{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,24]],"date-time":"2026-04-24T04:54:30Z","timestamp":1777006470311,"version":"3.51.4"},"publisher-location":"Berlin, Heidelberg","reference-count":24,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540858928","type":"print"},{"value":"9783540858935","type":"electronic"}],"license":[{"start":{"date-parts":[[2008,1,1]],"date-time":"2008-01-01T00:00:00Z","timestamp":1199145600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008]]},"DOI":"10.1007\/978-3-540-85893-5_8","type":"book-chapter","created":{"date-parts":[[2008,8,29]],"date-time":"2008-08-29T06:28:18Z","timestamp":1219991298000},"page":"104-117","source":"Crossref","is-referenced-by-count":39,"title":["Fast Hash-Based Signatures on Constrained Devices"],"prefix":"10.1007","author":[{"given":"Sebastian","family":"Rohde","sequence":"first","affiliation":[]},{"given":"Thomas","family":"Eisenbarth","sequence":"additional","affiliation":[]},{"given":"Erik","family":"Dahmen","sequence":"additional","affiliation":[]},{"given":"Johannes","family":"Buchmann","sequence":"additional","affiliation":[]},{"given":"Christof","family":"Paar","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"8_CR1","unstructured":"Rijndaelfurious implementation (January 2008), http:\/\/point-at-infinity.org\/avraes\/"},{"key":"8_CR2","unstructured":"Atmel. Overview of secure avr microcontrollers 8-\/16-bit risc cpu (2007), http:\/\/www.atmel.com\/products\/SecureAVR\/"},{"key":"8_CR3","unstructured":"Atmel. Specifications of the atmega128 microcontroller (2007), http:\/\/www.atmel.com\/dyn\/resources\/prod_documents\/doc2467.pdf"},{"key":"8_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"349","DOI":"10.1007\/11941378_25","volume-title":"Progress in Cryptology - INDOCRYPT 2006","author":"J. Buchmann","year":"2006","unstructured":"Buchmann, J., Coronado, C., Dahmen, E., D\u00f6ring, M., Klintsevich, E.: CMSS - an improved merkle signature scheme. In: Barua, R., Lange, T. (eds.) INDOCRYPT 2006. LNCS, vol.\u00a04329, pp. 349\u2013363. Springer, Heidelberg (2006)"},{"key":"8_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1007\/978-3-540-72738-5_3","volume-title":"Applied Cryptography and Network Security","author":"J. Buchmann","year":"2007","unstructured":"Buchmann, J., Dahmen, E., Klintsevich, E., Okeya, K., Vuillaume, C.: Merkle signatures with virtually unlimited signature capacity. In: Katz, J., Yung, M. (eds.) ACNS 2007. LNCS, vol.\u00a04521, pp. 31\u201345. Springer, Heidelberg (2007)"},{"key":"8_CR6","doi-asserted-by":"crossref","unstructured":"Buchmann, J., Dahmen, E., Schneider, M.: Merkle tree traversal revisited (manuscript, 2008), http:\/\/www.cdc.informatik.tu-darmstadt.de\/mitarbeiter\/dahmen.html","DOI":"10.1007\/978-3-540-88403-3_5"},{"key":"8_CR7","series-title":"Lecture Notes in Computer Science","volume-title":"Wireless Algorithms, Systems, and Applications","year":"2006","unstructured":"Cheng, X., Li, W., Znati, T. (eds.): WASA 2006. LNCS, vol.\u00a04138. Springer, Heidelberg (2006)"},{"key":"8_CR8","unstructured":"Coronado, C.: On the security and the efficiency of the merkle signature scheme. Cryptology ePrint Archive, Report 2005\/192 (2005), http:\/\/eprint.iacr.org\/"},{"key":"8_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"96","DOI":"10.1007\/11586821_8","volume-title":"Cryptography and Coding","author":"C. Dods","year":"2005","unstructured":"Dods, C., Smart, N.P., Stam, M.: Hash based digital signature schemes. In: Smart, N.P. (ed.) Cryptography and Coding 2005. LNCS, vol.\u00a03796, pp. 96\u2013115. Springer, Heidelberg (2005)"},{"key":"8_CR10","doi-asserted-by":"crossref","unstructured":"Driessen, B., Poschmann, A., Paar, C.: Comparison of Innovative Signature Algorithms for WSNs. In: Proceedings of the First ACM Conference on Wireless Network Security (to appear)","DOI":"10.1145\/1352533.1352539"},{"key":"8_CR11","unstructured":"ePractice.eu. Belgian electronic ID card officially launched (April 2003), http:\/\/www.epractice.eu\/document\/2139"},{"key":"8_CR12","unstructured":"Digital signature standard (DSS). FIPS PUB 186-2 (2007), http:\/\/csrc.nist.gov\/publications\/fips\/"},{"key":"8_CR13","doi-asserted-by":"publisher","first-page":"151","DOI":"10.1145\/941350.941372","volume-title":"WSNA 2003: Proceedings of the 2nd ACM international conference on Wireless sensor networks and applications","author":"P. Ganesan","year":"2003","unstructured":"Ganesan, P., Venugopalan, R., Peddabachagari, P., Dean, A., Mueller, F., Sichitiu, M.: Analyzing and modeling encryption overhead for sensor network nodes. In: WSNA 2003: Proceedings of the 2nd ACM international conference on Wireless sensor networks and applications, pp. 151\u2013159. ACM Press, New York (2003)"},{"key":"8_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"119","DOI":"10.1007\/978-3-540-28632-5_9","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2004","author":"N. Gura","year":"2004","unstructured":"Gura, N., Patel, A., Wander, A., Eberle, H., Shantz, S.C.: Comparing elliptic curve cryptography and rsa on 8-bit cpus. In: Joye, M., Quisquater, J.-J. (eds.) CHES 2004. LNCS, vol.\u00a03156, pp. 119\u2013132. Springer, Heidelberg (2004)"},{"key":"8_CR15","unstructured":"Labor, D.: Crypto-avr-lib (January 2008), http:\/\/www.das-labor.org\/wiki\/Crypto-avr-lib"},{"key":"8_CR16","unstructured":"Lenstra, A.K.: Key lengths. Contribution to The Handbook of Information Security (2004), http:\/\/cm.bell-labs.com\/who\/akl\/key_lengths.pdf"},{"key":"8_CR17","doi-asserted-by":"crossref","unstructured":"Liu, A., Ning, P.: TinyECC: A Configurable Library for Elliptic Curve Cryptography in Wireless Sensor Networks. Technical Report TR-2007-36, North Carolina State University, Department of Computer Science (November 2007)","DOI":"10.1109\/IPSN.2008.47"},{"key":"8_CR18","doi-asserted-by":"crossref","unstructured":"Luk, M., Perrig, A., Whillock, B.: Seven cardinal properties of sensor network broadcast authentication. In: Proceedings of the fourth ACM workshop on Security of ad hoc and sensor networks, pp. 147\u2013156 (2006)","DOI":"10.1145\/1180345.1180364"},{"key":"8_CR19","doi-asserted-by":"publisher","DOI":"10.1201\/9781439821916","volume-title":"Handbook of Applied Cryptography","author":"A.J. Menezes","year":"1996","unstructured":"Menezes, A.J., Vanstone, S.A., van Oorschot, P.C.: Handbook of Applied Cryptography. CRC Press, Boca Raton (1996)"},{"key":"8_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"218","DOI":"10.1007\/0-387-34805-0_21","volume-title":"Advances in Cryptology - CRYPTO \u201989","author":"R.C. Merkle","year":"1990","unstructured":"Merkle, R.C.: A certified digital signature. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol.\u00a0435, pp. 218\u2013238. Springer, Heidelberg (1990)"},{"key":"8_CR21","unstructured":"Naor, D., Shenhav, A., Wool, A.: One-time signatures revisited: Have they become practical. Cryptology ePrint Archive, Report 2005\/442 (2005), http:\/\/eprint.iacr.org\/"},{"key":"8_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"34","DOI":"10.1007\/978-3-540-72540-4_3","volume-title":"Advances in Cryptology - EUROCRYPT 2007","author":"J.P. Steinberger","year":"2007","unstructured":"Steinberger, J.P.: The collision intractability of mdc-2 in the ideal-cipher model. In: Naor, M. (ed.) EUROCRYPT 2007. LNCS, vol.\u00a04515, pp. 34\u201351. Springer, Heidelberg (2007)"},{"key":"8_CR23","unstructured":"Viega, J.: The AHASH Mode of Operation (manuscript, 2004), http:\/\/www.cryptobarn.com\/"},{"key":"8_CR24","doi-asserted-by":"crossref","unstructured":"Yu-long, S., Jian-feng, M., Qing-qi, P.: An Access Control Scheme in Wireless Sensor Networks. In: IFIP International Conference on Network and Parallel Computing Workshops, 2007, pp. 362\u2013367 (2007)","DOI":"10.1109\/NPC.2007.99"}],"container-title":["Lecture Notes in Computer Science","Smart Card Research and Advanced Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-85893-5_8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,9,15]],"date-time":"2021-09-15T18:34:45Z","timestamp":1631730885000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-85893-5_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008]]},"ISBN":["9783540858928","9783540858935"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-85893-5_8","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2008]]}}}