{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,19]],"date-time":"2025-03-19T12:32:35Z","timestamp":1742387555370},"publisher-location":"Berlin, Heidelberg","reference-count":15,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540773658"},{"type":"electronic","value":"9783540773665"}],"license":[{"start":{"date-parts":[[2007,1,1]],"date-time":"2007-01-01T00:00:00Z","timestamp":1167609600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2007]]},"DOI":"10.1007\/978-3-540-77366-5_20","type":"book-chapter","created":{"date-parts":[[2007,12,20]],"date-time":"2007-12-20T13:07:48Z","timestamp":1198156068000},"page":"224-238","source":"Crossref","is-referenced-by-count":15,"title":["The Unbearable Lightness of PIN Cracking"],"prefix":"10.1007","author":[{"given":"Omer","family":"Berkman","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Odelia Moshe","family":"Ostrovsky","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"issue":"2","key":"20_CR1","doi-asserted-by":"publisher","first-page":"357","DOI":"10.1109\/JPROC.2005.862423","volume":"94","author":"R.J. Anderson","year":"2006","unstructured":"Anderson, R.J., Bond, M., Clulow, J., Skorobogatov, S.: Cryptographic processors - a survey. Proceedings of the IEEE\u00a094(2), 357\u2013369 (2006)","journal-title":"Proceedings of the IEEE"},{"key":"20_CR2","unstructured":"Bond, M.: Understanding Security APIs. PhD thesis, University of Cambridge (2004), \n                    \n                      http:\/\/www.cl.cam.ac.uk\/mkb23\/research.html"},{"key":"20_CR3","unstructured":"Bond, M., Clulow, J.: Encrypted? randomised? compromised? In: Workshop on Cryptographic Algorithms and their Uses (2004)"},{"key":"20_CR4","unstructured":"Bond, M., Clulow, J.: Extending security protocols analysis: New challenges. In: Automated Reasoning and Security Protocols Analysis (ARSPA), pp. 602\u2013608 (2004)"},{"key":"20_CR5","unstructured":"Bond, M., Zielinski, P.: Decimalization table attacks for pin cracking. Technical Report UCAM-CL-TR-560, University of Cambridge, computer Laboratory (2003), \n                    \n                      http:\/\/www.cl.cam.ac.uk\/TechReports\/UCAM-CL-TR-560.pdf"},{"key":"20_CR6","unstructured":"Clulow, J.: The design and analysis of cryptographic APIs. Master\u2019s thesis, University of Natal, South Africa (2003), \n                    \n                      http:\/\/www.cl.cam.ac.uk\/jc407"},{"key":"20_CR7","unstructured":"EMV: Integrated circuit card specifications for payment systems (2004), \n                    \n                      http:\/\/www.emvco.com"},{"key":"20_CR8","unstructured":"ISO: Banking \u2013 personal identification number (PIN) management and security \u2013 part 1: Basic principles and requirements for online PIN handling in ATM and POS systems (2002)"},{"key":"20_CR9","unstructured":"VISA: PIN security requirements (2004), \n                    \n                      http:\/\/partnernetwork.visa.com\/st\/pin\/pdfs\/PCI_PIN_Security_Requirements.pdf"},{"key":"20_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"128","DOI":"10.1007\/3-540-44810-1_18","volume-title":"Security Protocols","author":"R. Anderson","year":"2001","unstructured":"Anderson, R.: The correctness of crypto transaction sets. In: Christianson, B., Crispo, B., Malcolm, J.A., Roe, M. (eds.) Security Protocols. LNCS, vol.\u00a02133, pp. 128\u2013141. Springer, Heidelberg (2001)"},{"issue":"11","key":"20_CR11","doi-asserted-by":"publisher","first-page":"32","DOI":"10.1145\/188280.188291","volume":"37","author":"R.J. Andersson","year":"1994","unstructured":"Andersson, R.J.: Why cryptosystems fail. Communications of the ACM\u00a037(11), 32\u201340 (1994)","journal-title":"Communications of the ACM"},{"issue":"1","key":"20_CR12","doi-asserted-by":"publisher","first-page":"54","DOI":"10.1016\/0167-4048(87)90126-X","volume":"6","author":"D. Longley","year":"1987","unstructured":"Longley, D.: Expert systems applied to the analysis of key management schemes. Computers and Security\u00a06(1), 54\u201367 (1987)","journal-title":"Computers and Security"},{"key":"20_CR13","unstructured":"Rigby, S.: Key management in secure data networks. Master\u2019s thesis, Queensland Institute of Technology, Australia (1987)"},{"key":"20_CR14","series-title":"Lecture Notes in Computer Science","volume-title":"CADE-17","author":"G. Steel","year":"2000","unstructured":"Steel, G., Bundy, G.: Deduction with XOR constraints in security API modelling. In: McAllester, D. (ed.) CADE-17. LNCS, vol.\u00a01831, Springer, Heidelberg (2000)"},{"key":"20_CR15","unstructured":"Moshe-Ostrovsky, O.: Vulnerabilities in the financial PIN processing API. Master\u2019s thesis, Tel Aviv University (2006)"}],"container-title":["Lecture Notes in Computer Science","Financial Cryptography and Data Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-77366-5_20","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,2,27]],"date-time":"2019-02-27T08:08:43Z","timestamp":1551254923000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-77366-5_20"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007]]},"ISBN":["9783540773658","9783540773665"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-77366-5_20","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2007]]}}}