{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T21:30:04Z","timestamp":1762032604413},"publisher-location":"Berlin, Heidelberg","reference-count":24,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540649519"},{"type":"electronic","value":"9783540539186"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1998]]},"DOI":"10.1007\/bfb0055474","type":"book-chapter","created":{"date-parts":[[2006,7,27]],"date-time":"2006-07-27T09:10:06Z","timestamp":1153991406000},"page":"73-89","source":"Crossref","is-referenced-by-count":31,"title":["Using a high-performance, programmable secure coprocessor"],"prefix":"10.1007","author":[{"given":"Sean W.","family":"Smith","sequence":"first","affiliation":[]},{"given":"Elaine R.","family":"Palmer","sequence":"additional","affiliation":[]},{"given":"Steve","family":"Weingart","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2006,5,28]]},"reference":[{"key":"6_CR1","doi-asserted-by":"publisher","first-page":"206","DOI":"10.1147\/sj.302.0206","volume":"30","author":"D. G. Abraham","year":"1991","unstructured":"D. G. Abraham, G. M. Dolan, G. P. Double, J. V. Stevens. \u201cTransaction Security Systems.\u201d IBM Systems Journal. 30:206\u2013229. 1991.","journal-title":"IBM Systems Journal."},{"key":"6_CR2","unstructured":"R. Anderson, M. Kuhn. \u201cTamper Resistance\u2014A Cautionary Note.\u201d The Second USENIX Workshop on Electronic Commerce. November 1996."},{"key":"6_CR3","doi-asserted-by":"crossref","unstructured":"R. Anderson, M. Kuhn. Low Cost Attacks on Tamper Resistant Devices. Preprint. 1997.","DOI":"10.1007\/BFb0028165"},{"key":"6_CR4","unstructured":"E. Biham, A. Shamir. Differential Fault Analysis: A New Cryptanalytic Attack on Secret Key Cryptosystems. Preprint, 1997."},{"key":"6_CR5","unstructured":"D. Boneh, R. A. DeMillo, R. J. Lipton. On the Importance of Checking Computations. Preprint, 1996."},{"key":"6_CR6","unstructured":"D. Chaum. \u201cDesign Concepts for Tamper Responding Systems.\u201d CRYPTO 83."},{"key":"6_CR7","doi-asserted-by":"crossref","unstructured":"B. Dole, S. Lodin, E. H. Spafford. \u201cMisplaced Trust: Kerberos 4 Session Keys.\u201d ISOC Conference on Network Security. 1997.","DOI":"10.1109\/NDSS.1997.579221"},{"key":"6_CR8","unstructured":"H. Gobioff, S. W. Smith, J. D. Tygar and B. S. Yee. \u201cSmart Cards in Hostile Environments.\u201d The Second USENIX Workshop on Electronic Commerce. November 1996."},{"key":"6_CR9","unstructured":"I. Goldberg, D. Wagner. \u201cRandomness and the Netscape Browser.\u201d Dr. Dobb's Journal. January 1995."},{"key":"6_CR10","unstructured":"IBM PCI Cryptographic Coprocessor. Product Brochure G325-1118. August 1997."},{"key":"6_CR11","doi-asserted-by":"crossref","unstructured":"M. F. Jones and B. Schneier. \u201cSecuring the World Wide Web: Smart Tokens and their Implementation.\u201d Fourth International World Wide Web Conference. December 1995.","DOI":"10.1145\/3592626.3592658"},{"key":"6_CR12","unstructured":"National Institute of Standards and Technology. Security Requirements for Cryptographic Modules. Federal Information Processing Standards Publication 140\u20131, 1994."},{"key":"6_CR13","unstructured":"E. R. Palmer. An Introduction to Citadel\u2014A Secure Crypto Coprocessor for Workstations. Computer Science Research Report RC 18373, IBM T. J. Watson Research Center. September 1992."},{"key":"6_CR14","unstructured":"S. W. Smith. Secure Coprocessing Applications and Research Issues. Los Alamos Unclassified Release LA-UR-96-2805, Los Alamos National Laboratory. August 1996."},{"key":"6_CR15","unstructured":"S. W. Smith, S. H. Weingart. Building a High-Performance, Programmable Secure Coprocessor. Resarch Report RC21102, IBM T.J. Watson Research Center. February 1998."},{"key":"6_CR16","unstructured":"J. D. Tygar and B. S. Yee. \u201cDyad: A System for Using Physically Secure Coprocessors.\u201d Proceedings of the Joint Harvard-MIT Workshop on Technological Strategies for the Protection of Intellectual Property in the Network Multimedia Environment. April 1993. (A preliminary version is available as Computer Science Technical Report CMU-CS-91-140R, Carnegie Mellon University.)"},{"key":"6_CR17","doi-asserted-by":"crossref","unstructured":"S. Vaudenay. \u201cHidden Collisions on DSS.\u201d CRYPTO 1996. LNCS 1109.","DOI":"10.1007\/3-540-68697-5_7"},{"key":"6_CR18","doi-asserted-by":"crossref","unstructured":"S. H. Weingart. \u201cPhysical Security for the \u039cABYSS System.\u201d IEEE Computer Society Conference on Security and Privacy. 1987.","DOI":"10.1109\/SP.1987.10019"},{"key":"6_CR19","doi-asserted-by":"crossref","unstructured":"S. H. Weingart, S. R. White, W. C. Arnold, and G. P. Double. \u201cAn Evaluation System for the Physical Security of Computing Systems.\u201d Sixth Annual Computer Security Applications Conference. 1990.","DOI":"10.1109\/CSAC.1990.143780"},{"key":"6_CR20","doi-asserted-by":"crossref","unstructured":"S. R. White, L. D. Comerford. \u201cABYSS: A Trusted Architecture for Software Protection.\u201d IEEE Computer Society Conference on Security and Privacy. 1987.","DOI":"10.1109\/SP.1987.10021"},{"key":"6_CR21","unstructured":"S. R. White, S. H. Weingart, W. C. Arnold and E. R. Palmer. Introduction to the Citadel Architecture: Security in Physically Exposed Environments. Technical Report, Distributed Systems Security Group. IBM T. J. Watson Research Center. March 1991."},{"key":"6_CR22","unstructured":"B. S. Yee. Using Secure Coprocessors. Ph.D. thesis. Computer Science Technical Report CMU-CS-94-149, Carnegie Mellon University. May 1994."},{"key":"6_CR23","unstructured":"B. S. Yee, J. D. Tygar. \u201cSecure Coprocessors in Electronic Commerce Applications.\u201d The First USENIX Workshop on Electronic Commerce. July 1995."},{"key":"6_CR24","doi-asserted-by":"crossref","unstructured":"A. Young and M. Yung. \u201cThe Dark Side of Black-Box Cryptography\u2014 or\u2014should we trust Capstone?\u201d CRYPTO 1996. LNCS 1109.","DOI":"10.1007\/3-540-68697-5_8"}],"container-title":["Lecture Notes in Computer Science","Financial Cryptography"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/BFb0055474","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,2,5]],"date-time":"2024-02-05T15:55:53Z","timestamp":1707148553000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/BFb0055474"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1998]]},"ISBN":["9783540649519","9783540539186"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/bfb0055474","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[1998]]}}}