{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,7]],"date-time":"2026-05-07T09:20:50Z","timestamp":1778145650972,"version":"3.51.4"},"publisher-location":"Berlin, Heidelberg","reference-count":35,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783642319112","type":"print"},{"value":"9783642319129","type":"electronic"}],"license":[{"start":{"date-parts":[[2012,1,1]],"date-time":"2012-01-01T00:00:00Z","timestamp":1325376000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-31912-9_20","type":"book-chapter","created":{"date-parts":[[2012,7,14]],"date-time":"2012-07-14T07:57:56Z","timestamp":1342252676000},"page":"302-318","source":"Crossref","is-referenced-by-count":73,"title":["Design, Implementation, and Evaluation of a Vehicular Hardware Security Module"],"prefix":"10.1007","author":[{"given":"Marko","family":"Wolf","sequence":"first","affiliation":[]},{"given":"Timo","family":"Gendrullis","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"20_CR1","unstructured":"Abdalla, M., Bellare, M., Rogaway, P.: DHAES: An encryption scheme based on the Diffie-Hellman problem. Submission to P1363a: Standard Specifications for Public-Key Cryptography, Additional Techniques 5 (2000)"},{"key":"20_CR2","unstructured":"Checkoway, S., et al.: Comprehensive Experimental Analyses of Automotive Attack Surfaces. National Academy of Sciences Committee on Electronic Vehicle Controls and Unintended Acceleration (2011)"},{"key":"20_CR3","doi-asserted-by":"crossref","unstructured":"Diffie, W., Hellman, M.: New Directions in Cryptography. IEEE Transactions on Information Theory\u00a022(6) (1976)","DOI":"10.1109\/TIT.1976.1055638"},{"key":"20_CR4","doi-asserted-by":"crossref","unstructured":"Dyer, J., Lindemann, M., Perez, R., Sailer, R., Van Doorn, L., Smith, S., Weingart, S.: Building the IBM 4758 Secure Coprocessor. IEEE Computer\u00a034(10) (2001)","DOI":"10.1109\/2.955100"},{"key":"20_CR5","unstructured":"escrypt GmbH \u2013 Embedded Security: CycurLIB - Cryptographic Software Library (2011), \n                    \n                      http:\/\/www.escrypt.com\/products\/cycurlib\/overview\/"},{"key":"20_CR6","unstructured":"EVITA: Deliverable 2.1: Specification and Evaluation of E-Security Relevant Use Cases (2008)"},{"key":"20_CR7","unstructured":"EVITA: Deliverable 2.3: Security Requirements for Automotive On-Board Networks Based on Dark-Side Scenarios (2009)"},{"key":"20_CR8","doi-asserted-by":"crossref","unstructured":"EVITA: Deliverable 3.1.2: Security and Trust Model (2009)","DOI":"10.1016\/S1361-3723(09)70065-X"},{"key":"20_CR9","unstructured":"EVITA: Deliverable 3.2: Secure On-board Architecture Specification (2010)"},{"key":"20_CR10","unstructured":"EVITA: Deliverable 3.3: Secure On-Board Protocols Specification (2010)"},{"key":"20_CR11","unstructured":"EVITA: Deliverable 4.1.3: Security Hardware FPGA Prototype (2011)"},{"key":"20_CR12","unstructured":"EVITA: Deliverable 4.2.2: Basic Software (2011)"},{"key":"20_CR13","unstructured":"EVITA: Deliverable 4.3.2: Implementation of Software Framework (2011)"},{"key":"20_CR14","unstructured":"EVITA: Deliverable 5.1.2: On-board Communication Demonstrator (2011)"},{"key":"20_CR15","unstructured":"EVITA Project: E-safety Vehicle Intrusion proTected Applications, European Commission research grant FP7-ICT-224275 (2008), \n                    \n                      http:\/\/www.evita-project.org"},{"key":"20_CR16","unstructured":"FIPS-186-3: Digital Signature Standard (DSS). NIST (1994, 2006)"},{"key":"20_CR17","unstructured":"FIPS-197: Advanced Encryption Standard (AES). NIST (2001)"},{"key":"20_CR18","unstructured":"Frischkorn, H.G.: Automotive Software \u2013 The Silent Revolution. In: Workshop on Future Generation Software Architectures in the Automotive Domain, San Diego, CA, USA, January 10- 12 (2004)"},{"key":"20_CR19","unstructured":"Furgel, I., Lemke, K.: A Review of the Digital Tachograph System. In: Embedded Security in Cars: Securing Current and Future Automotive IT Applications. Springer (2006)"},{"key":"20_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"62","DOI":"10.1007\/978-3-540-85053-3_5","volume-title":"Cryptographic Hardware and Embedded Systems \u2013 CHES 2008","author":"T. G\u00fcneysu","year":"2008","unstructured":"G\u00fcneysu, T., Paar, C.: Ultra High Performance ECC over NIST Primes on Commercial FPGAs. In: Oswald, E., Rohatgi, P. (eds.) CHES 2008. LNCS, vol.\u00a05154, pp. 62\u201378. Springer, Heidelberg (2008)"},{"key":"20_CR21","unstructured":"Herstellerinitiative Software (HIS): SHE Secure Hardware Extension Version 1.1 (2009), \n                    \n                      http:\/\/portal.automotive-his.de"},{"key":"20_CR22","unstructured":"International Telecommunication Union \u2013 ITU-T Study Group 7: Abstract Syntax Notation number One \u2013 ASN.1 (1995), \n                    \n                      http:\/\/www.itu.int\/ITU-T\/asn1\/"},{"key":"20_CR23","unstructured":"ISO\/IEC 10118-3:2004: Information technology \u2013 Security techniques \u2013 Hash-functions \u2013 Part 3: Dedicated hash-functions. ISO\/IEC (2004)"},{"key":"20_CR24","unstructured":"ISO\/IEC 11898:2003-2007: Information technology \u2013 Road vehicles Controller area network. ISO\/IEC (2007)"},{"key":"20_CR25","unstructured":"ISO\/IEC 18033-2:2006: Information technology - Security techniques - Encryption algorithms - Part 2: Asymmetric ciphers. ISO\/IEC (2006)"},{"key":"20_CR26","doi-asserted-by":"crossref","unstructured":"Koscher, K., et al.: Experimental Security Analysis of a Modern Automobile. In: IEEE Symposium on Security and Privacy (2010)","DOI":"10.1109\/SP.2010.34"},{"key":"20_CR27","unstructured":"Lemke, K.: Physical Protection against Tampering Attacks. In: Embedded Security in Cars: Securing Current and Future Automotive IT Applications. Springer (2006)"},{"key":"20_CR28","unstructured":"Luo, J., Hubaux, J.: A Survey of Inter-Vehicle Communication. EPFL, Lausanne, Switzerland, Tech. Rep (2004)"},{"key":"20_CR29","unstructured":"PRECIOSA Project: Privacy Enabled Capability in Co-operative Systems and Safety Applications (2008), \n                    \n                      http:\/\/www.preciosa-project.org"},{"key":"20_CR30","unstructured":"PRESERVE Project: Preparing Secure Vehicle-to-X Communication Systems (2011), \n                    \n                      http:\/\/www.preserve-project.eu"},{"key":"20_CR31","unstructured":"Schindler, W.: AIS 20 \u2013 Functionality classes and evaluation methodology for deterministic random number generators. German Federal Office for Information Security (BSI) (1999)"},{"key":"20_CR32","unstructured":"SeVeCom Project: Secure Vehicular Communication (2006), \n                    \n                      http:\/\/www.sevecom.org"},{"key":"20_CR33","unstructured":"Song, J., Poovendran, R., Lee, J., Iwata, T.: The AES-CMAC Algorithm. RFC4493, IETF (June 2006)"},{"key":"20_CR34","unstructured":"Toll Collect GmbH (2011), \n                    \n                      http:\/\/www.toll-collect.com"},{"key":"20_CR35","unstructured":"Trusted Computing Group (TCG): TPM Specification 1.2 Revision 116 (2011), \n                    \n                      http:\/\/www.trustedcomputinggroup.org"}],"container-title":["Lecture Notes in Computer Science","Information Security and Cryptology - ICISC 2011"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-31912-9_20","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,20]],"date-time":"2019-05-20T00:55:18Z","timestamp":1558313718000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-31912-9_20"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642319112","9783642319129"],"references-count":35,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-31912-9_20","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2012]]}}}