{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,29]],"date-time":"2025-10-29T18:36:28Z","timestamp":1761762988392,"version":"3.40.3"},"publisher-location":"Cham","reference-count":28,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319140537"},{"type":"electronic","value":"9783319140544"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-14054-4_1","type":"book-chapter","created":{"date-parts":[[2014,12,10]],"date-time":"2014-12-10T03:39:19Z","timestamp":1418182759000},"page":"1-25","source":"Crossref","is-referenced-by-count":6,"title":["Unpicking PLAID"],"prefix":"10.1007","author":[{"given":"Jean Paul","family":"Degabriele","sequence":"first","affiliation":[]},{"given":"Victoria","family":"Fehr","sequence":"additional","affiliation":[]},{"given":"Marc","family":"Fischlin","sequence":"additional","affiliation":[]},{"given":"Tommaso","family":"Gagliardoni","sequence":"additional","affiliation":[]},{"given":"Felix","family":"G\u00fcnther","sequence":"additional","affiliation":[]},{"given":"Giorgia Azzurra","family":"Marson","sequence":"additional","affiliation":[]},{"given":"Arno","family":"Mittelbach","sequence":"additional","affiliation":[]},{"given":"Kenneth G.","family":"Paterson","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"1_CR1","unstructured":"Standards Australia: AS 5185-2010 Protocol for Lightweight Authentication of IDentity (PLAID). Standards Australia (2010)"},{"key":"1_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"566","DOI":"10.1007\/3-540-45682-1_33","volume-title":"Advances in Cryptology - ASIACRYPT 2001","author":"M. Bellare","year":"2001","unstructured":"Bellare, M., Boldyreva, A., Desai, A., Pointcheval, D.: Key-privacy in public-key encryption. In: Boyd, C. (ed.) ASIACRYPT 2001. LNCS, vol.\u00a02248, pp. 566\u2013582. Springer, Heidelberg (2001)"},{"key":"1_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"139","DOI":"10.1007\/3-540-45539-6_11","volume-title":"Advances in Cryptology - EUROCRYPT 2000","author":"M. Bellare","year":"2000","unstructured":"Bellare, M., Pointcheval, D., Rogaway, P.: Authenticated key exchange secure against dictionary attacks. In: Preneel, B. (ed.) EUROCRYPT 2000. LNCS, vol.\u00a01807, pp. 139\u2013155. Springer, Heidelberg (2000)"},{"key":"1_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"232","DOI":"10.1007\/3-540-48329-2_21","volume-title":"Advances in Cryptology - CRYPTO \u201993","author":"M. Bellare","year":"1994","unstructured":"Bellare, M., Rogaway, P.: Entity authentication and key distribution. In: Stinson, D.R. (ed.) CRYPTO 1993. LNCS, vol.\u00a0773, pp. 232\u2013249. Springer, Heidelberg (1994)"},{"key":"1_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"235","DOI":"10.1007\/978-3-662-44381-1_14","volume-title":"Advances in Cryptology \u2013 CRYPTO 2014","author":"K. Bhargavan","year":"2014","unstructured":"Bhargavan, K., Fournet, C., Kohlweiss, M., Pironti, A., Strub, P.-Y., Zanella-B\u00e9guelin, S.: Proving the TLS Handshake Secure (as it is). In: Garay, J.A., Gennaro, R. (eds.) CRYPTO 2014, Part II. LNCS, vol.\u00a08617, pp. 235\u2013255. Springer, Heidelberg (2014)"},{"key":"1_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/BFb0055716","volume-title":"Advances in Cryptology - CRYPTO \u201998","author":"D. Bleichenbacher","year":"1998","unstructured":"Bleichenbacher, D.: Chosen ciphertext attacks against protocols based on the RSA encryption standard PKCS #1. In: Krawczyk, H. (ed.) CRYPTO 1998. LNCS, vol.\u00a01462, pp. 1\u201312. Springer, Heidelberg (1998)"},{"issue":"4","key":"1_CR7","doi-asserted-by":"publisher","first-page":"267","DOI":"10.1007\/s10207-013-0192-y","volume":"12","author":"C. Brzuska","year":"2013","unstructured":"Brzuska, C., Fischlin, M., Smart, N.P., Warinschi, B., Williams, S.C.: Less is more: relaxed yet composable security notions for key exchange. Int. J. Inf. Sec.\u00a012(4), 267\u2013297 (2013)","journal-title":"Int. J. Inf. Sec."},{"key":"1_CR8","unstructured":"Centrelink: Protocol for Lightweight Authentication of Identity (PLAID) \u2014 Logical Smartcard Implementation Specification PLAID Version 8.0 - Final (December 2009), \n                      http:\/\/www.humanservices.gov.au\/corporate\/publications-and-resources\/plaid\/technical-specification"},{"key":"1_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"345","DOI":"10.1007\/978-3-642-40203-6_20","volume-title":"Computer Security \u2013 ESORICS 2013","author":"\u00d6. Dagdelen","year":"2013","unstructured":"Dagdelen, \u00d6., Fischlin, M., Gagliardoni, T., Marson, G.A., Mittelbach, A., Onete, C.: A cryptographic analysis of OPACITY (extended abstract). In: Crampton, J., Jajodia, S., Mayes, K. (eds.) ESORICS 2013. LNCS, vol.\u00a08134, pp. 345\u2013362. Springer, Heidelberg (2013)"},{"key":"1_CR10","unstructured":"Department of Human Services: Protocol for Lightweight Authentication of Identity, PLAID (2014), \n                      http:\/\/www.humanservices.gov.au\/corporate\/publications-and-resources\/plaid\/"},{"key":"1_CR11","unstructured":"Freedman, G.: Personal communication by e-mail (July 2014)"},{"key":"1_CR12","doi-asserted-by":"crossref","unstructured":"Giesen, F., Kohlar, F., Stebila, D.: On the security of TLS renegotiation. In: Sadeghi, A.R., Gligor, V.D., Yung, M. (eds.) ACM CCS 2013, pp. 387\u2013398. ACM Press (November 2013)","DOI":"10.1145\/2508859.2516694"},{"key":"1_CR13","unstructured":"ISO: Draft International Standard ISO\/IEC DIS 25185-1 Identification cards \u2014 Integrated circuit card authentication protocols \u2014 Part 1: Protocol for Lightweight Authentication of Identity. International Organization for Standardization, Geneva, Switzerland (2013)"},{"key":"1_CR14","unstructured":"ISO: Draft International Standard ISO\/IEC DIS 25185-1.2 Identification cards \u2014 Integrated circuit card authentication protocols \u2014 Part 1: Protocol for Lightweight Authentication of Identity. International Organization for Standardization, Geneva, Switzerland (2014)"},{"key":"1_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"273","DOI":"10.1007\/978-3-642-32009-5_17","volume-title":"Advances in Cryptology \u2013 CRYPTO 2012","author":"T. Jager","year":"2012","unstructured":"Jager, T., Kohlar, F., Sch\u00e4ge, S., Schwenk, J.: On the security of TLS-DHE in the standard model. In: Safavi-Naini, R., Canetti, R. (eds.) CRYPTO 2012. LNCS, vol.\u00a07417, pp. 273\u2013293. Springer, Heidelberg (2012)"},{"key":"1_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"752","DOI":"10.1007\/978-3-642-33167-1_43","volume-title":"Computer Security \u2013 ESORICS 2012","author":"T. Jager","year":"2012","unstructured":"Jager, T., Schinzel, S., Somorovsky, J.: Bleichenbacher\u2019s attack strikes again: Breaking PKCS#1 v1.5 in XML encryption. In: Foresti, S., Yung, M., Martinelli, F. (eds.) ESORICS 2012. LNCS, vol.\u00a07459, pp. 752\u2013769. Springer, Heidelberg (2012)"},{"issue":"2","key":"1_CR17","doi-asserted-by":"publisher","first-page":"50","DOI":"10.1111\/j.1467-9639.1994.tb00688.x","volume":"16","author":"R. Johnson","year":"1994","unstructured":"Johnson, R.: Estimating the size of a population. Teaching Statistics\u00a016(2), 50\u201352 (1994), \n                      http:\/\/www.mcs.sdsmt.edu\/rwjohnso\/html\/tank.pdf","journal-title":"Teaching Statistics"},{"key":"1_CR18","unstructured":"Kiat, K.H., Run, L.Y.: An Analysis of OPACITY and PLAID Protocols for Contactless Smart Cards. Master\u2019s thesis, Naval Postgraduate School, Monterey, CA, USA (September 2012)"},{"key":"1_CR19","unstructured":"Kline, R.: Improving contactless security is goal of emerging PLAID project, secureIDNews (January 2010), \n                      http:\/\/secureidnews.com\/news-item\/improving-contactless-security-is-goal-of-emerging-plaid-project\/"},{"key":"1_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"429","DOI":"10.1007\/978-3-642-40041-4_24","volume-title":"Advances in Cryptology \u2013 CRYPTO 2013","author":"H. Krawczyk","year":"2013","unstructured":"Krawczyk, H., Paterson, K.G., Wee, H.: On the security of the TLS protocol: A systematic analysis. In: Canetti, R., Garay, J.A. (eds.) CRYPTO 2013, Part I. LNCS, vol.\u00a08042, pp. 429\u2013448. Springer, Heidelberg (2013)"},{"key":"1_CR21","unstructured":"Meyer, C., Somorovsky, J., Weiss, E., Schwenk, J.: Revisiting SSL\/TLS Implementations: New Bleichenbacher Side Channels and Attacks. In: 23rd USENIX Security Symposium (USENIX Security 2014). USENIX Association, San Diego (2014), \n                      https:\/\/www.usenix.org\/conference\/usenixsecurity14\/technical-sessions\/presentation\/meyer"},{"key":"1_CR22","unstructured":"National Institute of Standards and Technology: Protocol for Lightweight Authentication of Identity (PLAID) Workshop (July 2009), \n                      http:\/\/csrc.nist.gov\/news_events\/plaid-workshop\/"},{"issue":"1","key":"1_CR23","doi-asserted-by":"publisher","first-page":"31","DOI":"10.3390\/fi3010031","volume":"3","author":"H. Rif\u00e0-Pous","year":"2011","unstructured":"Rif\u00e0-Pous, H., Herrera-Joancomart\u00ed, J.: Computational and energy costs of cryptographic algorithms on handheld devices. Future Internet\u00a03(1), 31\u201348 (2011)","journal-title":"Future Internet"},{"key":"1_CR24","unstructured":"Risky.biz: Risky Business 106 \u2014 Centrelink\u2019s new PLAID auth protocol (May 2009), \n                      http:\/\/risky.biz\/netcasts\/risky-business\/risky-business-106-centrelinks-new-plaid-auth-protocol"},{"key":"1_CR25","unstructured":"Sakurada, H.: Security evaluation of the PLAID protocol using the ProVerif tool (September 2013), \n                      http:\/\/crypto-protocol.nict.go.jp\/data\/eng\/ISOIEC_Protocols\/25185-1\/25185-1_ProVerif.pdf"},{"key":"1_CR26","unstructured":"Taylor, J.: Centrelink ID protocol still in trial phase, zDNet (May 2012), \n                      http:\/\/www.zdnet.com\/centrelink-id-protocol-still-in-trial-phase-1339336953\/"},{"key":"1_CR27","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"534","DOI":"10.1007\/3-540-46035-7_35","volume-title":"Advances in Cryptology - EUROCRYPT 2002","author":"S. Vaudenay","year":"2002","unstructured":"Vaudenay, S.: Security flaws induced by CBC padding - applications to SSL, IPSEC, WTLS ... In: Knudsen, L.R. (ed.) EUROCRYPT 2002. LNCS, vol.\u00a02332, pp. 534\u2013546. Springer, Heidelberg (2002)"},{"key":"1_CR28","unstructured":"Watanabe, D.: Security analysis of PLAID (September 2013), \n                      http:\/\/crypto-protocol.nict.go.jp\/data\/eng\/ISOIEC_Protocols\/25185-1\/25185-1_Scyther.pdf"}],"container-title":["Lecture Notes in Computer Science","Security Standardisation Research"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-14054-4_1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,27]],"date-time":"2023-01-27T17:54:33Z","timestamp":1674842073000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-14054-4_1"}},"subtitle":["A Cryptographic Analysis of an ISO-Standards-Track Authentication Protocol"],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319140537","9783319140544"],"references-count":28,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-14054-4_1","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2014]]}}}