{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T15:25:59Z","timestamp":1742916359181,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":16,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642047657"},{"type":"electronic","value":"9783642047664"}],"license":[{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-04766-4_7","type":"book-chapter","created":{"date-parts":[[2009,9,15]],"date-time":"2009-09-15T05:55:53Z","timestamp":1252994153000},"page":"88-103","source":"Crossref","is-referenced-by-count":5,"title":["Blunting Differential Attacks on PIN Processing APIs"],"prefix":"10.1007","author":[{"given":"Riccardo","family":"Focardi","sequence":"first","affiliation":[]},{"given":"Flaminia L.","family":"Luccio","sequence":"additional","affiliation":[]},{"given":"Graham","family":"Steel","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"unstructured":"Hackers crack cash machine PIN codes to steal millions. The Times online, \n                    \n                      http:\/\/www.timesonline.co.uk\/tol\/money\/consumer_affairs\/article4259009.ece","key":"7_CR1"},{"unstructured":"PIN Crackers Nab Holy Grail of Bank Card Security. Wired Magazine Blog Threat Level, \n                    \n                      http:\/\/blog.wired.com\/27bstroke6\/2009\/04\/pins.html","key":"7_CR2"},{"unstructured":"Verizon Data Breach Investigations Report (2009), \n                    \n                      http:\/\/www.verizonbusiness.com\/resources\/security\/reports\/2009_databreach_rp.pdf","key":"7_CR3"},{"unstructured":"Adida, B., Bond, M., Clulow, J., Lin, A., Anderson, R., Rivest, R.L.: On the security of the EMV secure messaging API (2008)","key":"7_CR4"},{"issue":"11","key":"7_CR5","doi-asserted-by":"publisher","first-page":"32","DOI":"10.1145\/188280.188291","volume":"37","author":"R. Anderson","year":"1994","unstructured":"Anderson, R.: Why cryptosystems fail. Commun. ACM\u00a037(11), 32\u201340 (1994)","journal-title":"Commun. ACM"},{"key":"7_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"288","DOI":"10.1007\/11542322_35","volume-title":"Security Protocols","author":"R. Anderson","year":"2005","unstructured":"Anderson, R.: What we can learn from API security. In: Christianson, B., Crispo, B., Malcolm, J.A., Roe, M. (eds.) Security Protocols 2003. LNCS, vol.\u00a03364, pp. 288\u2013300. Springer, Heidelberg (2005)"},{"key":"7_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"224","DOI":"10.1007\/978-3-540-77366-5_20","volume-title":"Financial Cryptography and Data Security","author":"O. Berkman","year":"2007","unstructured":"Berkman, O., Ostrovsky, O.M.: The unbearable lightness of PIN cracking. In: Dietrich, S., Dhamija, R. (eds.) FC 2007 and USEC 2007. LNCS, vol.\u00a04886, pp. 224\u2013238. Springer, Heidelberg (2007)"},{"issue":"1","key":"7_CR8","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/BF00630563","volume":"4","author":"E. Biham","year":"1991","unstructured":"Biham, E., Shamir, A.: Differential cryptanalysis of DES-like cryptosystems. J. Cryptology\u00a04(1), 3\u201372 (1991)","journal-title":"J. Cryptology"},{"unstructured":"Bond, M.: Understanding Security APIs. PhD thesis, University of Cambridge, England (2004), \n                    \n                      http:\/\/www.cl.cam.ac.uk\/~mkb23\/research.html","key":"7_CR9"},{"unstructured":"Bond, M., Zielinski, P.: Decimalization table attacks for pin cracking. Technical Report UCAM-CL-TR-560, University of Cambridge, Computer Laboratory (2003), \n                    \n                      http:\/\/www.cl.cam.ac.uk\/TechReports\/UCAM-CL-TR-560.pdf","key":"7_CR10"},{"unstructured":"Centenaro, M., Focardi, R., Luccio, F.L., Steel, G.: Type-based Analysis of PIN Processing APIs. In: 14th European Symposium on Research in Computer Security, ESORICS 2009. LNCS (to appear, 2009)","key":"7_CR11"},{"unstructured":"Clulow, J.: The design and analysis of cryptographic APIs for security devices. Master\u2019s thesis, University of Natal, Durban (2003)","key":"7_CR12"},{"unstructured":"IBM Inc. CCA Basic Services Reference and Guide for the IBM 4758 PCI and IBM 4764 PCI-X Cryptographic Coprocessors. Technical report. Releases 2.53\u20133.27 (2006), \n                    \n                      http:\/\/www-03.ibm.com\/security\/cryptocards\/pcicc\/library.shtml","key":"7_CR13"},{"issue":"6","key":"7_CR14","doi-asserted-by":"publisher","first-page":"410","DOI":"10.1016\/j.cose.2009.01.006","volume":"28","author":"M. Mannan","year":"2009","unstructured":"Mannan, M., van Oorschot, P.: Reducing threats from flawed security APIs: The banking PIN case. Computers & Security\u00a028(6), 410\u2013420 (2009)","journal-title":"Computers & Security"},{"issue":"2","key":"7_CR15","doi-asserted-by":"publisher","first-page":"157","DOI":"10.3233\/JCS-2006-14203","volume":"14","author":"A.C. Myers","year":"2006","unstructured":"Myers, A.C., Sabelfeld, A., Zdancewic, S.: Enforcing robust declassification and qualified robustness. Journal of Computer Security\u00a014(2), 157\u2013196 (2006)","journal-title":"Journal of Computer Security"},{"issue":"1-2","key":"7_CR16","doi-asserted-by":"publisher","first-page":"257","DOI":"10.1016\/j.tcs.2006.08.042","volume":"367","author":"G. Steel","year":"2006","unstructured":"Steel, G.: Formal Analysis of PIN Block Attacks. Theoretical Computer Science\u00a0367(1-2), 257\u2013270 (2006)","journal-title":"Theoretical Computer Science"}],"container-title":["Lecture Notes in Computer Science","Identity and Privacy in the Internet Age"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-04766-4_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,19]],"date-time":"2019-05-19T12:37:22Z","timestamp":1558269442000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-04766-4_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642047657","9783642047664"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-04766-4_7","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2009]]}}}