{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,12]],"date-time":"2025-11-12T13:51:21Z","timestamp":1762955481976},"reference-count":28,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2015,11,23]],"date-time":"2015-11-23T00:00:00Z","timestamp":1448236800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int. J. Inf. Secur."],"published-print":{"date-parts":[[2016,11]]},"DOI":"10.1007\/s10207-015-0306-9","type":"journal-article","created":{"date-parts":[[2015,11,23]],"date-time":"2015-11-23T08:50:34Z","timestamp":1448268634000},"page":"659-673","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":17,"title":["Improving the ISO\/IEC 11770 standard for key management techniques"],"prefix":"10.1007","volume":"15","author":[{"given":"Cas","family":"Cremers","sequence":"first","affiliation":[]},{"given":"Marko","family":"Horvat","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,11,23]]},"reference":[{"key":"306_CR1","doi-asserted-by":"crossref","unstructured":"Barker, E., Johnson, D., Smid, M.: NIST SP 800-56A: Recommendation for pair-wise key establishment schemes using discrete logarithm cryptography (revised). Technical report, Gaithersburg,\u00a0MD, United States (2007)","DOI":"10.6028\/NIST.SP.800-56ar"},{"key":"306_CR2","doi-asserted-by":"crossref","unstructured":"Basin, D., Cremers, C.: Modeling and analyzing security in the presence of compromising adversaries. In Computer Security\u2014ESORICS 2010. vol. 6345, LNCS, pp. 340\u2013356. Springer (2010)","DOI":"10.1007\/978-3-642-15497-3_21"},{"key":"306_CR3","doi-asserted-by":"crossref","unstructured":"Basin, D., Cremers, C., Horvat, M.: Actor key compromise: consequences and countermeasures. In Proceedings of the 27th IEEE Computer Security Foundations Symposium (CSF), pp. 244\u2013258. IEEE Computer Society (2014)","DOI":"10.1109\/CSF.2014.25"},{"key":"306_CR4","doi-asserted-by":"crossref","unstructured":"Basin, D., Cremers, C., Meier, S.: Provably repairing the ISO\/IEC 9798 standard for entity authentication. J. Comput. Secur. 21(6), 817\u2013846 (2013)","DOI":"10.3233\/JCS-130472"},{"issue":"3","key":"306_CR5","doi-asserted-by":"crossref","first-page":"24","DOI":"10.1109\/MSP.2013.162","volume":"13","author":"D Basin","year":"2015","unstructured":"Basin, D., Cremers, C., Miyazaki, K., Radomirovic, S., Watanabe, D.: Improving the security of cryptographic protocol standards. IEEE Secur. Priv. 13(3), 24\u201331 (2015)","journal-title":"IEEE Secur. Priv."},{"key":"306_CR6","doi-asserted-by":"crossref","unstructured":"Blake-Wilson, S., Johnson, D., Menezes, A.: Key agreement protocols and their security analysis. In IMA Int. Conf. pp. 30\u201345 (1997)","DOI":"10.1007\/BFb0024447"},{"key":"306_CR7","doi-asserted-by":"crossref","unstructured":"Blake-Wilson, S., Menezes, A.: Unknown Key-Share Attacks on the Station-to-Station (STS) Protocol. In: Public Key Cryptography, vol. 1560, LNCS, pp. 154\u2013170. Springer (1999)","DOI":"10.1007\/3-540-49162-7_12"},{"key":"306_CR8","doi-asserted-by":"crossref","unstructured":"Boyd, C., Mathuria, A.: Protocols for Authentication and Key Establishment. Information Security and Cryptography. Springer, Berlin (2003)","DOI":"10.1007\/978-3-662-09527-0"},{"key":"306_CR9","doi-asserted-by":"crossref","unstructured":"Chen, L., Mitchell, C.J.: Parsing ambiguities in authentication and key establishment protocols. Int. J. Electron. Secur. Digit. Forensic 3(1), 82\u201394 (2010)","DOI":"10.1504\/IJESDF.2010.032333"},{"key":"306_CR10","unstructured":"Cheng, Z., Comley, R.: Attacks on an ISO\/IEC 11770-2 key establishment protocol. Cryptology ePrint Archive, Report 2004\/249, 2004. http:\/\/eprint.iacr.org\/ , retrieved on June 1, (2014)"},{"issue":"3","key":"306_CR11","first-page":"290","volume":"3","author":"Z Cheng","year":"2006","unstructured":"Cheng, Z., Comley, R.: Attacks on an ISO\/IEC 11770-2 key establishment protocol. IJ Netw. Secur. 3(3), 290\u2013295 (2006)","journal-title":"IJ Netw. Secur."},{"key":"306_CR12","doi-asserted-by":"crossref","unstructured":"Cremers, C.: The Scyther Tool: Verification, falsification, and analysis of security protocols. In Proc. CAV, vol 5123 of LNCS, pp. 414\u2013418. Springer. http:\/\/www.cs.ox.ac.uk\/people\/cas.cremers\/scyther\/index.html (2008)","DOI":"10.1007\/978-3-540-70545-1_38"},{"issue":"1","key":"306_CR13","doi-asserted-by":"crossref","first-page":"183","DOI":"10.1007\/s10623-013-9852-1","volume":"74","author":"C Cremers","year":"2015","unstructured":"Cremers, C., Feltz, M.: Beyond eCK: perfect forward secrecy under actor compromise and ephemeral-key reveal. Des. Codes Cryptogr. 74(1), 183\u2013218 (2015)","journal-title":"Des. Codes Cryptogr."},{"key":"306_CR14","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-540-78636-8","volume-title":"Operational Semantics and Verification of Security Protocols. Information Security and Cryptography","author":"C Cremers","year":"2012","unstructured":"Cremers, C., Mauw, S.: Operational Semantics and Verification of Security Protocols. Information Security and Cryptography. Springer, Berlin (2012)"},{"key":"306_CR15","doi-asserted-by":"crossref","unstructured":"Dierks, T., Rescorla, E.: The Transport Layer Security (TLS) Protocol Version 1.2. RFC 5246 (2008)","DOI":"10.17487\/rfc5246"},{"key":"306_CR16","unstructured":"European Payments Council: Guidelines on Algorithms Usage and Key Management. Technical report. EPC342-08 Version 1.1 (2009)"},{"issue":"1","key":"306_CR17","doi-asserted-by":"crossref","first-page":"354","DOI":"10.1049\/el:19980242","volume":"34","author":"G Horng","year":"1998","unstructured":"Horng, G., Hsu, C.-K.: Weakness in the Helsinki protocol. Electron. Lett. 34(1), 354\u2013355 (1998)","journal-title":"Electron. Lett."},{"key":"306_CR18","unstructured":"International Organization for Standardization, Gen\u00e8ve, Switzerland. ISO\/IEC 9798-2:2008, Information technology\u2014Security techniques \u2014Entity Authentication\u2014Part 2: Mechanisms using symmetric encipherment algorithms. Third edition (2008)"},{"key":"306_CR19","unstructured":"International Organization for Standardization, Gen\u00e8ve, Switzerland. ISO\/IEC 11770-2:2008, Information technology\u2014Security techniques \u2014Key Management\u2014Part 2: Mechanisms using Symmetric Techniques, 2009. Incorporating corrigendum (2009)"},{"key":"306_CR20","unstructured":"International Organization for Standardization, Gen\u00e8ve, Switzerland. ISO\/IEC 11770-3:2008, Information technology\u2014Security techniques \u2014Key Management\u2014Part 3: Mechanisms using Asymmetric Techniques, 2009. Incorporating corrigendum (2009)"},{"key":"306_CR21","unstructured":"Krawczyk, H.: HMQV: A high-performance secure Diffie-Hellman protocol. Cryptology ePrint Archive, Report 2005\/176, 2005. http:\/\/eprint.iacr.org\/ , retrieved on June 1, (2014)"},{"key":"306_CR22","doi-asserted-by":"crossref","first-page":"119","DOI":"10.1023\/A:1022595222606","volume":"28","author":"L Law","year":"2003","unstructured":"Law, L., Menezes, A., Qu, M., Solinas, J., Vanstone, S.: An efficient protocol for authenticated key agreement. Des. Codes Crypt. 28, 119\u2013134 (2003)","journal-title":"Des. Codes Crypt."},{"key":"306_CR23","doi-asserted-by":"crossref","unstructured":"Lowe, G.: A hierarchy of authentication specifications. In Proceedings of 10th IEEE Computer Security Foundations Workshop (CSFW), pp. 31\u201344. IEEE (1997)","DOI":"10.1109\/CSFW.1997.596782"},{"issue":"3","key":"306_CR24","doi-asserted-by":"crossref","first-page":"131","DOI":"10.1016\/0020-0190(95)00144-2","volume":"56","author":"G Lowe","year":"1995","unstructured":"Lowe, G.: An attack on the Needham-Schroeder public key authentication protocol. Inf. Process. Lett. 56(3), 131\u2013136 (1995)","journal-title":"Inf. Process. Lett."},{"key":"306_CR25","first-page":"336","volume":"2008","author":"A Mathuria","year":"2008","unstructured":"Mathuria, A., Sriram, G.: New attacks on ISO key establishment protocols. IACR Cryptol. ePrint Arch. 2008, 336 (2008)","journal-title":"IACR Cryptol. ePrint Arch."},{"key":"306_CR26","doi-asserted-by":"crossref","unstructured":"Menezes, A., Ustaoglu, B.: Security arguments for the UM key agreement protocol in the NIST SP 800-56a standard. In: Abe, M., Gligor, V.D. (eds). Proceedings of the 2008 ACM Symposium on Information, Computer and Communications Security, ASIACCS 2008, Tokyo, Japan, March 18\u201320, 2008. pp. 261\u2013270. ACM, (2008)","DOI":"10.1145\/1368310.1368348"},{"issue":"4","key":"306_CR27","doi-asserted-by":"crossref","first-page":"21","DOI":"10.1145\/302350.302356","volume":"32","author":"CJ Mitchell","year":"1998","unstructured":"Mitchell, C.J., Yeun, C.Y.: Fixing a problem in the Helsinki protocol. SIGOPS Oper. Syst. Rev. 32(4), 21\u201324 (1998)","journal-title":"SIGOPS Oper. Syst. Rev."},{"key":"306_CR28","unstructured":"Schmid, L.: Improving the ISO, IEC 11770 standard, Bachelor\u2019s thesis. ETH Zurich, Switzerland (2013)"}],"container-title":["International Journal of Information Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-015-0306-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10207-015-0306-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-015-0306-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-015-0306-9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,1]],"date-time":"2019-09-01T16:22:38Z","timestamp":1567354958000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10207-015-0306-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,11,23]]},"references-count":28,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2016,11]]}},"alternative-id":["306"],"URL":"https:\/\/doi.org\/10.1007\/s10207-015-0306-9","relation":{},"ISSN":["1615-5262","1615-5270"],"issn-type":[{"value":"1615-5262","type":"print"},{"value":"1615-5270","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015,11,23]]}}}