{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,6]],"date-time":"2025-11-06T00:57:40Z","timestamp":1762390660905,"version":"3.40.3"},"publisher-location":"Cham","reference-count":26,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319240176"},{"type":"electronic","value":"9783319240183"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-24018-3_17","type":"book-chapter","created":{"date-parts":[[2015,8,21]],"date-time":"2015-08-21T07:32:50Z","timestamp":1440142370000},"page":"260-270","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Lightweight Password Hashing Scheme for Embedded Systems"],"prefix":"10.1007","author":[{"given":"George","family":"Hatzivasilis","sequence":"first","affiliation":[]},{"given":"Ioannis","family":"Papaefstathiou","sequence":"additional","affiliation":[]},{"given":"Charalampos","family":"Manifavas","sequence":"additional","affiliation":[]},{"given":"Ioannis","family":"Askoxylakis","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,10,24]]},"reference":[{"doi-asserted-by":"crossref","unstructured":"Kaliski, B.: RSA Laboratories: RFC 2898 - PKCS #5: Password-Based Cryptography Specification Version 2.0. Technical report, IETF, 2000 (2000)","key":"17_CR1","DOI":"10.17487\/rfc2898"},{"unstructured":"Provos, N., Mazires, D.: A Future-Adaptable Password Scheme. In: USENIX Annual Technical Conference, pp. 81\u201392 (1999)","key":"17_CR2"},{"unstructured":"Percival, C.: Stronger Key Derivation via Sequential Memory-Hard Functions. presented at BSDCan2009 (May 2009)","key":"17_CR3"},{"doi-asserted-by":"crossref","unstructured":"Orman, H: Twelve Random Characters: Passwords in the Era of Massive Parallelism. IEEE Internet Computing 17(5), 91\u201394 (2013)","key":"17_CR4","DOI":"10.1109\/MIC.2013.103"},{"unstructured":"Forler, C., Lucks, S., Wenzel, J.: Catena: A memory-consuming password scrambler, Cryptology ePrint Archive, Report 2013\/525 (2013)","key":"17_CR5"},{"unstructured":"Forler, C., Lucks, S., Wenzel, J.: The Catena Password Scrambler, PHC submission (May 15, 2014)","key":"17_CR6"},{"unstructured":"Hatzivasilis, G., Papaefstathiou, I., Manifavas, C.: Password Hashing Competition - Survey and Benchmark, Cryptology ePrint Archive, Report 2015\/265 (2015)","key":"17_CR7"},{"unstructured":"Hatzivasilis, G., Theodoridis, A., Gasparis, E., Manifavas, C.: ULCL: an Ultra-Lightweight Cryptographic Library for embedded systems. In: MeSeCCS, PECCS, 2014, Lisbon, Portugal (2014)","key":"17_CR8"},{"unstructured":"Hatzivasilis, G., Floros, G., Papaefstathiou, I., Manifavas, C.: Lightweight authenticated encryption for green networking. In: IEEE AFRICON 2015 Green Innovation for African Renaissance, Addis Ababa, Ethiopia. IEEE (2015)","key":"17_CR9"},{"unstructured":"Fysarakis, K., Hatzivasilis, G., Rantos, K., Papanikolaou, A., Manifavas, C.: Embedded systems security challenges. In: MeSeCCS, PECCS, Lisbon, Portugal (2014)","key":"17_CR10"},{"key":"17_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"338","DOI":"10.1007\/978-3-642-39345-7_36","volume-title":"Human Aspects of Information Security, Privacy, and Trust","author":"NE Petroulakis","year":"2013","unstructured":"Petroulakis, N.E., Askoxylakis, I.G., Traganitis, A., Spanoudakis, G.: A privacy-level model of user-centric cyber-physical systems. In: Marinos, L., Askoxylakis, I. (eds.) HAS 2013. LNCS, vol. 8030, pp. 338\u2013347. Springer, Heidelberg (2013)"},{"unstructured":"Siris, V., Askoxylakis, I., Conti, M., Bruno, R.: Enhanced, ubiquitous and dependable broadband access using MESH networks. In: ERCIM News, vol. 73 (2008)","key":"17_CR12"},{"doi-asserted-by":"crossref","unstructured":"Markantonakis, K., Mayes, K., Sauveron, D., Askoxylakis, I.G.: Overview of security threats for smart cards in the public transport industry. IEEE International Conference on e-Business Engineering, pp. 506\u2013513. IEEE (2008)","key":"17_CR13","DOI":"10.1109\/ICEBE.2008.91"},{"key":"17_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"333","DOI":"10.1007\/978-3-642-54568-9_21","volume-title":"Data Privacy Management and Autonomous Spontaneous Security","author":"C Manifavas","year":"2014","unstructured":"Manifavas, C., Hatzivasilis, G., Fysarakis, K., Rantos, K.: Lightweight cryptography for embedded systems \u2013 a comparative analysis. In: Garcia-Alfaro, J., Lioudakis, G., Cuppens-Boulahia, N., Foley, S., Fitzgerald, W.M. (eds.) DPM 2013 and SETOP 2013. LNCS, vol. 8247, pp. 333\u2013349. Springer, Heidelberg (2014)"},{"issue":"1","key":"17_CR15","doi-asserted-by":"publisher","first-page":"73","DOI":"10.1145\/1053271.1053275","volume":"4","author":"D Dhurjati","year":"2005","unstructured":"Dhurjati, D., Kowshik, S., Adve, V., Lattner, C.: Memory safety without garbage collection for embedded applications. ACM TECS 4(1), 73\u2013111 (2005)","journal-title":"ACM TECS"},{"unstructured":"NIST: Recommendation for Password-Based Key Derivation. NIST Special Publication 800\u2013132 (December 2010)","key":"17_CR16"},{"issue":"11","key":"17_CR17","doi-asserted-by":"publisher","first-page":"612","DOI":"10.1145\/359168.359176","volume":"22","author":"A Shamir","year":"1979","unstructured":"Shamir, A.: How to share a secret. Communications of the ACM 22(11), 612\u2013613 (1979)","journal-title":"Communications of the ACM"},{"doi-asserted-by":"crossref","unstructured":"Schneier, B.: Description of a new variable-length key, 64-bit block cipher (Blowfish). In: Anderson, R. (ed.) FSE. LNCS vol. 809, pp. 191\u2013204. Springer, Heidelberg (1994)","key":"17_CR18","DOI":"10.1007\/3-540-58108-1_24"},{"unstructured":"Bernstein, D.J.: The Salsa20 family of stream ciphers, eSTREAM project (2007)","key":"17_CR19"},{"key":"17_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"69","DOI":"10.1007\/978-3-642-20465-4_6","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2011","author":"A Moradi","year":"2011","unstructured":"Moradi, A., Poschmann, A., Ling, S., Paar, C., Wang, H.: Pushing the limits: a very compact and a threshold implementation of aes. In: Paterson, K.G. (ed.) EUROCRYPT 2011. LNCS, vol. 6632, pp. 69\u201388. Springer, Heidelberg (2011)"},{"unstructured":"NIST: Secure Hash Standard, FIPS 180\u20132 (April 1995)","key":"17_CR21"},{"key":"17_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"119","DOI":"10.1007\/978-3-642-38980-1_8","volume-title":"Applied Cryptography and Network Security","author":"J-P Aumasson","year":"2013","unstructured":"Aumasson, J.-P., Neves, S., Wilcox-O\u2019Hearn, Z., Winnerlein, C.: BLAKE2: Simpler, smaller, fast as MD5. In: Jacobson, M., Locasto, M., Mohassel, P., Safavi-Naini, R. (eds.) ACNS 2013. LNCS, vol. 7954, pp. 119\u2013135. Springer, Heidelberg (2013)"},{"unstructured":"ISO\/IEC 29192:2012, International standard for lightweight cryptographic methods, ISO\/IEC (2012)","key":"17_CR23"},{"doi-asserted-by":"crossref","unstructured":"Akishita, T., Hiwatari, H.: Very Compact Hardware Implementations of the Blockcipher CLEFIA. Sony Corporation, Technical Paper (2011)","key":"17_CR24","DOI":"10.1007\/978-3-642-28496-0_17"},{"doi-asserted-by":"crossref","unstructured":"Guo, J., Peyrin, T., Poschmann, A.: The PHOTON family of lightweight hash functions. In: Rogaway, P. (ed.) CRYPTO 2011. LNCS, vol. 6841, pp. 222\u2013239. Springer, Heidelberg (2011)","key":"17_CR25","DOI":"10.1007\/978-3-642-22792-9_13"},{"doi-asserted-by":"crossref","unstructured":"Guo, J., Karpman, P., Nikolic, I., Wang, L., Wu, S.: Analysis of Blake2, Cryptology ePrint Archive, Report 2013\/467 (2013)","key":"17_CR26","DOI":"10.1007\/978-3-319-04852-9_21"}],"container-title":["Lecture Notes in Computer Science","Information Security Theory and Practice"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-24018-3_17","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,22]],"date-time":"2019-08-22T07:04:07Z","timestamp":1566457447000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-24018-3_17"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319240176","9783319240183"],"references-count":26,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-24018-3_17","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]},"assertion":[{"value":"24 October 2015","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}