{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T06:40:07Z","timestamp":1725518407077},"publisher-location":"Berlin, Heidelberg","reference-count":19,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540858928"},{"type":"electronic","value":"9783540858935"}],"license":[{"start":{"date-parts":[[2008,1,1]],"date-time":"2008-01-01T00:00:00Z","timestamp":1199145600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008]]},"DOI":"10.1007\/978-3-540-85893-5_12","type":"book-chapter","created":{"date-parts":[[2008,8,29]],"date-time":"2008-08-29T06:28:18Z","timestamp":1219991298000},"page":"162-175","source":"Crossref","is-referenced-by-count":9,"title":["Coupon Recalculation for the GPS Authentication Scheme"],"prefix":"10.1007","author":[{"given":"Georg","family":"Hofferek","sequence":"first","affiliation":[]},{"given":"Johannes","family":"Wolkerstorfer","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"12_CR1","unstructured":"ADT Tyco Fire & Security, Alien Technology, Impinj Inc., Intel Corporation, Symbol Technologies, and Xterprise. RFID and UHF \u2013 A Prescription for RFID Success in the Pharmaceutical Industry. White paper (2006)"},{"key":"12_CR2","unstructured":"Austriamicrosystems. 0.35\u03bcm CMOS Process Standard-Cell Library, \n                  \n                    http:\/\/asic.austriamicrosystems.com\/databooks\/index_c35.html"},{"key":"12_CR3","first-page":"70","volume-title":"Proceedings of the 14th IEEE Symposium on Computer Arithmetic","author":"T. Blum","year":"1999","unstructured":"Blum, T., Paar, C.: Montgomery modular exponentiation on reconfigurable hardware. In: Koren, Kornerup (eds.) Proceedings of the 14th IEEE Symposium on Computer Arithmetic, Adelaide, Australia, pp. 70\u201377. IEEE Computer Society Press, Los Alamitos (1999)"},{"issue":"1","key":"12_CR4","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1049\/ip-ifs:20055006","volume":"152","author":"M. Feldhofer","year":"2005","unstructured":"Feldhofer, M., Wolkerstorfer, J., Rijmen, V.: AES implementation on a grain of sand. IEEE Proceedings on Information Security\u00a0152(1), 13\u201320 (2005)","journal-title":"IEEE Proceedings on Information Security"},{"key":"12_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"481","DOI":"10.1007\/3-540-46877-3_44","volume-title":"Advances in Cryptology - EUROCRYPT \u201990","author":"M. Girault","year":"1991","unstructured":"Girault, M.: An identiy-based identification scheme based on discrete logarithms modulo a composite number. In: Daamgard, I. (ed.) EUROCRYPT 1990. LNCS, vol.\u00a0473, pp. 481\u2013486. Springer, Heidelberg (1991)"},{"key":"12_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"490","DOI":"10.1007\/3-540-46416-6_42","volume-title":"Advances in Cryptology - EUROCRYPT \u201991","author":"M. Girault","year":"1991","unstructured":"Girault, M.: Self-certified public keys. In: Davies, D. (ed.) EUROCRYPT 1991. LNCS, vol.\u00a0547, pp. 490\u2013497. Springer, Heidelberg (1991)"},{"key":"12_CR7","first-page":"39","volume-title":"Proceedings of the Fourth Working Conference on Smart Card Research and Advanced Applications, CARDIS 2000","author":"M. Girault","year":"2000","unstructured":"Girault, M.: Low-size coupons for low-cost ic cards. In Smart Card Research and Advanced Applications. In: Proceedings of the Fourth Working Conference on Smart Card Research and Advanced Applications, CARDIS 2000, Bristol, UK, September 20-22, 2000, vol.\u00a0180, pp. 39\u201350. Kluwer, Dordrecht (2000)"},{"key":"12_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"413","DOI":"10.1007\/978-3-540-28632-5_30","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2004","author":"M. Girault","year":"2004","unstructured":"Girault, M., Lefranc, D.: Public key authentication with one (online) single addition. In: Joye, M., Quisquater, J.-J. (eds.) CHES 2004. LNCS, vol.\u00a03156, pp. 413\u2013427. Springer, Heidelberg (2004)"},{"issue":"4","key":"12_CR9","doi-asserted-by":"publisher","first-page":"463","DOI":"10.1007\/s00145-006-0224-0","volume":"19","author":"M. Girault","year":"2006","unstructured":"Girault, M., Poupard, G., Stern, J.: On the fly authentication and signature schemes based on groups of unknown order. Journal of Cryptology\u00a019(4), 463\u2013487 (2006)","journal-title":"Journal of Cryptology"},{"key":"12_CR10","unstructured":"ISO\/IEC. International Standard ISO\/IEC 9798 Part 5: Mechanisms using zero-knowledge techniques (December 2004)"},{"issue":"3","key":"12_CR11","doi-asserted-by":"publisher","first-page":"26","DOI":"10.1109\/40.502403","volume":"16","author":"C.K. Ko\u00e7","year":"1996","unstructured":"Ko\u00e7, C.K., Acar, T., Kaliski, B.J.: Analyzing and comparing Montgomery multiplication algorithms. IEEE Micro.\u00a016(3), 26\u201333 (1996)","journal-title":"IEEE Micro."},{"key":"12_CR12","series-title":"Lecture Notes in Computer Science","volume-title":"Topics in Cryptology \u2013 CT-RSA 2007","author":"M. McLoone","year":"2006","unstructured":"McLoone, M., Robshaw, M.: Public key cryptography and RFID tags. In: Abe, M. (ed.) CT-RSA 2007. LNCS, vol.\u00a04377. Springer, Heidelberg (2006)"},{"key":"12_CR13","doi-asserted-by":"crossref","unstructured":"McLoone, M., Robshaw, M.J.B.: New architectures for low-cost public key cryptography on RFID tags. In: IEEE International Symposium on Circuits and Systems (ISCAS 2007), pp. 1827\u20131830 (May 2007)","DOI":"10.1109\/ISCAS.2007.378269"},{"key":"12_CR14","doi-asserted-by":"publisher","first-page":"519","DOI":"10.1090\/S0025-5718-1985-0777282-X","volume":"44","author":"P.L. Montgomery","year":"1985","unstructured":"Montgomery, P.L.: Modular multiplication without trial division. Mathematics of Computation\u00a044, 519\u2013521 (1985)","journal-title":"Mathematics of Computation"},{"key":"12_CR15","unstructured":"NESSIE. Final report of European project number IST-1999-12324, named new european schemes for signatures, integrity, and encryption (April 2004), \n                  \n                    https:\/\/www.cosic.esat.kuleuven.be\/nessie\/Bookv015.pdf"},{"key":"12_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"115","DOI":"10.1007\/11605805_8","volume-title":"Topics in Cryptology \u2013 CT-RSA 2006","author":"P. Tuyls","year":"2006","unstructured":"Tuyls, P., Batina, L.: RFID-Tags for Anti-counterfeiting. In: Pointcheval, D. (ed.) CT-RSA 2006. LNCS, vol.\u00a03860, pp. 115\u2013131. Springer, Heidelberg (2006)"},{"key":"12_CR17","unstructured":"UMC. UMC standard cell library \u2014 130 nm CMOS process"},{"key":"12_CR18","unstructured":"UMC. UMC standard cell library \u2014 250 nm CMOS process"},{"key":"12_CR19","unstructured":"Wolkerstorfer, J.: Is Elliptic-Curve Cryptography Suitable for Small Devices? In: Workshop on RFID and Lightweight Crypto, Graz, Austria, July 13-15, 2005, pp. 78\u201391 (2005)"}],"container-title":["Lecture Notes in Computer Science","Smart Card Research and Advanced Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-85893-5_12","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,10,6]],"date-time":"2018-10-06T09:51:08Z","timestamp":1538819468000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-85893-5_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008]]},"ISBN":["9783540858928","9783540858935"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-85893-5_12","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2008]]}}}