{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T11:29:00Z","timestamp":1740137340330,"version":"3.37.3"},"reference-count":41,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2016,1,2]],"date-time":"2016-01-02T00:00:00Z","timestamp":1451692800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"name":"German Research Foundation (DFG)","award":["Fi 940\/3-1, Fi 940\/3-2"],"award-info":[{"award-number":["Fi 940\/3-1, Fi 940\/3-2"]}]},{"name":"German Federal Ministry of Education and Research (BMBF)","award":["EC SPRIDE","EC SPRIDE"],"award-info":[{"award-number":["EC SPRIDE","EC SPRIDE"]}]},{"name":"German Research Foundation (DFG)","award":["CRC 1119","CRC 1119"],"award-info":[{"award-number":["CRC 1119","CRC 1119"]}]},{"name":"Hessian LOEWE excellence initiaive","award":["CASED","CASED"],"award-info":[{"award-number":["CASED","CASED"]}]},{"DOI":"10.13039\/501100000266","name":"Engineering and Physical Sciences Research Council (EPSRC)","doi-asserted-by":"crossref","award":["EP\/H005455\/1","EP\/H005455\/1"],"award-info":[{"award-number":["EP\/H005455\/1","EP\/H005455\/1"]}],"id":[{"id":"10.13039\/501100000266","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int. J. Inf. Secur."],"published-print":{"date-parts":[[2016,11]]},"DOI":"10.1007\/s10207-015-0309-6","type":"journal-article","created":{"date-parts":[[2016,1,2]],"date-time":"2016-01-02T13:38:51Z","timestamp":1451741931000},"page":"637-657","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Unpicking PLAID: a cryptographic analysis of an ISO-standards-track authentication protocol"],"prefix":"10.1007","volume":"15","author":[{"given":"Jean Paul","family":"Degabriele","sequence":"first","affiliation":[]},{"given":"Victoria","family":"Fehr","sequence":"additional","affiliation":[]},{"given":"Marc","family":"Fischlin","sequence":"additional","affiliation":[]},{"given":"Tommaso","family":"Gagliardoni","sequence":"additional","affiliation":[]},{"given":"Felix","family":"G\u00fcnther","sequence":"additional","affiliation":[]},{"given":"Giorgia Azzurra","family":"Marson","sequence":"additional","affiliation":[]},{"given":"Arno","family":"Mittelbach","sequence":"additional","affiliation":[]},{"given":"Kenneth G.","family":"Paterson","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,1,2]]},"reference":[{"key":"309_CR1","doi-asserted-by":"crossref","unstructured":"Bellare, M., Rogaway, P.: Entity authentication and key distribution. In: CRYPTO 1993, pp. 232\u2013249. Springer Berlin, Hidelberg (1994)","DOI":"10.1007\/3-540-48329-2_21"},{"key":"309_CR2","doi-asserted-by":"crossref","unstructured":"Bellare, M., Pointcheval, D., Rogaway, P.: Authenticated key exchange secure against dictionary attacks. In: Eurocrypt 2000, pp. 139\u2013155. Springer Berlin, Hidelberg (2000)","DOI":"10.1007\/3-540-45539-6_11"},{"key":"309_CR3","doi-asserted-by":"crossref","unstructured":"Bellare, M., Boldyreva, A., Desai, A., Pointcheval, D.: Key-privacy in public-key encryption. In: ASIACRYPT 2001, pp. 566\u2013582. Springer Berlin, Hidelberg (2001)","DOI":"10.1007\/3-540-45682-1_33"},{"key":"309_CR4","doi-asserted-by":"publisher","unstructured":"Bhargavan, K., Fournet, C., Kohlweiss, M., Pironti, A., Strub, P.Y., Zanella B\u00e9guelin, S.: Proving the TLS handshake secure (as it is). 235\u2013255 (2014). doi: 10.1007\/978-3-662-44381-1_14","DOI":"10.1007\/978-3-662-44381-1_14"},{"key":"309_CR5","doi-asserted-by":"crossref","unstructured":"Bleichenbacher, D.: Chosen ciphertext attacks against protocols based on the RSA encryption standard PKCS #1. 1\u201312 (1998)","DOI":"10.1007\/BFb0055716"},{"issue":"4","key":"309_CR6","doi-asserted-by":"crossref","first-page":"267","DOI":"10.1007\/s10207-013-0192-y","volume":"12","author":"C Brzuska","year":"2013","unstructured":"Brzuska, C., Fischlin, M., Smart, N.P., Warinschi, B., Williams, S.C.: Less is more: relaxed yet composable security notions for key exchange. Int. J. Inf. Secur. 12(4), 267\u2013297 (2013)","journal-title":"Int. J. Inf. Secur."},{"key":"309_CR7","unstructured":"Centrelink: Protocol for Lightweight Authentication of Identity (PLAID)\u2014Logical Smartcard Implementation Specification PLAID Version 8.0\u2014Final. http:\/\/www.humanservices.gov.au\/corporate\/publications-and-resources\/plaid\/technical-specification (2009)"},{"key":"309_CR8","doi-asserted-by":"publisher","unstructured":"Coisel, I., Martin, T.: Untangling RFID privacy models. J. Comput. Netw. Commun. doi: 10.1155\/2013\/710275","DOI":"10.1155\/2013\/710275"},{"key":"309_CR9","doi-asserted-by":"publisher","unstructured":"Dagdelen, \u00d6., Fischlin, M., Gagliardoni, T., Marson, G.A., Mittelbach, A., Onete, C.: A cryptographic analysis of OPACITY\u2014(extended abstract). pp. 345\u2013362 (2013). doi: 10.1007\/978-3-642-40203-6_20","DOI":"10.1007\/978-3-642-40203-6_20"},{"key":"309_CR10","doi-asserted-by":"crossref","unstructured":"Degabriele, J.P., Fehr, V., Fischlin, M., Gagliardoni, T., G\u00fcnther, F., Marson, G.A., Mittelbach, A., Paterson, K.G.: Response to \u201cNit-Picking PLAID AS & ISO Project Editors Report into \u2018Unpicking Plaid\u2019\u00a0\u201d. Cryptology ePrint Archive Forum, http:\/\/www.cryptoplexity.informatik.tu-darmstadt.de\/media\/crypt\/pdf\/plaid-editorreport-response.pdf (2014)","DOI":"10.1007\/978-3-319-14054-4_1"},{"key":"309_CR11","doi-asserted-by":"crossref","unstructured":"Degabriele, J.P., Fehr, V., Fischlin, M., Gagliardoni, T., G\u00fcnther, F., Marson, G.A., Mittelbach, A., Paterson, K.G.: Unpicking PLAID\u2014a cryptographic analysis of an ISO-standards-track authentication protocol. In: 1st International Conference on Research in Security Standardisation (SSR 2014). Springer, Lecture Notes in Computer Science, vol. 8893, pp. 1\u201325 (2014)","DOI":"10.1007\/978-3-319-14054-4_1"},{"key":"309_CR12","doi-asserted-by":"crossref","unstructured":"Degabriele, J.P., Fehr, V., Fischlin, M., Gagliardoni, T., G\u00fcnther, F., Marson, G.A., Mittelbach, A., Paterson, K.G.: Unpicking PLAID\u2014a cryptographic analysis of an ISO-standards-track authentication protocol. Cryptology ePrint Archive, Report 2014\/728. http:\/\/eprint.iacr.org\/ (2014)","DOI":"10.1007\/978-3-319-14054-4_1"},{"key":"309_CR13","unstructured":"Department of Human Services: Protocol for Lightweight Authentication of Identity (PLAID). (2014). http:\/\/www.humanservices.gov.au\/corporate\/publications-and-resources\/plaid\/"},{"key":"309_CR14","unstructured":"Dierks, T., Rescorla, E.: The Transport Layer Security (TLS) Protocol Version 1.2. RFC 5246 (Proposed Standard). http:\/\/www.ietf.org\/rfc\/rfc5246.txt , updated by RFCs 5746, 5878, 6176 (2008)"},{"key":"309_CR15","doi-asserted-by":"crossref","unstructured":"Freedman, G.: Nit-Picking PLAID: AS & ISO Project Editors Report into \u201cUnpicking Plaid\u201d. Cryptology ePrint Archive Forum. https:\/\/dl.dropboxusercontent.com\/u\/41736374\/UnpickingReport%20V1.pdf (2014)","DOI":"10.1007\/978-3-319-14054-4_1"},{"key":"309_CR16","unstructured":"Freedman, G.: Personal communication by e-mail (2014)"},{"key":"309_CR17","doi-asserted-by":"crossref","unstructured":"Giesen, F., Kohlar, F., Stebila, D.: On the security of TLS renegotiation. In: ACM Conference on Computer and Communications Security, pp. 387\u2013398. ACM, New York (2013)","DOI":"10.1145\/2508859.2516694"},{"key":"309_CR18","unstructured":"ISO: DRAFT INTERNATIONAL STANDARD ISO\/IEC DIS 25185\u20131 Identification cards\u2014Integrated circuit card authentication protocols\u2014Part 1: Protocol for Lightweight Authentication of Identity. International Organization for Standardization, Geneva (2012)"},{"key":"309_CR19","unstructured":"ISO: DRAFT INTERNATIONAL STANDARD ISO\/IEC DIS 25185-1.2 Identification cards\u2014Integrated circuit card authentication protocols\u2014Part 1: Protocol for Lightweight Authentication of Identity. International Organization for Standardization, Geneva (2014)"},{"key":"309_CR20","unstructured":"ISO: Benefits of international standards. (2015). http:\/\/www.iso.org\/iso\/home\/standards\/benefitsofstandards.htm"},{"key":"309_CR21","unstructured":"ISO 25185\u20131 Editor (2013) Disposition of comments on ISO\/IEC 25185\u20131 Protocol for a lightweight authentication of devices"},{"key":"309_CR22","doi-asserted-by":"crossref","unstructured":"Jager, T., Kohlar, F., Sch\u00e4ge, S., Schwenk, J.: On the security of TLS-DHE in the standard model. 273\u2013293 (2012)","DOI":"10.1007\/978-3-642-32009-5_17"},{"key":"309_CR23","doi-asserted-by":"crossref","unstructured":"Jager, T., Schinzel, S., Somorovsky, J.: Bleichenbacher\u2019s attack strikes again: breaking PKCS#1 v1.5 in XML encryption. 752\u2013769 (2012)","DOI":"10.1007\/978-3-642-33167-1_43"},{"key":"309_CR24","doi-asserted-by":"crossref","unstructured":"Johnson, R.: Estimating the size of a population. Teach. Stat. 16(2), 50\u201352 (1994). http:\/\/www.mcs.sdsmt.edu\/rwjohnso\/html\/tank.pdf","DOI":"10.1111\/j.1467-9639.1994.tb00688.x"},{"issue":"2","key":"309_CR25","doi-asserted-by":"crossref","first-page":"381","DOI":"10.1109\/JSAC.2005.861395","volume":"24","author":"A Juels","year":"2006","unstructured":"Juels, A.: RFID security and privacy: a research survey. IEEE J. Selected Areas Commun. 24(2), 381\u2013394 (2006)","journal-title":"IEEE J. Selected Areas Commun."},{"key":"309_CR26","doi-asserted-by":"crossref","unstructured":"Kaliski, B.: PKCS#1: RSA Encryption Version 1.5. RFC 2313 (1998)","DOI":"10.17487\/rfc2313"},{"key":"309_CR27","unstructured":"Kelsey, J.: Dual EC DRBG and NIST crypto process review. In: Invited talk at the Real World Cryptography Workshop 2015, January 7\u20139, London (2015)"},{"key":"309_CR28","unstructured":"Kiat, K.H., Run, L.Y.: An analysis of OPACITY and PLAID protocols for contactless smart cards. Master\u2019s thesis, Naval Postgraduate School, Monterey (2012)"},{"key":"309_CR29","unstructured":"Kline, R.: Improving contactless security is goal of emerging PLAID project. http:\/\/secureidnews.com\/news-item\/improving-contactless-security-is-goal-of-emerging-plaid-project\/ , secureIDNews (2010)"},{"key":"309_CR30","doi-asserted-by":"publisher","unstructured":"Krawczyk, H., Paterson, K.G., Wee, H.: On the security of the TLS protocol: a systematic analysis. (2013). doi: 10.1007\/978-3-642-40041-4_24","DOI":"10.1007\/978-3-642-40041-4_24"},{"key":"309_CR31","unstructured":"Meyer, C., Somorovsky, J., Weiss, E., Schwenk, J.: Revisiting SSL\/TLS Implementations: New Bleichenbacher Side Channels and Attacks. In: 23rd USENIX Security Symposium (USENIX Security 14), USENIX Association, San Diego (2014). https:\/\/www.usenix.org\/conference\/usenixsecurity14\/technical-sessions\/presentation\/meyer"},{"key":"309_CR32","unstructured":"National Institute of Standards and Technology: Protocol for Lightweight Authentication of Identity (PLAID) Workshop (2009). http:\/\/csrc.nist.gov\/news_events\/plaid-workshop\/"},{"key":"309_CR33","unstructured":"National Institute of Standards and Technology: Cryptographic Standards and Guidelines Development Process (Second Draft). National Institute of Standards and Technology Interagency Report 7977. http:\/\/csrc.nist.gov\/publications\/drafts\/nistir-7977\/nistir_7977_second_draft.pdf (2015)"},{"issue":"1","key":"309_CR34","doi-asserted-by":"crossref","first-page":"31","DOI":"10.3390\/fi3010031","volume":"3","author":"H Rif\u00e0-Pous","year":"2011","unstructured":"Rif\u00e0-Pous, H., Herrera-Joancomart\u00ed, J.: Computational and energy costs of cryptographic algorithms on handheld devices. Future Internet 3(1), 31\u201348 (2011)","journal-title":"Future Internet"},{"key":"309_CR35","unstructured":"Riskybiz: Risky Business 106\u2014Centrelink\u2019s new PLAID auth protocol. http:\/\/risky.biz\/netcasts\/risky-business\/risky-business-106-centrelinks-new-plaid-auth-protocol (2009)"},{"key":"309_CR36","unstructured":"Sakurada, H.: Security evaluation of the PLAID protocol using the ProVerif tool. http:\/\/crypto-protocol.nict.go.jp\/data\/eng\/ISOIEC_Protocols\/25185-1\/25185-1_ProVerif.pdf (2013)"},{"key":"309_CR37","unstructured":"Sanders, T.: The Aims and Principles of Standardization. International Organization for Standardization\u2014ISO (1972)"},{"key":"309_CR38","unstructured":"Standards Australia: AS 5185-2010 Protocol for Lightweight Authentication of IDentity (PLAID). Standards Australia (2010)"},{"key":"309_CR39","unstructured":"Taylor, J.: Centrelink ID protocol still in trial phase. http:\/\/www.zdnet.com\/centrelink-id-protocol-still-in-trial-phase-1339336953\/ , zDNet (2012)"},{"key":"309_CR40","doi-asserted-by":"crossref","unstructured":"Vaudenay, S.: Security flaws induced by CBC padding - applications to SSL, IPSEC, WTLS. pp. 534\u2013546 (2002)","DOI":"10.1007\/3-540-46035-7_35"},{"key":"309_CR41","unstructured":"Watanabe, D.: Security analysis of PLAID. http:\/\/crypto-protocol.nict.go.jp\/data\/eng\/ISOIEC_Protocols\/25185-1\/25185-1_Scyther.pdf (2013)"}],"container-title":["International Journal of Information Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-015-0309-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10207-015-0309-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-015-0309-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-015-0309-6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,31]],"date-time":"2022-05-31T13:35:39Z","timestamp":1654004139000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10207-015-0309-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,1,2]]},"references-count":41,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2016,11]]}},"alternative-id":["309"],"URL":"https:\/\/doi.org\/10.1007\/s10207-015-0309-6","relation":{},"ISSN":["1615-5262","1615-5270"],"issn-type":[{"type":"print","value":"1615-5262"},{"type":"electronic","value":"1615-5270"}],"subject":[],"published":{"date-parts":[[2016,1,2]]}}}