{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,25]],"date-time":"2025-10-25T14:19:09Z","timestamp":1761401949625},"publisher-location":"Cham","reference-count":20,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319979151"},{"type":"electronic","value":"9783319979168"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-97916-8_9","type":"book-chapter","created":{"date-parts":[[2018,7,25]],"date-time":"2018-07-25T12:13:24Z","timestamp":1532520804000},"page":"127-142","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Is Java Card Ready for Hash-Based Signatures?"],"prefix":"10.1007","author":[{"given":"Ebo","family":"van der Laan","sequence":"first","affiliation":[]},{"given":"Erik","family":"Poll","sequence":"additional","affiliation":[]},{"given":"Joost","family":"Rijneveld","sequence":"additional","affiliation":[]},{"given":"Joeri","family":"de Ruiter","sequence":"additional","affiliation":[]},{"given":"Peter","family":"Schwabe","sequence":"additional","affiliation":[]},{"given":"Jan","family":"Verschuren","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,7,26]]},"reference":[{"unstructured":"Bernstein, D.J., Dobraunig, C., Eichlseder, M., Fluhrer, S., Gazdag, S.-L., H\u00fclsing, A., Kampanakis, P., K\u00f6lbl, S., Lange, T., Lauridsen, M.M., Mendel, F., Niederhagen, R., Rechberger, C., Rijneveld, J., Schwabe, P.: SPHINCS+. Submission to NIST\u2019s post-quantum crypto standardization project (2017). \nhttps:\/\/sphincs.org","key":"9_CR1"},{"unstructured":"Bertoni, G., Daemen, J., Peeters, M., Van Assche, G.: The Keccak reference, January 2011. \nhttp:\/\/keccak.noekeon.org\/","key":"9_CR2"},{"unstructured":"Advanced Security Mechanisms for Machine Readable Travel Documents and eIDAS Token. Technical report TR-03110, German Federal Office for Information Security (BSI), Version 2.20 (2015)","key":"9_CR3"},{"key":"9_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"117","DOI":"10.1007\/978-3-642-25405-5_8","volume-title":"Post-Quantum Cryptography","author":"J Buchmann","year":"2011","unstructured":"Buchmann, J., Dahmen, E., H\u00fclsing, A.: XMSS - a practical forward secure signature scheme based on minimal security assumptions. In: Yang, B.-Y. (ed.) PQCrypto 2011. LNCS, vol. 7071, pp. 117\u2013129. Springer, Heidelberg (2011). \nhttps:\/\/doi.org\/10.1007\/978-3-642-25405-5_8\n\n. \nhttps:\/\/eprint.iacr.org\/2011\/484"},{"key":"9_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"63","DOI":"10.1007\/978-3-540-88403-3_5","volume-title":"Post-Quantum Cryptography","author":"J Buchmann","year":"2008","unstructured":"Buchmann, J., Dahmen, E., Schneider, M.: Merkle tree traversal revisited. In: Buchmann, J., Ding, J. (eds.) PQCrypto 2008. LNCS, vol. 5299, pp. 63\u201378. Springer, Heidelberg (2008). \nhttps:\/\/doi.org\/10.1007\/978-3-540-88403-3_5\n\n. \nhttps:\/\/www.cdc.informatik.tu-darmstadt.de\/reports\/reports\/AuthPath.pdf"},{"key":"9_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"66","DOI":"10.1007\/978-3-642-35999-6_5","volume-title":"Selected Areas in Cryptography","author":"A H\u00fclsing","year":"2013","unstructured":"H\u00fclsing, A., Busold, C., Buchmann, J.: Forward secure signatures on smart cards. In: Knudsen, L.R., Wu, H. (eds.) SAC 2012. LNCS, vol. 7707, pp. 66\u201380. Springer, Heidelberg (2013). \nhttps:\/\/doi.org\/10.1007\/978-3-642-35999-6_5\n\n. \nhttps:\/\/huelsing.files.wordpress.com\/2013\/05\/xmss-smart.pdf"},{"unstructured":"Eurosmart: Digital security industry to pass the 10 billion mark in 2018 for worldwide shipments of secure elements. Press Release (2017). \nhttp:\/\/www.eurosmart.com\/news-publications\/press-release\/296","key":"9_CR7"},{"unstructured":"Java Card Forum: About the JCF (2018). \nhttps:\/\/javacardforum.com\n\n. Accessed 12 Mar 2018","key":"9_CR8"},{"key":"9_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"173","DOI":"10.1007\/978-3-642-38553-7_10","volume-title":"Progress in Cryptology \u2013 AFRICACRYPT 2013","author":"A H\u00fclsing","year":"2013","unstructured":"H\u00fclsing, A.: W-OTS+ \u2013 shorter signatures for hash-based signature schemes. In: Youssef, A., Nitaj, A., Hassanien, A.E. (eds.) AFRICACRYPT 2013. LNCS, vol. 7918, pp. 173\u2013188. Springer, Heidelberg (2013). \nhttps:\/\/doi.org\/10.1007\/978-3-642-38553-7_10\n\n. \nhttps:\/\/eprint.iacr.org\/2017\/965"},{"unstructured":"H\u00fclsing, A., Butin, D., Gazdag, S.-L., Rijneveld, J., Mohaisen, A.: XMSS: eXtended Merkle Signature Scheme. Request for Comments 8391 (2018). \nhttps:\/\/tools.ietf.org\/html\/rfc8391","key":"9_CR10"},{"key":"9_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"194","DOI":"10.1007\/978-3-642-40588-4_14","volume-title":"Security Engineering and Intelligence Informatics","author":"A H\u00fclsing","year":"2013","unstructured":"H\u00fclsing, A., Rausch, L., Buchmann, J.: Optimal parameters for XMSSMT. In: Cuzzocrea, A., Kittl, C., Simos, D.E., Weippl, E., Xu, L. (eds.) CD-ARES 2013. LNCS, vol. 8128, pp. 194\u2013208. Springer, Heidelberg (2013). \nhttps:\/\/doi.org\/10.1007\/978-3-642-40588-4_14\n\n. \nhttps:\/\/eprint.iacr.org\/2017\/966"},{"key":"9_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"446","DOI":"10.1007\/978-3-662-49384-7_17","volume-title":"Public-Key Cryptography \u2013 PKC 2016","author":"A H\u00fclsing","year":"2016","unstructured":"H\u00fclsing, A., Rijneveld, J., Schwabe, P.: ARMed SPHINCS \u2013 computing a 41 KB signature in 16 KB of RAM. In: Cheng, C.-M., Chung, K.-M., Persiano, G., Yang, B.-Y. (eds.) PKC 2016. LNCS, vol. 9614, pp. 446\u2013470. Springer, Heidelberg (2016). \nhttps:\/\/doi.org\/10.1007\/978-3-662-49384-7_17\n\n. \nhttps:\/\/eprint.iacr.org\/2015\/1042"},{"key":"9_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"387","DOI":"10.1007\/978-3-662-49384-7_15","volume-title":"Public-Key Cryptography \u2013 PKC 2016","author":"A H\u00fclsing","year":"2016","unstructured":"H\u00fclsing, A., Rijneveld, J., Song, F.: Mitigating multi-target attacks in hash-based signatures. In: Cheng, C.-M., Chung, K.-M., Persiano, G., Yang, B.-Y. (eds.) PKC 2016. LNCS, vol. 9614, pp. 387\u2013416. Springer, Heidelberg (2016). \nhttps:\/\/doi.org\/10.1007\/978-3-662-49384-7_15\n\n. \nhttps:\/\/eprint.iacr.org\/2015\/1256"},{"unstructured":"Supplemental Access Control for Machine Readable Travel Documents. Technical report, International Civil Aviation Organization (ICAO), Version 1.1 (2014)","key":"9_CR14"},{"key":"9_CR15","doi-asserted-by":"publisher","first-page":"168","DOI":"10.1007\/978-3-319-89641-0_10","volume-title":"Constructive Side-Channel Analysis and Secure Design","author":"Matthias J. Kannwischer","year":"2018","unstructured":"Kannwischer, M.J., Gen\u00eat, A., Butin, D., Kr\u00e4mer, J., Buchmann, J.: Differential power analysis of XMSS and\u00a0SPHINCS. In: Fan, J., Gierlichs, B. (eds.) COSADE 2018. LNCS, vol. 10815, pp. 168\u2013188. Springer, Cham (2018). \nhttps:\/\/doi.org\/10.1007\/978-3-319-89641-0_10\n\n. \nhttps:\/\/kannwischer.eu\/papers\/2018_hbs_sca.pdf"},{"key":"9_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"218","DOI":"10.1007\/0-387-34805-0_21","volume-title":"Advances in Cryptology \u2014 CRYPTO\u2019 89 Proceedings","author":"RC Merkle","year":"1990","unstructured":"Merkle, R.C.: A certified digital signature. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol. 435, pp. 218\u2013238. Springer, New York (1990). \nhttps:\/\/doi.org\/10.1007\/0-387-34805-0_21\n\n. \nwww.merkle.com\/papers\/Certified1979.pdf"},{"unstructured":"NIST: Post-quantum cryptography: NIST\u2019s plan for the future (2016). \nhttp:\/\/csrc.nist.gov\/groups\/ST\/post-quantum-crypto\/documents\/pqcrypto-2016-presentation.pdf","key":"9_CR17"},{"key":"9_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"104","DOI":"10.1007\/978-3-540-85893-5_8","volume-title":"Smart Card Research and Advanced Applications","author":"S Rohde","year":"2008","unstructured":"Rohde, S., Eisenbarth, T., Dahmen, E., Buchmann, J., Paar, C.: Fast hash-based signatures on constrained devices. In: Grimaud, G., Standaert, F.-X. (eds.) CARDIS 2008. LNCS, vol. 5189, pp. 104\u2013117. Springer, Heidelberg (2008). \nhttps:\/\/doi.org\/10.1007\/978-3-540-85893-5_8\n\n. \nhttps:\/\/www-old.cdc.informatik.tu-darmstadt.de\/reports\/reports\/REDBP08.pdf"},{"unstructured":"Rompel, J.: One-way functions are necessary and sufficient for secure signatures. In: Proceedings of the Twenty-Second Annual ACM Symposium on Theory of Computing, pp. 387\u2013394. ACM (1990). \nhttps:\/\/www.cs.princeton.edu\/courses\/archive\/spr08\/cos598D\/Rompel.pdf","key":"9_CR19"},{"unstructured":"Safran Identity & Security: The impact of Java Card technology yesterday and tomorrow: Safran Identity & Security celebrates 20 years with the Java Card Forum. Press Release. \nhttps:\/\/www.morpho.com\/en\/media\/impact-java-card-technology-yesterday-and-tomorrow-safran-identity-security-celebrates-20-years-java-card-forum-20170302\n\n. Accessed 12 Mar 2018","key":"9_CR20"}],"container-title":["Lecture Notes in Computer Science","Advances in Information and Computer Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-97916-8_9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,7,25]],"date-time":"2018-07-25T12:16:50Z","timestamp":1532521010000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-97916-8_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783319979151","9783319979168"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-97916-8_9","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2018]]}}}