{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T10:19:02Z","timestamp":1743070742266,"version":"3.40.3"},"publisher-location":"New York, NY","reference-count":33,"publisher":"Springer New York","isbn-type":[{"type":"print","value":"9781461479147"},{"type":"electronic","value":"9781461479154"}],"license":[{"start":{"date-parts":[[2013,9,13]],"date-time":"2013-09-13T00:00:00Z","timestamp":1379030400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2013,9,13]],"date-time":"2013-09-13T00:00:00Z","timestamp":1379030400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-1-4614-7915-4_6","type":"book-chapter","created":{"date-parts":[[2013,9,12]],"date-time":"2013-09-12T08:10:18Z","timestamp":1378973418000},"page":"119-144","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Information Security Best Practices"],"prefix":"10.1007","author":[{"given":"Keith","family":"Mayes","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Konstantinos","family":"Markantonakis","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2013,9,13]]},"reference":[{"key":"6_CR1","unstructured":"Hacking at Random, [Online Available] http:\/\/www.wiki.har2009.org\/page\/Main_Page"},{"key":"6_CR2","unstructured":"Hack a Day site, [Online Available] http:\/\/hackaday.com\/"},{"key":"6_CR3","doi-asserted-by":"crossref","unstructured":"K. Mayes, K. Markantonakis, \u201cSmart Cards, Tokens, Security and Applications\u201d, Springer Verlag, 2007","DOI":"10.1007\/978-0-387-72198-9"},{"key":"6_CR4","unstructured":"Federal Information processing Standards, Data Encryption Standard (DES), FIPS publication 46\u20133 [Online Available] http:\/\/csrc.nist.gov\/publications\/fips\/fips46-3\/fips46-3.pdf"},{"key":"6_CR5","unstructured":"Federal Information processing Standards, Advanced Encryption Standard (AES), FIPS publication 197. [Online Available] http:\/\/csrc.nist.gov\/publications\/fips\/fips197\/fips-197.pdf"},{"key":"6_CR6","doi-asserted-by":"crossref","unstructured":"Rivest, R.; A. Shamir; L. Adleman (1978). \u201cMethod for Obtaining Digital Signatures and Public-Key Cryptosystems\u201d. Communications of the ACM 21 (2): 120\u2013126.","DOI":"10.1145\/359340.359342"},{"key":"6_CR7","unstructured":"Jan Petzl (2006), \u201cCryptanalysis with a low cost FPGA Cluster\u201d, IPAM Workshop Special Purpose Hardware for Cryptography [Online Available] http:\/\/www.copacobana.org\/paper\/IPAM2006_slides.pdf"},{"key":"6_CR8","unstructured":"SP 800-57 Recommendation for Key Management - Part 1: General, and Part 2: Best Practices for Key Management Organizations, NIST, March 2007"},{"key":"6_CR9","unstructured":"SP 800-131, Recommendations for the Transitioning of Cryptographic Algorithms and Key Lengths. NIST, drafted June 2010"},{"key":"6_CR10","unstructured":"ECRYPT II Yearly Report on Algorithms and key-sizes (2009\u20132010), Revision 1.0, ECRYPT II, 30th March 2010"},{"issue":"6","key":"6_CR11","doi-asserted-by":"crossref","first-page":"74","DOI":"10.1109\/C-M.1977.217750","volume":"10","author":"Whitfield Diffie","year":"1977","unstructured":"Diffie, Whitfield; Hellman, Martin E. (June 1977). \u201cExhaustive Cryptanalysis of the NBS Data Encryption Standard\u201d. Computer 10 (6): 74\u201384","journal-title":"Computer"},{"key":"6_CR12","doi-asserted-by":"crossref","unstructured":"Ralph Merkle, Martin Hellman: On the Security of Multiple Encryption (PDF), Communications of the ACM, Vol 24, No 7, pp 465\u2013467, July 1981","DOI":"10.1145\/358699.358718"},{"key":"6_CR13","doi-asserted-by":"crossref","unstructured":"Paul van Oorschot, Michael J. Wiener, A known-plaintext attack on two-key triple encryption (PDF), EUROCRYPT\u201990, LNCS 473, 1990, pp 318\u2013325","DOI":"10.1007\/3-540-46877-3_29"},{"key":"6_CR14","unstructured":"Auguste Kerckhoffs, \u201cLa cryptographie militaire\u201d, Journal des sciences militaires, vol. IX, pp. 5\u201383, Jan. 1883, pp. 161\u2013191, Feb. 1883"},{"key":"6_CR15","doi-asserted-by":"crossref","unstructured":"P. Kocher, J. Jaffe, B. Jun, \u201cDifferential Power Analysis\u201d, technical report, 1998; later published in Advances in Cryptology - Crypto 99 Proceedings, Lecture Notes In Computer Science Vol. 1666, M. Wiener, ed., Springer-Verlag, 1999","DOI":"10.1007\/3-540-48405-1_25"},{"key":"6_CR16","unstructured":"Crypto++, Benchmarks, [Online Available] http:\/\/www.cryptopp.com\/benchmarks-p4.html, April 2011"},{"key":"6_CR17","doi-asserted-by":"crossref","unstructured":"M. Bellare, P. Rogaway. Optimal Asymmetric Encryption - How to encrypt with RSA. Extended abstract in Advances in Cryptology - Eurocrypt\u201994 Proceedings, Lecture Notes in Computer Science Vol. 950, A. De Santis ed, Springer-Verlag, 1995","DOI":"10.1007\/BFb0053428"},{"key":"6_CR18","unstructured":"Birthday attack, [Online Available] http:\/\/en.wikipedia.org\/wiki\/Birthday_attack"},{"key":"6_CR19","unstructured":"FIPS 180\u20132: Secure Hash Standard (SHS) (PDF,) - Current version of the Secure Hash Standard (SHA-1, SHA-224, SHA-256, SHA-384, and SHA-512), 1 August 2002, amended 25 February 2004."},{"key":"6_CR20","unstructured":"rfc2104, [Online Available] http:\/\/tools.ietf.org\/html\/rfc2104"},{"key":"6_CR21","unstructured":"NIST SP 800\u201390. Recommendation for Random Number Generation, March 2007."},{"key":"6_CR22","unstructured":"EMV Books 1\u20134 Version 4.1 2004, [Online Available] http:\/\/www.emvco.com\/specifications"},{"key":"6_CR23","unstructured":"GlobalPlatform, [Online Available] http:\/\/www.globalplatform.org."},{"key":"6_CR24","unstructured":"NFC Forum http:\/\/www.nfc-forum.org"},{"key":"6_CR25","unstructured":"Common Criteria Portal [Online Available] http:\/\/www.commoncriteriaportal.org\/"},{"key":"6_CR26","unstructured":"Nohl K, Starbug, Plotz H. MIFARE, little security, despite obscurity. Presentation on the 24th Congress of the Chaos Computer Club (CCC); December 2007"},{"key":"6_CR27","unstructured":"Courtois NT, Nohl K, O\u2019Neil S. Algebraic attacks on the crypto-1 stream cipher in MIFARE Classic and oyster cards, vol. 166. Cryptology ePrint Archive, [Online Available] http:\/\/eprint.iacr.org\/2008\/166; 2008. Report."},{"key":"6_CR28","doi-asserted-by":"crossref","unstructured":"Gans GK, Hoepman JH, Garcia FD. A practical attack on the MIFARE Classic. Proceedings of the 8th Smart Card Research and Advanced Application Workshop (CARDIS 2008). LNCS 5189, pp. 267\u2013282. Heidelberg: Springer; 2008.","DOI":"10.1007\/978-3-540-85893-5_20"},{"key":"6_CR29","doi-asserted-by":"crossref","unstructured":"Garcia FD, Gans GK, Muijrers R, Rossum P, Verdult R, Schreur RW, et al. Dismantling MIFARE Classic. Proceedings of ESORICS 2008, LNCS 5283. Springer; 2008. pp. 97\u2013114.","DOI":"10.1007\/978-3-540-88313-5_7"},{"key":"6_CR30","unstructured":"OV-Chipkaart System, [Online Available] http:\/\/www.ov-chipkaart.nl\/"},{"key":"6_CR31","unstructured":"Dutch News Public transport smart card fraud under investigation 6th July 2011 [Online Available] http:\/\/www.dutchnews.nl\/news\/archives\/2011\/07\/public_transport_smart_card_fr.php"},{"key":"6_CR32","unstructured":"M. Hilbert and P. Lopez, \u201cThe world\u2019s technological capacity to store, communicate and compute information\u201d, Science Express: Feb. 10, 2011. [Online Available] http:\/\/www.physorg.com\/news\/2011-02-world-scientists-total-technological-capacity.html"},{"key":"6_CR33","unstructured":"[Online Available] http:\/\/en.wikipedia.org\/wiki\/Block_cipher_modes_of_operation"}],"container-title":["Secure Smart Embedded Devices, Platforms and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-1-4614-7915-4_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,14]],"date-time":"2023-02-14T02:15:23Z","timestamp":1676340923000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-1-4614-7915-4_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,9,13]]},"ISBN":["9781461479147","9781461479154"],"references-count":33,"URL":"https:\/\/doi.org\/10.1007\/978-1-4614-7915-4_6","relation":{},"subject":[],"published":{"date-parts":[[2013,9,13]]},"assertion":[{"value":"13 September 2013","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}