{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T18:53:57Z","timestamp":1743101637002,"version":"3.40.3"},"publisher-location":"Cham","reference-count":36,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030121426"},{"type":"electronic","value":"9783030121433"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-12143-3_6","type":"book-chapter","created":{"date-parts":[[2019,1,25]],"date-time":"2019-01-25T00:34:45Z","timestamp":1548376485000},"page":"65-79","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["A Certificate-Less Key Exchange Protocol for IoT"],"prefix":"10.1007","author":[{"given":"Ivan Marco Lobe","family":"Kome","sequence":"first","affiliation":[]},{"given":"Nora","family":"Cuppens-Boulahia","sequence":"additional","affiliation":[]},{"given":"Fr\u00e9d\u00e9ric","family":"Cuppens","sequence":"additional","affiliation":[]},{"given":"Vincent","family":"Frey","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,1,25]]},"reference":[{"issue":"6","key":"6_CR1","doi-asserted-by":"publisher","first-page":"644","DOI":"10.1109\/TIT.1976.1055638","volume":"22","author":"W Diffie","year":"1976","unstructured":"Diffie, W., Hellman, M.: New directions in cryptography. IEEE Trans. Inf. Theory 22(6), 644\u2013654 (1976)","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"3","key":"6_CR2","doi-asserted-by":"publisher","first-page":"193","DOI":"10.1007\/s001459900052","volume":"12","author":"NP Smart","year":"1999","unstructured":"Smart, N.P.: The discrete logarithm problem on elliptic curves of trace one. J. Cryptol. 12(3), 193\u2013196 (1999)","journal-title":"J. Cryptol."},{"key":"6_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"182","DOI":"10.1007\/BFb005343","volume-title":"Workshop on the Theory and Application of of Cryptographic Techniques","author":"K Nyberg","year":"1994","unstructured":"Nyberg, K., Rueppel, R.A.: Message recovery for signature schemes based on the discrete logarithm problem. In: De Santis, A. (ed.) Workshop on the Theory and Application of of Cryptographic Techniques. LNCS, pp. 182\u2013193. Springer, Heidelberg (1994). \n                    https:\/\/doi.org\/10.1007\/BFb005343"},{"key":"6_CR4","doi-asserted-by":"crossref","unstructured":"Velvindron, L., Baushke, M.: Increase the secure shell minimum recommended Diffie-Hellman modulus size to 2048 bits (2017)","DOI":"10.17487\/RFC8270"},{"key":"6_CR5","doi-asserted-by":"crossref","unstructured":"Bormann, C., Ersue, M., Keranen, A.: Terminology for constrained-node networks. Technical report (2014)","DOI":"10.17487\/rfc7228"},{"key":"6_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"119","DOI":"10.1007\/978-3-540-28632-5_9","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2004","author":"N Gura","year":"2004","unstructured":"Gura, N., Patel, A., Wander, A., Eberle, H., Shantz, S.C.: Comparing elliptic curve cryptography and RSA on 8-bit CPUs. In: Joye, M., Quisquater, J.-J. (eds.) CHES 2004. LNCS, vol. 3156, pp. 119\u2013132. Springer, Heidelberg (2004). \n                    https:\/\/doi.org\/10.1007\/978-3-540-28632-5_9"},{"key":"6_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"417","DOI":"10.1007\/3-540-39799-X_31","volume-title":"Advances in Cryptology \u2014 CRYPTO \u201985 Proceedings","author":"VS Miller","year":"1986","unstructured":"Miller, V.S.: Use of elliptic curves in cryptography. In: Williams, H.C. (ed.) CRYPTO 1985. LNCS, vol. 218, pp. 417\u2013426. Springer, Heidelberg (1986). \n                    https:\/\/doi.org\/10.1007\/3-540-39799-X_31"},{"issue":"1","key":"6_CR8","first-page":"13","volume":"58","author":"R Gupta","year":"1986","unstructured":"Gupta, R., Murty, M.R.: Primitive points on elliptic curves. Compos. Math. 58(1), 13\u201344 (1986)","journal-title":"Compos. Math."},{"key":"6_CR9","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4612-0909-6","volume-title":"Introduction to Elliptic Curves and Modular Forms","author":"NI Koblitz","year":"2012","unstructured":"Koblitz, N.I.: Introduction to Elliptic Curves and Modular Forms, vol. 97. Springer, Heidelberg (2012). \n                    https:\/\/doi.org\/10.1007\/978-1-4612-0909-6"},{"key":"6_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"48","DOI":"10.1007\/BFb0054851","volume-title":"Algorithmic Number Theory","author":"D Boneh","year":"1998","unstructured":"Boneh, D.: The decision Diffie-Hellman problem. In: Buhler, J.P. (ed.) ANTS 1998. LNCS, vol. 1423, pp. 48\u201363. Springer, Heidelberg (1998). \n                    https:\/\/doi.org\/10.1007\/BFb0054851"},{"issue":"3","key":"6_CR11","doi-asserted-by":"publisher","first-page":"226","DOI":"10.1016\/0097-3165(78)90015-8","volume":"25","author":"P Delsarte","year":"1978","unstructured":"Delsarte, P.: Bilinear forms over a finite field, with applications to coding theory. J. Comb. Theory Ser. A 25(3), 226\u2013241 (1978)","journal-title":"J. Comb. Theory Ser. A"},{"key":"6_CR12","doi-asserted-by":"crossref","unstructured":"Adrian, D., et al.: Imperfect forward secrecy: how Diffie-Hellman fails in practice. In: Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, pp. 5\u201317. ACM (2015)","DOI":"10.1145\/2810103.2813707"},{"key":"6_CR13","series-title":"Lecture Notes in Mathematics","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1007\/BFb0091537","volume-title":"The development of the number field sieve","author":"AK Lenstra","year":"1993","unstructured":"Lenstra, A.K., Lenstra, H.W., Manasse, M.S., Pollard, J.M.: The number field sieve. In: Lenstra, A.K., Lenstra, H.W. (eds.) The development of the number field sieve. LNM, vol. 1554, pp. 11\u201342. Springer, Heidelberg (1993). \n                    https:\/\/doi.org\/10.1007\/BFb0091537"},{"key":"6_CR14","doi-asserted-by":"crossref","unstructured":"Housley, R., Ford, W., Polk, W., Solo, D.: Internet x. 509 public key infrastructure certificate and CRL profile. Technical report (1998)","DOI":"10.17487\/rfc2459"},{"issue":"3","key":"6_CR15","doi-asserted-by":"publisher","first-page":"49","DOI":"10.1109\/MSP.2011.67","volume":"9","author":"R Langner","year":"2011","unstructured":"Langner, R.: Stuxnet: dissecting a cyberwarfare weapon. IEEE Secur. & Priv. 9(3), 49\u201351 (2011)","journal-title":"IEEE Secur. & Priv."},{"key":"6_CR16","unstructured":"Kelley, M.B.: The Stuxnet attack on Irans nuclear plant was far more dangerous than previously thought. Bus. Insid. 20 (2013)"},{"issue":"1","key":"6_CR17","first-page":"1","volume":"16","author":"C Ellison","year":"2000","unstructured":"Ellison, C., Schneier, B.: Ten risks of PKI: What you\u2019re not being told about public key infrastructure. Comput. Secur. J. 16(1), 1\u20137 (2000)","journal-title":"Comput. Secur. J."},{"key":"6_CR18","unstructured":"Nat Sakimura, John Bradley, Mike Jones, Breno de Medeiros, and Chuck Mortimore. Openid connect core 1.0 incorporating errata set 1. The OpenID Foundation, specification, 2014"},{"key":"6_CR19","unstructured":"Hardt, D.: The OAuth 2.0 Authorization Framework. \n                    https:\/\/tools.ietf.org\/html\/rfc6749"},{"key":"6_CR20","unstructured":"Bradley, J., Denniss, W.: OAuth 2.0 for native apps (2017). \n                    https:\/\/tools.ietf.org\/html\/rfc6749"},{"key":"6_CR21","unstructured":"Viehbck, S.: Brute forcing wi-fi protected setup. When poor design meets poor implementation (2011). \n                    https:\/\/code.google.com\/archive\/p\/reaver-wps\/"},{"key":"6_CR22","unstructured":"Murphy, B.F.: Network penetration testing and research (2013)"},{"key":"6_CR23","unstructured":"Lueg, L.: The twilight of wi-fi protected access (2013). \n                    https:\/\/pyrit.wordpress.com\/about\/"},{"key":"6_CR24","unstructured":"Lueg, L.: Pyrit code source (2013). \n                    https:\/\/code.google.com\/archive\/p\/pyrit\/"},{"key":"6_CR25","unstructured":"Espressif Systems. Espressif systems SoCs. \n                    https:\/\/www.espressif.com\/en\/products\/hardware\/socs"},{"key":"6_CR26","unstructured":"Damien George. Micropython. \n                    https:\/\/micropython.org\/"},{"issue":"2","key":"6_CR27","first-page":"99","volume":"69","author":"T Matsumoto","year":"1986","unstructured":"Matsumoto, T., Takashima, Y., Imai, H.: On seeking smart public-key-distribution systems (1976\u20131990). IEICE Trans. 69(2), 99\u2013106 (1986)","journal-title":"IEICE Trans."},{"key":"6_CR28","doi-asserted-by":"crossref","unstructured":"Wang, S., Cao, Z., Strangio, M.A., Wang, L.: Cryptanalysis and improvement of an elliptic curve Diffie-Hellman key agreement protocol. IEEE Commun. Lett. 12(2) (2008)","DOI":"10.1109\/LCOMM.2008.071307"},{"key":"6_CR29","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"546","DOI":"10.1007\/11535218_33","volume-title":"Advances in Cryptology \u2013 CRYPTO 2005","author":"H Krawczyk","year":"2005","unstructured":"Krawczyk, H.: HMQV: a high-performance secure Diffie-Hellman protocol. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol. 3621, pp. 546\u2013566. Springer, Heidelberg (2005). \n                    https:\/\/doi.org\/10.1007\/11535218_33"},{"key":"6_CR30","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"339","DOI":"10.1007\/3-540-48892-8_26","volume-title":"Selected Areas in Cryptography","author":"S Blake-Wilson","year":"1999","unstructured":"Blake-Wilson, S., Menezes, A.: Authenticated Diffe-Hellman key agreement protocols. In: Tavares, S., Meijer, H. (eds.) SAC 1998. LNCS, vol. 1556, pp. 339\u2013361. Springer, Heidelberg (1999). \n                    https:\/\/doi.org\/10.1007\/3-540-48892-8_26"},{"key":"6_CR31","unstructured":"Scott, M.: Authenticated id-based key exchange and remote log-in with simple token and pin number. IACR Cryptology ePrint Archive 2002\/164 (2002)"},{"issue":"13","key":"6_CR32","doi-asserted-by":"publisher","first-page":"630","DOI":"10.1049\/el:20020387","volume":"38","author":"NP Smart","year":"2002","unstructured":"Smart, N.P.: Identity-based authenticated key agreement protocol based on weil pairing. Electron. Lett. 38(13), 630\u2013632 (2002)","journal-title":"Electron. Lett."},{"issue":"8","key":"6_CR33","doi-asserted-by":"publisher","first-page":"653","DOI":"10.1049\/el:20030448","volume":"39","author":"K Shim","year":"2003","unstructured":"Shim, K.: Efficient ID-based authenticated key agreement protocol based on weil pairing. Electron. Lett. 39(8), 653\u2013654 (2003)","journal-title":"Electron. Lett."},{"issue":"4","key":"6_CR34","doi-asserted-by":"publisher","first-page":"213","DOI":"10.1007\/s10207-006-0011-9","volume":"6","author":"L Chen","year":"2007","unstructured":"Chen, L., Cheng, Z., Smart, N.P.: Identity-based key agreement protocols from pairings. Int. J. Inf. Secur. 6(4), 213\u2013241 (2007)","journal-title":"Int. J. Inf. Secur."},{"key":"6_CR35","unstructured":"Shelby, Z., Hartke, K., Bormann, C.: The Constrained Application Protocol (CoAP). \n                    https:\/\/tools.ietf.org\/html\/rfc7252"},{"key":"6_CR36","doi-asserted-by":"crossref","unstructured":"Raza, S., Trabalza, D., Voigt, T.: 6LoWPAN compressed DTLS for CoAP. In: 2012 IEEE 8th International Conference on Distributed Computing in Sensor Systems, pp. 287\u2013289. IEEE (2012)","DOI":"10.1109\/DCOSS.2012.55"}],"container-title":["Lecture Notes in Computer Science","Risks and Security of Internet and Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-12143-3_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,20]],"date-time":"2019-05-20T06:37:04Z","timestamp":1558334224000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-12143-3_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030121426","9783030121433"],"references-count":36,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-12143-3_6","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"25 January 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"CRiSIS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Risks and Security of Internet and Systems","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Arcachon","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"France","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16 October 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18 October 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"crisis2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/crisis2018.labri.fr\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}