{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,22]],"date-time":"2025-05-22T06:25:14Z","timestamp":1747895114091},"publisher-location":"Cham","reference-count":40,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319490991"},{"type":"electronic","value":"9783319491004"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-49100-4_3","type":"book-chapter","created":{"date-parts":[[2016,11,1]],"date-time":"2016-11-01T10:41:42Z","timestamp":1477996902000},"page":"62-91","source":"Crossref","is-referenced-by-count":2,"title":["Cryptanalysis of GlobalPlatform Secure Channel Protocols"],"prefix":"10.1007","author":[{"given":"Mohamed","family":"Sabt","sequence":"first","affiliation":[]},{"given":"Jacques","family":"Traor\u00e9","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,11,2]]},"reference":[{"key":"3_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"260","DOI":"10.1007\/3-540-36400-5_20","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2002","author":"C Aum\u00fcller","year":"2003","unstructured":"Aum\u00fcller, C., Bier, P., Fischer, W., Hofreiter, P., Seifert, J.-P.: Fault attacks on RSA with CRT: concrete results and practical countermeasures. In: Kaliski, B.S., Ko\u00e7, K., Paar, C. (eds.) CHES 2002. LNCS, vol. 2523, pp. 260\u2013275. Springer, Heidelberg (2003). doi: 10.1007\/3-540-36400-5_20"},{"key":"3_CR2","unstructured":"Bard, G.V.: A challenging but feasible blockwise-adaptive chosen-plaintext attack on SSL. In: Proceedings of the International Conference on Security and Cryptography. SECRYPT 2006, pp. 7\u201310. INSTICC Press (2006)"},{"key":"3_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"155","DOI":"10.1007\/11741060_9","volume-title":"Construction and Analysis of Safe, Secure, and Interoperable Smart Devices","author":"SZ B\u00e9guelin","year":"2006","unstructured":"B\u00e9guelin, S.Z.: Formalisation and verification of the GlobalPlatform card specification using the B method. In: Barthe, G., Gr\u00e9goire, B., Huisman, M., Lanet, J.-L. (eds.) CASSIS 2005. LNCS, vol. 3956, pp. 155\u2013173. Springer, Heidelberg (2006). doi: 10.1007\/11741060_9"},{"key":"3_CR4","doi-asserted-by":"crossref","unstructured":"Bellare, M., Desai, A., Jokipii, E., Rogaway, P.: A concrete security treatment of symmetric encryption. In: Proceedings of the 38th Annual Symposium on Foundations of Computer Science. FOCS 1997, pp. 394\u2013403. IEEE (1997)","DOI":"10.1109\/SFCS.1997.646128"},{"issue":"3","key":"3_CR5","doi-asserted-by":"crossref","first-page":"362","DOI":"10.1006\/jcss.1999.1694","volume":"61","author":"M Bellare","year":"2000","unstructured":"Bellare, M., Kilian, J., Rogaway, P.: The security of the cipher block chaining message authentication code. J. Comput. Syst. Sci. 61(3), 362\u2013399 (2000)","journal-title":"J. Comput. Syst. Sci."},{"key":"3_CR6","doi-asserted-by":"crossref","unstructured":"Bellare, M., Kohno, T., Namprempre, C.: Authenticated encryption in SSH: provably fixing the SSH binary packet protocol. In: Proceedings of the 9th ACM Conference on Computer and Communications Security. CCS 2002, pp. 1\u201311. ACM (2002)","DOI":"10.1145\/586110.586112"},{"key":"3_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"531","DOI":"10.1007\/3-540-44448-3_41","volume-title":"Advances in Cryptology \u2014 ASIACRYPT 2000","author":"M Bellare","year":"2000","unstructured":"Bellare, M., Namprempre, C.: Authenticated encryption: relations among notions and analysis of the generic composition paradigm. In: Okamoto, T. (ed.) ASIACRYPT 2000. LNCS, vol. 1976, pp. 531\u2013545. Springer, Heidelberg (2000). doi: 10.1007\/3-540-44448-3_41"},{"issue":"4","key":"3_CR8","doi-asserted-by":"crossref","first-page":"469","DOI":"10.1007\/s00145-008-9026-x","volume":"21","author":"M Bellare","year":"2008","unstructured":"Bellare, M., Namprempre, C.: Authenticated encryption: relations among notions and analysis of the generic composition paradigm. J. Cryptol. 21(4), 469\u2013491 (2008)","journal-title":"J. Cryptol."},{"key":"3_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-662-44371-2_1","volume-title":"Advances in Cryptology \u2013 CRYPTO 2014","author":"M Bellare","year":"2014","unstructured":"Bellare, M., Paterson, K.G., Rogaway, P.: Security of symmetric encryption against mass surveillance. In: Garay, J.A., Gennaro, R. (eds.) CRYPTO 2014. LNCS, vol. 8616, pp. 1\u201319. Springer, Heidelberg (2014). doi: 10.1007\/978-3-662-44371-2_1"},{"key":"3_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"389","DOI":"10.1007\/978-3-540-25937-4_25","volume-title":"Fast Software Encryption","author":"M Bellare","year":"2004","unstructured":"Bellare, M., Rogaway, P., Wagner, D.: The EAX mode of operation. In: Roy, B., Meier, W. (eds.) FSE 2004. LNCS, vol. 3017, pp. 389\u2013407. Springer, Heidelberg (2004). doi: 10.1007\/978-3-540-25937-4_25"},{"key":"3_CR11","volume-title":"Java Card Technology for Smart Cards: Architecture and Programmer\u2019s Guide","author":"Z Chen","year":"2000","unstructured":"Chen, Z.: Java Card Technology for Smart Cards: Architecture and Programmer\u2019s Guide. Addison-Wesley Longman Publishing Co. Inc., Boston (2000)"},{"key":"3_CR12","unstructured":"Dai, W.: An attack against SSH2 protocol, email to the SECSH Working Group. ftp:\/\/ftp.ietf.org\/ietf-mail-archive\/secsh\/2002-02.mail"},{"issue":"3","key":"3_CR13","doi-asserted-by":"crossref","first-page":"33","DOI":"10.1109\/MSP.2010.200","volume":"9","author":"JP Degabriele","year":"2011","unstructured":"Degabriele, J.P., Paterson, K., Watson, G.: Provable security in the real world. IEEE Secur. Priv. 9(3), 33\u201341 (2011)","journal-title":"IEEE Secur. Priv."},{"key":"3_CR14","unstructured":"Duong, T., Rizzo, J.: Here come the XOR Ninjas (2011). Unpublished"},{"key":"3_CR15","doi-asserted-by":"crossref","unstructured":"Dworkin, M.: Recommendation for block cipher modes of operation: methods and techniques. National Institute of Standards and Technology (NIST), NIST Special Publication 800\u201338A., December 2001","DOI":"10.6028\/NIST.SP.800-38a"},{"key":"3_CR16","unstructured":"Dworkin, M.: Recommendation for block cipher modes of operation: the CMAC mode for authentication. National Institute of Standards and Technology (NIST), NIST Special Publication 800\u201338B, November 2001"},{"key":"3_CR17","unstructured":"EMVCo: EMVCo Specification. https:\/\/www.emvco.com\/specifications.aspx"},{"key":"3_CR18","unstructured":"EMVCo: EMV card personalization specification - version 1.1. https:\/\/www.emvco.com\/specifications.aspx?id=20"},{"key":"3_CR19","unstructured":"Feix, B., Thiebeauld, H.: Defeating ISO9797-1 MAC Algo 3 by combining side-channel and brute force techniques. Cryptology ePrint Archive, Report 2014\/702 (2014)"},{"key":"3_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"145","DOI":"10.1007\/978-3-540-24654-1_11","volume-title":"Selected Areas in Cryptography","author":"P-A Fouque","year":"2004","unstructured":"Fouque, P.-A., Joux, A., Martinet, G., Valette, F.: Authenticated on-line encryption. In: Matsui, M., Zuccherato, R.J. (eds.) SAC 2003. LNCS, vol. 3006, pp. 145\u2013159. Springer, Heidelberg (2004). doi: 10.1007\/978-3-540-24654-1_11"},{"key":"3_CR21","unstructured":"GlobalPlatform: The standard for managing applications on secure chip technology. https:\/\/www.globalplatform.org"},{"key":"3_CR22","unstructured":"GlobalPlatform: Secure channel protocol \u20183\u2019 - card specification v2.2 - amendment d v1.1.1. http:\/\/www.globalplatform.org\/specificationscard.asp"},{"key":"3_CR23","unstructured":"GlobalPlatform: GlobalPlatform card specification v2.3. http:\/\/www.globalplatform.org\/specificationscard.asp"},{"key":"3_CR24","unstructured":"GlobalPlatform: About GlobalPlatform - security task force activities and achievements - 2016 activities and priorities (2016). https:\/\/www.globalplatform.org\/aboutustaskforcesSecurity.asp"},{"key":"3_CR25","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"254","DOI":"10.1007\/978-3-540-28632-5_19","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2004","author":"L Hemme","year":"2004","unstructured":"Hemme, L.: A differential fault attack against early rounds of (triple-)DES. In: Joye, M., Quisquater, J.-J. (eds.) CHES 2004. LNCS, vol. 3156, pp. 254\u2013267. Springer, Heidelberg (2004). doi: 10.1007\/978-3-540-28632-5_19"},{"key":"3_CR26","unstructured":"ISO\/IEC JTC 1\/SC 27: Information technology - security techniques - modes of operation for an n-bit block cipher. Technical report, International Organization for Standardization, February 2006"},{"key":"3_CR27","unstructured":"ISO\/IEC JTC 1\/SC 6: Information technology - ASN.1 encoding rules: specification of Basic Encoding Rules (BER), Canonical Encoding Rules (CER) and Distinguished Encoding Rules (DER). Technical report, International Organization for Standardization, December 2002"},{"key":"3_CR28","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"129","DOI":"10.1007\/978-3-540-39887-5_11","volume-title":"Fast Software Encryption","author":"T Iwata","year":"2003","unstructured":"Iwata, T., Kurosawa, K.: OMAC: one-key CBC MAC. In: Johansson, T. (ed.) FSE 2003. LNCS, vol. 2887, pp. 129\u2013153. Springer, Heidelberg (2003). doi: 10.1007\/978-3-540-39887-5_11"},{"key":"3_CR29","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1007\/3-540-45708-9_2","volume-title":"Advances in Cryptology \u2014 CRYPTO 2002","author":"A Joux","year":"2002","unstructured":"Joux, A., Martinet, G., Valette, F.: Blockwise-adaptive attackers revisiting the (in)security of some provably secure encryption modes: CBC, GEM, IACBC. In: Yung, M. (ed.) CRYPTO 2002. LNCS, vol. 2442, pp. 17\u201330. Springer, Heidelberg (2002). doi: 10.1007\/3-540-45708-9_2"},{"key":"3_CR30","volume-title":"Introduction to Modern Cryptography","author":"J Katz","year":"2015","unstructured":"Katz, J., Lindell, Y.: Introduction to Modern Cryptography, 2nd edn. Chapman & Hall Book, Boca Raton (2015)","edition":"2"},{"key":"3_CR31","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"284","DOI":"10.1007\/3-540-44706-7_20","volume-title":"Fast Software Encryption","author":"J Katz","year":"2001","unstructured":"Katz, J., Yung, M.: Unforgeable encryption and chosen ciphertext secure modes of operation. In: Goos, G., Hartmanis, J., Leeuwen, J., Schneier, B. (eds.) FSE 2000. LNCS, vol. 1978, pp. 284\u2013299. Springer, Heidelberg (2001). doi: 10.1007\/3-540-44706-7_20"},{"key":"3_CR32","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1007\/3-540-45708-9_3","volume-title":"Advances in Cryptology \u2014 CRYPTO 2002","author":"M Liskov","year":"2002","unstructured":"Liskov, M., Rivest, R.L., Wagner, D.: Tweakable block ciphers. In: Yung, M. (ed.) CRYPTO 2002. LNCS, vol. 2442, pp. 31\u201346. Springer, Heidelberg (2002). doi: 10.1007\/3-540-45708-9_3"},{"key":"3_CR33","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"188","DOI":"10.1007\/BFb0030420","volume-title":"Information Security","author":"C Markantonakis","year":"1998","unstructured":"Markantonakis, C.: The case for a secure multi-application smart card operating system. In: Okamoto, E., Davida, G., Mambo, M. (eds.) ISW 1997. LNCS, vol. 1396, pp. 188\u2013197. Springer, Heidelberg (1998). doi: 10.1007\/BFb0030420"},{"key":"3_CR34","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"244","DOI":"10.1007\/11556992_18","volume-title":"Information Security","author":"CJ Mitchell","year":"2005","unstructured":"Mitchell, C.J.: Error Oracle attacks on CBC Mode: is there a future for CBC mode encryption? In: Zhou, J., Lopez, J., Deng, R.H., Bao, F. (eds.) ISC 2005. LNCS, vol. 3650, pp. 244\u2013258. Springer, Heidelberg (2005). doi: 10.1007\/11556992_18"},{"key":"3_CR35","unstructured":"NXP Semiconductors Germany Gmbh: Nxp j3e081_m64, j3e081_m66, j2e081_m64, j3e041_m66, j3e016_m66, j3e016_m64, j3e041_m64 secure smart card controller. Common Criteria for Information Technology Security Evaluation, certification Report: NSCIB-CC-13-37761-CR2, August 2014"},{"key":"3_CR36","unstructured":"Oracle: Java card protection profile - closed configuration. Common Criteria for Information Technology Security Evaluation, certification Report: ANSSI-CC-PP-2010\/07, December 2012"},{"key":"3_CR37","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"83","DOI":"10.1007\/978-3-642-28368-0_9","volume-title":"Cryptography and Security: From Theory to Applications","author":"KG Paterson","year":"2012","unstructured":"Paterson, K.G., Watson, G.J.: Authenticated-encryption with padding: a formal security treatment. In: Naccache, D. (ed.) Cryptography and Security: From Theory to Applications. LNCS, vol. 6805, pp. 83\u2013107. Springer, Heidelberg (2012). doi: 10.1007\/978-3-642-28368-0_9"},{"key":"3_CR38","doi-asserted-by":"crossref","DOI":"10.1002\/9780470660911","volume-title":"Smart Card Handbook","author":"W Rankl","year":"2010","unstructured":"Rankl, W., Effing, W.: Smart Card Handbook, 4th edn. Wiley, Chichester (2010)","edition":"4"},{"key":"3_CR39","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"348","DOI":"10.1007\/978-3-540-25937-4_22","volume-title":"Fast Software Encryption","author":"P Rogaway","year":"2004","unstructured":"Rogaway, P.: Nonce-based symmetric encryption. In: Roy, B., Meier, W. (eds.) FSE 2004. LNCS, vol. 3017, pp. 348\u2013358. Springer, Heidelberg (2004). doi: 10.1007\/978-3-540-25937-4_22"},{"key":"3_CR40","unstructured":"Rogaway, P.: Evaluation of some blockcipher modes of operation. Technical report, Cryptography Research and Evaluation Committees (CRYPTREC) for the Government of Japan (2011)"}],"container-title":["Lecture Notes in Computer Science","Security Standardisation Research"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-49100-4_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,15]],"date-time":"2019-09-15T01:47:10Z","timestamp":1568512030000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-49100-4_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319490991","9783319491004"],"references-count":40,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-49100-4_3","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2016]]}}}