{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,14]],"date-time":"2025-05-14T04:27:17Z","timestamp":1747196837735,"version":"3.40.5"},"publisher-location":"Cham","reference-count":25,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319140537"},{"type":"electronic","value":"9783319140544"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-14054-4_13","type":"book-chapter","created":{"date-parts":[[2014,12,10]],"date-time":"2014-12-10T03:39:19Z","timestamp":1418182759000},"page":"215-235","source":"Crossref","is-referenced-by-count":8,"title":["Improving the ISO\/IEC 11770 Standard for Key Management Techniques"],"prefix":"10.1007","author":[{"given":"Cas","family":"Cremers","sequence":"first","affiliation":[]},{"given":"Marko","family":"Horvat","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"13_CR1","doi-asserted-by":"crossref","unstructured":"Barker, E., Johnson, D., Smid, M.: NIST SP 800-56: Recommendation for pair-wise key establishment schemes using discrete logarithm cryptography (revised) (2007)","DOI":"10.6028\/NIST.SP.800-56ar"},{"key":"13_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"340","DOI":"10.1007\/978-3-642-15497-3_21","volume-title":"Computer Security \u2013 ESORICS 2010","author":"D. Basin","year":"2010","unstructured":"Basin, D., Cremers, C.: Modeling and analyzing security in the presence of compromising adversaries. In: Gritzalis, D., Preneel, B., Theoharidou, M. (eds.) ESORICS 2010. LNCS, vol.\u00a06345, pp. 340\u2013356. Springer, Heidelberg (2010)"},{"key":"13_CR3","doi-asserted-by":"crossref","unstructured":"Basin, D., Cremers, C., Horvat, M.: Actor key compromise: Consequences and countermeasures. In: Proc. of the 27th IEEE Computer Security Foundations Symposium (CSF) (to appear, 2014)","DOI":"10.1109\/CSF.2014.25"},{"issue":"6","key":"13_CR4","doi-asserted-by":"crossref","first-page":"817","DOI":"10.3233\/JCS-130472","volume":"21","author":"D. Basin","year":"2013","unstructured":"Basin, D., Cremers, C., Meier, S.: Provably repairing the ISO\/IEC 9798 standard for entity authentication. Journal of Computer Security\u00a021(6), 817\u2013846 (2013)","journal-title":"Journal of Computer Security"},{"key":"13_CR5","doi-asserted-by":"crossref","unstructured":"Basin, D., Cremers, C., Miyazaki, K., Radomirovic, S., Watanabe, D.: Improving the security of cryptographic protocol standards. IEEE Security & Privacy (2014)","DOI":"10.1109\/MSP.2013.162"},{"key":"13_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"30","DOI":"10.1007\/BFb0024447","volume-title":"Cryptography and Coding","author":"S. Blake-Wilson","year":"1997","unstructured":"Blake-Wilson, S., Johnson, D., Menezes, A.: Key agreement protocols and their security analysis. In: Darnell, M. (ed.) Cryptography and Coding 1997. LNCS, vol.\u00a01355, pp. 30\u201345. Springer, Heidelberg (1997)"},{"key":"13_CR7","doi-asserted-by":"crossref","unstructured":"Blake-Wilson, S., Menezes, A.: Unknown Key-Share Attacks on the Station-to-Station (STS) Protocol (1999)","DOI":"10.1007\/3-540-49162-7_12"},{"key":"13_CR8","doi-asserted-by":"crossref","unstructured":"Boyd, C., Mathuria, A.: Protocols for Authentication and Key Establishment. Information Security and Cryptography. Springer (2003)","DOI":"10.1007\/978-3-662-09527-0"},{"issue":"1","key":"13_CR9","doi-asserted-by":"publisher","first-page":"82","DOI":"10.1504\/IJESDF.2010.032333","volume":"3","author":"L. Chen","year":"2010","unstructured":"Chen, L., Mitchell, C.J.: Parsing ambiguities in authentication and key establishment protocols. Int. J. Electron. Secur. Digit. Forensics\u00a03(1), 82\u201394 (2010)","journal-title":"Int. J. Electron. Secur. Digit. Forensics"},{"issue":"3","key":"13_CR10","first-page":"290","volume":"3","author":"Z. Cheng","year":"2006","unstructured":"Cheng, Z., Comley, R.: Attacks on an ISO\/IEC 11770-2 key establishment protocol. I. J. Network Security\u00a03(3), 290\u2013295 (2006)","journal-title":"I. J. Network Security"},{"key":"13_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"414","DOI":"10.1007\/978-3-540-70545-1_38","volume-title":"Computer Aided Verification","author":"C.J.F. Cremers","year":"2008","unstructured":"Cremers, C.J.F.: The Scyther Tool: Verification, falsification, and analysis of security protocols. In: Gupta, A., Malik, S. (eds.) CAV 2008. LNCS, vol.\u00a05123, pp. 414\u2013418. Springer, Heidelberg (2008), Available for download at http:\/\/www.cs.ox.ac.uk\/people\/cas.cremers\/scyther\/index.html"},{"key":"13_CR12","doi-asserted-by":"crossref","unstructured":"Cremers, C., Feltz, M.: Beyond eCK: Perfect forward secrecy under actor compromise and ephemeral-key reveal. Designs, Codes and Cryptography, 1\u201336 (2013)","DOI":"10.1007\/s10623-013-9852-1"},{"key":"13_CR13","doi-asserted-by":"crossref","unstructured":"Cremers, C., Mauw, S.: Operational Semantics and Verification of Security Protocols. Information Security and Cryptography. Springer (2012)","DOI":"10.1007\/978-3-540-78636-8"},{"key":"13_CR14","doi-asserted-by":"crossref","unstructured":"Dierks, T., Rescorla, E.: The Transport Layer Security (TLS) protocol version 1.2. IETF RFC 5246 (August 2008)","DOI":"10.17487\/rfc5246"},{"key":"13_CR15","unstructured":"European Payments Council. Guidelines on algorithms usage and key management. Technical report, EPC342-08 Version 1.1 (2009)"},{"key":"13_CR16","doi-asserted-by":"publisher","first-page":"354","DOI":"10.1049\/el:19980242","volume":"34","author":"G. Horng","year":"1998","unstructured":"Horng, G., Hsu, C.-K.: Weakness in the Helsinki protocol. Electronics Letters\u00a034, 354\u2013355(1) (1998)","journal-title":"Electronics Letters"},{"key":"13_CR17","unstructured":"International Organization for Standardization, Gen\u00e8ve, Switzerland. ISO\/IEC 9798-2:2008, Information technology \u2013 Security techniques \u2013 Entity Authentication \u2013 Part 2: Mechanisms using symmetric encipherment algorithms, 3rd edn. (2008)"},{"key":"13_CR18","unstructured":"International Organization for Standardization, Gen\u00e8ve, Switzerland. ISO\/IEC 11770-2:2008, Information technology \u2013 Security techniques \u2013 Key Management \u2013 Part 2: Mechanisms using Symmetric Techniques, 2009. Incorporating corrigendum (September 2009)"},{"key":"13_CR19","unstructured":"International Organization for Standardization, Gen\u00e8ve, Switzerland. ISO\/IEC 11770-3:2008, Information technology \u2013 Security techniques \u2013 Key Management \u2013 Part 3: Mechanisms using Asymmetric Techniques, Incorporating corrigendum (September 2009)"},{"key":"13_CR20","doi-asserted-by":"crossref","unstructured":"Krawczyk, H.: HMQV: A high-performance secure Diffie-Hellman protocol. Cryptology ePrint Archive, Report 2005\/176 (2005), http:\/\/eprint.iacr.org\/ (retrieved on June 1, 2014)","DOI":"10.1007\/11535218_33"},{"key":"13_CR21","doi-asserted-by":"publisher","first-page":"119","DOI":"10.1023\/A:1022595222606","volume":"28","author":"L. Law","year":"2003","unstructured":"Law, L., Menezes, A., Qu, M., Solinas, J., Vanstone, S.: An efficient protocol for authenticated key agreement. Designs, Codes and Cryptography\u00a028, 119\u2013134 (2003)","journal-title":"Designs, Codes and Cryptography"},{"key":"13_CR22","doi-asserted-by":"crossref","unstructured":"Lowe, G.: A hierarchy of authentication specifications. In: Proc. 10th IEEE Computer Security Foundations Workshop (CSFW), pp. 31\u201344. IEEE (1997)","DOI":"10.1109\/CSFW.1997.596782"},{"key":"13_CR23","unstructured":"Mathuria, A., Sriram, G.: New attacks on ISO key establishment protocols. IACR Cryptology ePrint Archive, 2008:336 (2008)"},{"issue":"4","key":"13_CR24","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1145\/302350.302356","volume":"32","author":"C.J. Mitchell","year":"1998","unstructured":"Mitchell, C.J., Yeun, C.Y.: Fixing a problem in the Helsinki protocol. SIGOPS Oper. Syst. Rev.\u00a032(4), 21\u201324 (1998)","journal-title":"SIGOPS Oper. Syst. Rev."},{"key":"13_CR25","unstructured":"Schmid, L.: Improving the ISO\/IEC 11770 standard, Bachelor\u2019s thesis, ETH Zurich, Switzerland (2013)"}],"container-title":["Lecture Notes in Computer Science","Security Standardisation Research"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-14054-4_13","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,14]],"date-time":"2025-05-14T00:15:43Z","timestamp":1747181743000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-14054-4_13"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319140537","9783319140544"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-14054-4_13","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2014]]}}}