{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,5]],"date-time":"2025-10-05T04:25:20Z","timestamp":1759638320484},"reference-count":22,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2011,6,17]],"date-time":"2011-06-17T00:00:00Z","timestamp":1308268800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Theory Comput Syst"],"published-print":{"date-parts":[[2012,1]]},"DOI":"10.1007\/s00224-011-9340-9","type":"journal-article","created":{"date-parts":[[2011,6,17]],"date-time":"2011-06-17T15:06:13Z","timestamp":1308323173000},"page":"52-71","source":"Crossref","is-referenced-by-count":13,"title":["Guessing Bank PINs by Winning a Mastermind Game"],"prefix":"10.1007","volume":"50","author":[{"given":"Riccardo","family":"Focardi","sequence":"first","affiliation":[]},{"given":"Flaminia L.","family":"Luccio","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2011,6,17]]},"reference":[{"key":"9340_CR1","unstructured":"Hackers crack cash machine PIN codes to steal millions. The Times online. http:\/\/www.timesonline.co.uk\/tol\/money\/consumer_affairs\/article4259009.ece"},{"key":"9340_CR2","unstructured":"Mastermind. http:\/\/commons.wikimedia.org\/wiki\/File:Mastermind.jpg"},{"key":"9340_CR3","unstructured":"PIN Crackers Nab Holy Grail of Bank Card Security. Wired magazine blog \u2019Threat Level\u2019. http:\/\/blog.wired.com\/27bstroke6\/2009\/04\/pins.html"},{"key":"9340_CR4","first-page":"307","volume-title":"Proc. ACM Symp. Applied Computing","author":"L. Bento","year":"1999","unstructured":"Bento, L., Pereira, L., Rosa, A.: Mastermind by evolutionary algorithms. In: Proc. ACM Symp. Applied Computing, San Antonio, Texas, 28 February\u20132 March, pp.\u00a0307\u2013311. ACM Press, New York (1999)"},{"key":"9340_CR5","unstructured":"Berghman, L., Goossens, D., Leus, R.: Efficient solutions for Mastermind using genetic algorithms. Technical report KBI 0806, Katholieke Universiteit Leuven, Department of Decision Sciences and Information Management, 2006"},{"key":"9340_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"224","DOI":"10.1007\/978-3-540-77366-5_20","volume-title":"11th International Conference, Financial Cryptography and Data Security (FC 2007)","author":"O. Berkman","year":"2007","unstructured":"Berkman, O., Ostrovsky, O.M.: The unbearable lightness of PIN cracking. In: 11th International Conference, Financial Cryptography and Data Security (FC 2007), Scarborough, Trinidad and Tobago, February 12\u201316. Lecture Notes in Computer Science, vol. 48862, pp.\u00a0224\u2013238. Springer, Berlin (2007)"},{"key":"9340_CR7","doi-asserted-by":"crossref","first-page":"13","DOI":"10.1016\/j.entcs.2004.09.036","volume":"125","author":"M. Bond","year":"2005","unstructured":"Bond, M., Clulow, J.: Extending security protocol analysis: new challenges. Electron. Notes Theor. Comput. Sci. 125, 13\u201324 (2005)","journal-title":"Electron. Notes Theor. Comput. Sci."},{"key":"9340_CR8","unstructured":"Bond, M., Zielinski, P.: Decimalization table attacks for pin cracking. Technical report UCAM-CL-TR-560, University of Cambridge, Computer Laboratory, 2003. http:\/\/www.cl.cam.ac.uk\/TechReports\/UCAM-CL-TR-560.pdf"},{"key":"9340_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"53","DOI":"10.1007\/978-3-642-04444-1_4","volume-title":"Proceedings of the 14th European Symposium on Research in Computer Security (ESORICS 09)","author":"M. Centenaro","year":"2009","unstructured":"Centenaro, M., Focardi, R., Luccio, F., Steel, G.: Type-based analysis of PIN processing APIs. In: Proceedings of the 14th European Symposium on Research in Computer Security (ESORICS 09). Lecture Notes in Computer Science, vol.\u00a05789, pp.\u00a053\u201368. Springer, Berlin (2009)"},{"key":"9340_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"50","DOI":"10.1007\/3-540-61332-3_138","volume-title":"Computing and Combinatorics Second Annual International Conference (COCOON 96)","author":"Z. Chen","year":"1996","unstructured":"Chen, Z., Cunha, C., Homer, S.: Finding a hidden code by asking questions. In: Computing and Combinatorics Second Annual International Conference (COCOON 96), Hong Kong, June 17\u201319. Lecture Notes in Computer Science, vol.\u00a01090, pp.\u00a050\u201355. Springer, Berlin (1996)"},{"key":"9340_CR11","doi-asserted-by":"crossref","first-page":"325","DOI":"10.1007\/BF02579188","volume":"3","author":"V. Chvatal","year":"1983","unstructured":"Chvatal, V.: Mastermind. Combinatorica 3, 325\u2013329 (1983)","journal-title":"Combinatorica"},{"key":"9340_CR12","unstructured":"Clulow, J.: The design and analysis of cryptographic APIs for security devices. Master\u2019s thesis, University of Natal, Durban, 2003"},{"key":"9340_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"88","DOI":"10.1007\/978-3-642-04766-4_7","volume-title":"Proceedings of the 14th Nordic Conference on Secure IT Systems (NORDSEC 09)","author":"R. Focardi","year":"2009","unstructured":"Focardi, R., Luccio, F., Steel, G.: Blunting differential attacks on PIN processing APIs. In: Proceedings of the 14th Nordic Conference on Secure IT Systems (NORDSEC 09), October. Lecture Notes in Computer Science, vol.\u00a05838\/2009, pp.\u00a088\u2013103. Springer, Berlin (2009)"},{"key":"9340_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"202","DOI":"10.1007\/978-3-642-13122-6_21","volume-title":"Proc. Fith International Conference Fun with algorithms (FUN 10)","author":"R. Focardi","year":"2010","unstructured":"Focardi, R., Luccio, F.L.: Cracking bank pins by playing mastermind. In: Proc. Fith International Conference Fun with algorithms (FUN 10), June 2\u20134. Lecture Notes in Computer Science, vol.\u00a06099, pp.\u00a0202\u2013213. Springer, Berlin (2010)"},{"key":"9340_CR15","doi-asserted-by":"crossref","unstructured":"Focardi, R., Luccio, F.L.: Cracking bank pins by playing mastermind. http:\/\/www.dsi.unive.it\/~focardi\/MM_PIN\/FUN10corrected.pdf (2010). Corrected version of FUN10","DOI":"10.1007\/978-3-642-13122-6_21"},{"key":"9340_CR16","first-page":"215","volume":"51","author":"W. Goddard","year":"2004","unstructured":"Goddard, W.: Mastermind revisited. J. Comb. Math. Comb. Comput. 51, 215\u2013220 (2004)","journal-title":"J. Comb. Math. Comb. Comput."},{"key":"9340_CR17","doi-asserted-by":"crossref","first-page":"635","DOI":"10.1016\/j.ipl.2009.02.016","volume":"109","author":"G. J\u00e4ger","year":"2009","unstructured":"J\u00e4ger, G., Pezarski, M.: The number of pessimistic guesses in generalized mastermind. Inf. Process. Lett. 109, 635\u2013641 (2009)","journal-title":"Inf. Process. Lett."},{"key":"9340_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"1590","DOI":"10.1007\/3-540-45110-2_39","volume-title":"Proc. Genetic and Evolutionary Computation Conference (GECCO 03)","author":"T. Kalisker","year":"2003","unstructured":"Kalisker, T., Camens, D.: Solving mastermind using genetic algorithms. In: Proc. Genetic and Evolutionary Computation Conference (GECCO 03), July 12\u201316. Lecture Notes in Computer Science, vol.\u00a02724, pp.\u00a01590\u20131591. Springer, Berlin (2003)"},{"key":"9340_CR19","first-page":"1","volume":"9","author":"D. Knuth","year":"1976","unstructured":"Knuth, D.: The computer as a master mind. J. Recreat. Math. 9, 1\u20136 (1976)","journal-title":"J. Recreat. Math."},{"key":"9340_CR20","first-page":"251","volume":"25","author":"M. Koyama","year":"1993","unstructured":"Koyama, M., Lai, T.: An optimal mastermind strategy. J. Recreat. Math. 25, 251\u2013256 (1993)","journal-title":"J. Recreat. Math."},{"issue":"1\u20132","key":"9340_CR21","doi-asserted-by":"crossref","first-page":"257","DOI":"10.1016\/j.tcs.2006.08.042","volume":"367","author":"G. Steel","year":"2006","unstructured":"Steel, G.: Formal analysis of PIN block attacks. Theor. Comput. Sci. 367(1\u20132), 257\u2013270 (2006)","journal-title":"Theor. Comput. Sci."},{"key":"9340_CR22","first-page":"25","volume":"5","author":"J. Stuckman","year":"2006","unstructured":"Stuckman, J., Zhang, G.: Mastermind is NP-complete. INFOCOMP J. Comput. Sci. 5, 25\u201328 (2006)","journal-title":"INFOCOMP J. Comput. Sci."}],"container-title":["Theory of Computing Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00224-011-9340-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s00224-011-9340-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00224-011-9340-9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,11]],"date-time":"2019-06-11T17:08:51Z","timestamp":1560272931000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s00224-011-9340-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,6,17]]},"references-count":22,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2012,1]]}},"alternative-id":["9340"],"URL":"https:\/\/doi.org\/10.1007\/s00224-011-9340-9","relation":{},"ISSN":["1432-4350","1433-0490"],"issn-type":[{"value":"1432-4350","type":"print"},{"value":"1433-0490","type":"electronic"}],"subject":[],"published":{"date-parts":[[2011,6,17]]}}}