbn-type":[{"value":"9781461479147","type":"print"},{"value":"9781461479154","type":"electronic"}],"license":[{"start":{"date-parts":[[2013,9,13]],"date-time":"2013-09-13T00:00:00Z","timestamp":1379030400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2013,9,13]],"date-time":"2013-09-13T00:00:00Z","timestamp":1379030400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-1-4614-7915-4_17","type":"book-chapter","created":{"date-parts":[[2013,9,12]],"date-time":"2013-09-12T08:10:18Z","timestamp":1378973418000},"page":"383-405","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":20,"title":["Hardware Security Modules"],"prefix":"10.1007","author":[{"given":"Stathis","family":"Mavrovouniotis","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Mick","family":"Ganley","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2013,9,13]]},"reference":[{"key":"17_CR1","unstructured":"\u201cPayment card industry PIN Security Requirements\u201d, version 1.0, September 2011."},{"key":"17_CR2","unstructured":"ISO 9564\u20131, \u201cFinancial services - Personal Identification Number (PIN) management and security - Part 1: Basic principles and requirements for PINs in card-based systems\u201d, 2011."},{"key":"17_CR3","unstructured":"ISO 9797\u20131, \u201cInformation technology - Security techniques - Message Authentication Codes (MACs) - Part 1: Mechanisms using a block cipher\u201d, 2011."},{"key":"17_CR4","unstructured":"ANSI X9.24-1, \u201cRetail Financial Services Symmetric Key management, Part 1: Using Symmetric Techniques\u201d, 2009."},{"key":"17_CR5","unstructured":"ISO 13491\u20131, \u201cBanking - Secure cryptographic devices (retail), Part 1: Concepts, requirements and evaluation methods\u201d, 2007."},{"key":"17_CR6","unstructured":"ISO 13491\u20132, \u201cBanking - Secure cryptographic devices (retail), Part 2: Security compliance checklists for devices used in financial transactions\u201d, 2005."},{"key":"17_CR7","unstructured":"FIPS 140\u20132, \u201cSecurity Requirements for Cryptographic Modules\u201d, 2001, with some updates in December 2002."},{"key":"17_CR8","unstructured":"\u201cCommon Criteria for Information Technology Security Evaluation\u201d, see http:\/\/www.commoncriteriaportal.org\/."},{"key":"17_CR9","unstructured":"\u201cPayment card industry (PCI) Hardware Security Module (HSM) Security Requirements\u201d, version 1.0, April 2009."},{"key":"17_CR10","unstructured":"http:\/\/csrc.nist.gov\/groups\/STM\/cmvp\/documents\/140-1\/140val-all.htm."},{"key":"17_CR11","unstructured":"https:\/\/www.PCIsecuritystandards.org\/approved_companies_providers\/approved_pin_transaction_security.php."},{"key":"17_CR12","unstructured":"\u201cPayment card industry (PCI): POS PIN Entry Device, Security Requirements\u201d, version 2.1, January 2009."},{"key":"17_CR13","unstructured":"\u201cPIN Security Program: Auditor\u2019s Guide\", version 2, January 2008, see http:\/\/usa.visa.com\/download\/merchants\/visa_pin_security_program_auditors_guide.pdf."},{"key":"17_CR14","unstructured":"ANSI X9.17, \u201cFinancial institution key management (wholesale)\u201d, 1985."},{"key":"17_CR15","unstructured":"ANSI X9 TR-31, \u201cInteroperable Secure Key Exchange Key Block Specification for Symmetric Algorithms\u201d, 2010."},{"key":"17_CR16","doi-asserted-by":"crossref","unstructured":"M. Bartolozzo, R. Focardi, M. Centenaro & G. Steel, \u201cAttacking and Fixing PKCS#11 Security Tokens\u201d, ACM Conference on Computer and Communications, Security, 2010, pp. 260\u2013269.","DOI":"10.1145\/1866307.1866337"},{"key":"17_CR17","unstructured":"PKCS#11, \u201cCryptographic Token Interface Standard\u201d, version 2.20, RSA Laboratories, June 2004."},{"key":"17_CR18","doi-asserted-by":"crossref","unstructured":"R. Anderson, \u201cWhy cryptosystems fail\u201d, Proceedings of the 1993 ACM Conference in Computer and Communications Security, pp. 215\u2013227. See also, http:\/\/www.cl.cam.ac.uk\/users\/rja14\/wcf.html.","DOI":"10.1145\/168588.168615"},{"key":"17_CR19","unstructured":"R. Anderson, \u201cSecurity Engineering\u201d, (2nd Edition), Wiley, 2008."},{"key":"17_CR20","unstructured":"J. Clulow, \u201cThe Design and Analysis of Cryptographic Application Programming Interfaces for Security Devices\u201d, version 4.0, M.Sc. Thesis at University of Natal, Durban, South Africa, dated 17 January 2003."},{"key":"17_CR21","unstructured":"Y. Desmedt, F. Hoornaert & J.J. Quisquater, \u201cSeveral Exhaustive Key Search Machines and DES\u201d, EUROCRYPT 86, 1986, pp 17\u201319."},{"key":"17_CR22","unstructured":"R. Clayton & M. Bond, \u201cExperience Using a Low-Cost FPGA Design to Crack DES Keys\u201d, presented at the CHES 2002 Workshop Francisco, 1st August. (http:\/\/www.cl.cam.ac.uk\/rnc1\/descrack\/DEScracker.pdf)."},{"key":"17_CR23","unstructured":"M. Bond & P. Zieli\u0144ski, \u201cDecimalisation Table Attacks for PIN Cracking\u201d, University of Cambridge Computer Laboratory, Technical Report 560, dated February 2003. (http:\/\/www.cl.cam.ac.uk\/TechReports\/UCAM-CL-TR-560.pdf)."},{"key":"17_CR24","unstructured":"R. Anderson & M. Bond, \u201cProtocol Analysis, Composability and Computation\u201d; see http:\/\/www.cl.cam.ac.uk\/rja14\/Papers\/bond-anderson.pdf."},{"key":"17_CR25","unstructured":"Joint USSS\/FBI Advisory February 2009, see http:\/\/usa.visa.com\/download\/merchants\/20090212-usss_fbi_advisory.pdf."}],"container-title":["Secure Smart Embedded Devices, Platforms and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-1-4614-7915-4_17","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,7]],"date-time":"2023-02-07T17:16:42Z","timestamp":1675790202000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-1-4614-7915-4_17"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,9,13]]},"ISBN":["9781461479147","9781461479154"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/978-1-4614-7915-4_17","relation":{},"subject":[],"published":{"date-parts":[[2013,9,13]]},"assertion":[{"value":"13 September 2013","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}