{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T22:25:03Z","timestamp":1743114303431,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":31,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642545672"},{"type":"electronic","value":"9783642545689"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-642-54568-9_2","type":"book-chapter","created":{"date-parts":[[2014,3,20]],"date-time":"2014-03-20T14:31:35Z","timestamp":1395325895000},"page":"17-33","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":13,"title":["Performance Evaluation of Primitives for Privacy-Enhancing Cryptography on Current Smart-Cards and Smart-Phones"],"prefix":"10.1007","author":[{"given":"Jan","family":"Hajny","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Lukas","family":"Malina","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Zdenek","family":"Martinasek","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Ondrej","family":"Tethal","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2014,3,21]]},"reference":[{"key":"2_CR1","series-title":"LNCS","doi-asserted-by":"publisher","first-page":"172","DOI":"10.1007\/978-3-642-31410-0_11","volume-title":"AFRICACRYPT 2012","author":"T Eisenbarth","year":"2012","unstructured":"Eisenbarth, T., et al.: Compact implementation and performance evaluation of block ciphers in attiny devices. In: Mitrokotsa, A., Vaudenay, S. (eds.) AFRICACRYPT 2012. LNCS, vol. 7374, pp. 172\u2013187. Springer, Heidelberg (2012)"},{"doi-asserted-by":"crossref","unstructured":"Balasch, J., Ege, B., Eisenbarth, T., G\u00e9rard, B., Gong, Z., G\u00fcneysu, T., Heyse, S., Kerckhof, S., Koeune, F., Plos, T., P\u00f6ppelmann, T., Regazzoni, F., Standaert, F.X., Assche, G.V., Keer, R.V., van Oldeneel tot Oldenzeel, L., von Maurich, I.: Compact implementation and performance evaluation of hash functions in attiny devices. IACR Cryptology ePrint Archive (2012)","key":"2_CR2","DOI":"10.1007\/978-3-642-37288-9_11"},{"unstructured":"Oracle: Javacard. http:\/\/www.oracle.com\/technetwork\/java\/javacard\/downloads\/index.html (2013)","key":"2_CR3"},{"unstructured":"Gemalto: .net card. http:\/\/www.gemalto.com\/products\/dotnet_card\/ (2013)","key":"2_CR4"},{"unstructured":"MultOS: Multos card. http:\/\/www.multos.com (2013)","key":"2_CR5"},{"unstructured":"Deloitte: The deloitte open mobile survey 2012. http:\/\/www.deloitte.com\/assets\/Dcom-Norway\/Local%20Assets\/Documents\/Publikasjoner%202012\/deloitte_openmobile2012.pdf (2012)","key":"2_CR6"},{"unstructured":"Cramer, R.: Modular design of secure, yet practical cryptographic protocols. Ph.D. thesis, University of Amsterdam (1996)","key":"2_CR7"},{"unstructured":"Camenisch, J., Stadler, M.: Proof systems for general statements about discrete logarithms. Technical report (1997)","key":"2_CR8"},{"key":"2_CR9","series-title":"LNCS","first-page":"129","volume-title":"CRYPTO 1991","author":"TP Pedersen","year":"1992","unstructured":"Pedersen, T.P.: Non-interactive and information-theoretic secure verifiable secret sharing. In: Feigenbaum, J. (ed.) CRYPTO 1991. LNCS, vol. 576, pp. 129\u2013140. Springer, Heidelberg (1992)"},{"doi-asserted-by":"crossref","unstructured":"Chaum, D., Van Heyst, E.: Group signatures. In: Proceedings of the 10th Annual International Conference on Theory and Application of Cryptographic Techniques, EUROCRYPT\u201991, pp. 257\u2013265. Springer, Heidelberg (1991)","key":"2_CR10","DOI":"10.1007\/3-540-46416-6_22"},{"key":"2_CR11","series-title":"LNCS","first-page":"32","volume-title":"EUROCRYPT 1998","author":"MA Stadler","year":"1998","unstructured":"Stadler, M.A., Fujisaki, E., Okamoto, T.: A practical and provably secure scheme for publicly verifiable secret sharing and its applications. In: Nyberg, K. (ed.) EUROCRYPT 1998. LNCS, vol. 1403, pp. 32\u201346. Springer, Heidelberg (1998)"},{"key":"2_CR12","series-title":"LNCS","doi-asserted-by":"publisher","first-page":"93","DOI":"10.1007\/3-540-44987-6_7","volume-title":"EUROCRYPT 2001","author":"JL Camenisch","year":"2001","unstructured":"Camenisch, J.L., Lysyanskaya, A.: An efficient system for non-transferable anonymous credentials with optional anonymity revocation. In: Pfitzmann, B. (ed.) EUROCRYPT 2001. LNCS, vol. 2045, p. 93. Springer, Heidelberg (2001)"},{"doi-asserted-by":"crossref","unstructured":"Bichsel, P., Camenisch, J., Gro\u00df, T., Shoup, V.: Anonymous credentials on a standard java card. In: Proceedings of the 16th ACM Conference on Computer and Communications Security, CCS \u201909, pp. 600\u2013610. ACM, New York (2009)","key":"2_CR13","DOI":"10.1145\/1653662.1653734"},{"key":"2_CR14","series-title":"LNICST","first-page":"243","volume-title":"SecureComm 2011","author":"W Mostowski","year":"2012","unstructured":"Mostowski, W., Vullers, P.: Efficient u-prove implementation for anonymous credentials on smart cards. In: Rajarajan, M., Piper, F., Wang, H., Kesidis, G. (eds.) SecureComm 2011. LNICST, vol. 96, pp. 243\u2013260. Springer, Heidelberg (2012)"},{"issue":"2","key":"2_CR15","first-page":"363","volume":"19","author":"J. Hajny","year":"2010","unstructured":"Hajny, J.: Anonymous authentication for smartcards. Radioengineering 19(2), 363\u2013368 (2010)","journal-title":"Radioengineering"},{"doi-asserted-by":"crossref","unstructured":"Malina, L., Hajny, J.: Accelerated modular arithmetic for low-performance devices. In: 34th International Conference on Telecommunications and Signal Processing, pp. 131\u2013135. IEEE (2011)","key":"2_CR16","DOI":"10.1109\/TSP.2011.6043757"},{"unstructured":"Camenisch, J., et al.: Specification of the identity mixer cryptographic library. Technical report. http:\/\/domino.research.ibm.com\/library\/cyberdig.nsf\/1e4115aea78b6e7c85256b360066f0d4\/eeb54ff3b91c1d648525759b004fbbb1?OpenDocument (2010)","key":"2_CR17"},{"unstructured":"Paquin, C.: U-prove cryptographic specification v1.1. Technical report. http:\/\/research.microsoft.com\/apps\/pubs\/default.aspx?id=166969 (2011)","key":"2_CR18"},{"key":"2_CR19","series-title":"LNCS","first-page":"62","volume-title":"CARDIS 2012","author":"J Hajny","year":"2013","unstructured":"Hajny, J., Malina, L.: Unlinkable attribute-based credentials with practical revocation on smart-cards. In: Mangard, S. (ed.) CARDIS 2012. LNCS, vol. 7771, pp. 62\u201376. Springer, Heidelberg (2013)"},{"unstructured":"FIPS: Data encryption standard. In: Federal Information Processing Standards Publication, FIPS PUB 46, 46\u20132 (1977)","key":"2_CR20"},{"unstructured":"FIPS: Advanced encryption standard (aes). In: Federal Information Processing Standards Publication, FIPS PUB 197, pp. 1\u201347 (2001)","key":"2_CR21"},{"key":"2_CR22","doi-asserted-by":"publisher","first-page":"120","DOI":"10.1145\/359340.359342","volume":"21","author":"R Rivest","year":"1978","unstructured":"Rivest, R., Shamir, A., Adleman, L.: A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM 21, 120\u2013126 (1978)","journal-title":"Commun. ACM"},{"unstructured":"National Institute of Standards and Technology (U.S.) : Digital Signature Standard (DSS) [electronic resource]. U.S. Deptartment of Commerce, National Institute of Standards and Technology, Gaithersburg (2009)","key":"2_CR23"},{"doi-asserted-by":"crossref","unstructured":"Rivest, R.: The md5 message-digest algorithm. http:\/\/www.ietf.org\/rfc\/rfc1321.txt (1992)","key":"2_CR24","DOI":"10.17487\/rfc1321"},{"unstructured":"FIPS: Secure hash standard (shs) (2012)","key":"2_CR25"},{"key":"2_CR26","doi-asserted-by":"publisher","first-page":"161","DOI":"10.1007\/BF00196725","volume":"4","author":"CP Schnorr","year":"1991","unstructured":"Schnorr, C.P.: Efficient signature generation by smart cards. J. Cryptol. 4, 161\u2013174 (1991)","journal-title":"J. Cryptol."},{"key":"2_CR27","series-title":"LNCS","first-page":"186","volume-title":"CRYPTO 1986","author":"A Fiat","year":"1987","unstructured":"Fiat, A., Shamir, A.: How to prove yourself: practical solutions to identification and signature problems. In: Odlyzko, A.M. (ed.) CRYPTO 1986. LNCS, vol. 263, pp. 186\u2013194. Springer, Heidelberg (1987)"},{"key":"2_CR28","series-title":"LNCS","first-page":"308","volume-title":"EUROCRYPT 1998","author":"T Okamoto","year":"1998","unstructured":"Okamoto, T., Uchiyama, S.: A new public-key cryptosystem as secure as factoring. In: Nyberg, K. (ed.) EUROCRYPT 1998. LNCS, vol. 1403, pp. 308\u2013318. Springer, Heidelberg (1998)"},{"unstructured":"Id-one cosmo v7.0: Technical report, French Network and Information Security Agency (Agence Nationale de la Scurit des Systmes dInformation (ANSSI)). http:\/\/www.ssi.gouv.fr\/IMG\/certificat\/anssi-cc-cible_2009-36en.pdf (2009)","key":"2_CR29"},{"unstructured":"Atmel: At90sc256144rcft datasheet. http:\/\/datasheet.elcodis.com\/pdf2\/104\/7\/1040758\/at90sc256144rcft.pdf (2007)","key":"2_CR30"},{"unstructured":"NIST: Gemxpresso r4 e36\/e72 pk\u2014multiapp id 36k\/72k\u2014top im gx4. http:\/\/csrc.nist.gov\/groups\/STM\/cmvp\/documents\/140-1\/140sp\/140sp771.pdf (2009)","key":"2_CR31"}],"container-title":["Lecture Notes in Computer Science","Data Privacy Management and Autonomous Spontaneous Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-54568-9_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,14]],"date-time":"2023-02-14T12:17:36Z","timestamp":1676377056000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-642-54568-9_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783642545672","9783642545689"],"references-count":31,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-54568-9_2","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2014]]},"assertion":[{"value":"21 March 2014","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}