{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T01:47:16Z","timestamp":1729648036805,"version":"3.28.0"},"reference-count":32,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,11]]},"DOI":"10.1109\/isgt-asia.2015.7387098","type":"proceedings-article","created":{"date-parts":[[2016,4,9]],"date-time":"2016-04-09T09:06:30Z","timestamp":1460192790000},"page":"1-6","source":"Crossref","is-referenced-by-count":3,"title":["New security features in DLMS\/COSEM \u2014 A comparison to the smart meter gateway"],"prefix":"10.1109","author":[{"given":"Stefan G.","family":"Hoffmann","sequence":"first","affiliation":[]},{"given":"Robin","family":"Massink","sequence":"additional","affiliation":[]},{"given":"Gerd","family":"Bumiller","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"European Union Agency for Network and Information Security (ENISA)","article-title":"Smart grid security certification in Europe Challenges &#x2014; and recommendations","year":"2014","key":"ref32"},{"journal-title":"Bundesamt f&#x00FC;r Sicherheit in der lnformationstechnik 2011 version 2 0","article-title":"A proposal for: Functionality classes for random number generators","year":"0","key":"ref31"},{"journal-title":"Bundesamt f&#x00FC;r Sicherheit in der Informationstechnik","article-title":"Products\/systems, which are in evaluation\/certification","year":"0","key":"ref30"},{"journal-title":"Bundesamt f&#x00FC;r Sicherheit in der Informationstechnik 2013 version 1 0","article-title":"Technische Richtlinie BSI TR-03109","year":"0","key":"ref10"},{"journal-title":"Bundesamt f&#x00FC;r Sicherheit in der Informationstechnik 2013 version 1 0","article-title":"Technische Richtlinie BSI TR-03109&#x2013;1, Anforderungen an die Interop-erabilitat der Kommunikationseinheit eines intelligenten Messsystems","year":"0","key":"ref11"},{"journal-title":"Bundesamt f&#x00FC;r Sicherheit in der Informationstechnik 2014 version 1 3","article-title":"Technische Richtlinie BSI TR-03109&#x2013;2, Smart Meter Gateway An-forderungen an die Funktionalit&#x00E4;t und Interoperabilitat des Sicher-heitsmoduls","year":"0","key":"ref12"},{"journal-title":"Bundesamt f&#x00FC;r Sicherheit in der Informationstechnik 2014 version 1 3","article-title":"Technische Richtlinie TR-03109&#x2013;3, Kryptographische Vorgaben f&#x00FC;r die Infrastruktur von intelligenten Messsysteme","year":"0","key":"ref13"},{"journal-title":"Bun-desamt f&#x00FC;r Sicherheit in der Informationstechnik","article-title":"Technische Richtlinie TR-03116&#x2013;3, Kryptographische Vorgaben f&#x00FC;r Projekte der Bundesregierung, Teil 3 - Intelligente Messsysteme","year":"2015","key":"ref14"},{"journal-title":"Bundesamt f&#x00FC;r Sicherheit in der Informationstechnik 2014 version 1 3","article-title":"Technische Richtlinie BSI TR-03109&#x2013;4, Smart Metering PKI-Public Key Infrastruktur f&#x00FC;r Smart Meter Gateways","year":"0","key":"ref15"},{"key":"ref16","first-page":"344","article-title":"Biclique Cryptanalysis of the Full AES","volume":"7073","author":"bogdanov","year":"2011","journal-title":"Advances in Cryptology-CRYPTO 2011 Ser Lecture Notes in Computer Science"},{"journal-title":"Crypto++ 5 6 0 Benchmarks","year":"2009","author":"dei","key":"ref17"},{"key":"ref18","article-title":"SP 800&#x2013;38D. Recommendation for Block Cipher Modes of Operation: Galois\/Counter Mode (GCM) and GMAC","author":"dworkin","year":"2007","journal-title":"National Institute of Standards & Technology Gaithersburg MD United States Tech Rep"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-04138-9_1"},{"journal-title":"Die Herkunft der NIST-Kurven","year":"2013","author":"boeck","key":"ref28"},{"journal-title":"IEC 62056&#x2013;6-2 2013 COSEM Interface classes International Electrotechnical Commission-IEC Std","year":"2013","key":"ref4"},{"key":"ref27","article-title":"Security dangers of the NIST curves","author":"bernstein","year":"2013","journal-title":"invited talk International State of the Art Cryptography Workshop Athens Greece"},{"journal-title":"IEC 62056&#x2013;5-3 2013 DLMS\/COSEM Application layer International Electrotechnical Commission - IEC Std","year":"2013","key":"ref3"},{"journal-title":"DLMS UA 1000&#x2013;2 Ed 7 0 2013 DLMS\/COSEM Architecture and Protocols the Green Book","year":"2013","key":"ref6"},{"journal-title":"A state-of-the-art Diffie-Hellman function","year":"0","author":"bernstein","key":"ref29"},{"journal-title":"DLMS UA 1000&#x2013;2 Ed 8 0 2014 DLMS\/COSEM Architecture and Protocols the Green Book","year":"2014","key":"ref5"},{"journal-title":"Bundesamt f&#x00FC;r Sicherheit in der Informationstechnik 2014 version 1 3","article-title":"Protection Profile for the Gateway of a Smart Metering System (Smart Meter Gateway PP)","year":"0","key":"ref8"},{"journal-title":"National Institute of Standards & Technology","article-title":"Recommendation for Key Management Part 1: General (Revised)","year":"2007","key":"ref7"},{"key":"ref2","article-title":"Multimedia content identification through smart meter power usage profiles","volume":"5","author":"greveler","year":"2012","journal-title":"Computers Privacy and Data Protection"},{"journal-title":"Bundesamt f&#x00FC;r Sicherheit in der Informationstechnik 2014 version 1 3","article-title":"Protection Profile for the Security Module of a Smart Meter Gateway (Security Module PP)","year":"0","key":"ref9"},{"journal-title":"Commission for the EU","article-title":"Commission Recommendation of 9.3.2012 on preparations for the rollout of smart metering systems","year":"2012","key":"ref1"},{"key":"ref20","article-title":"AES-GCM for Efficient Authenticated Encryption _ Ending the Reign of HMAC-SHA-1","author":"gueron","year":"2013","journal-title":"Workshop on Real-World Cryptography Stanford University"},{"key":"ref22","article-title":"Bicliques for Preimages: Attacks on Skein-512 and the SHA-2 family","author":"khovratovich","year":"2011","journal-title":"Cryptology ePrint Archive Report"},{"key":"ref21","doi-asserted-by":"crossref","first-page":"343","DOI":"10.1007\/978-3-540-30556-9_27","article-title":"The Security and Performance of the Galois\/Counter Mode (GCM) of Operation","volume":"3348","author":"mcgrew","year":"2005","journal-title":"Progress in Cryptology - INDOCRYPT 2004 ser Lecture Notes in Computer Science A Canteaut and K Viswanathan Eds"},{"journal-title":"National Institute of Standards and Technology","article-title":"FIPS PUB 186&#x2013;3 Federal Information Processing Standards Publication Digital Signature Standard (DSS)","year":"2009","key":"ref24"},{"key":"ref23","article-title":"Higher-Order Differential Attack on Reduced SHA-256","author":"lamberger","year":"0","journal-title":"Cryptology EPrint Archive Report 2011"},{"journal-title":"ECC Brain-pool","article-title":"ECC Brainpool Standard Curves and Curve Generation","year":"2005","key":"ref26"},{"journal-title":"National Institute of Standards & Technology","article-title":"Recommended Elliptic Curves for Federal Government Use","year":"1999","key":"ref25"}],"event":{"name":"2015 IEEE Innovative Smart Grid Technologies - Asia (ISGT ASIA)","start":{"date-parts":[[2015,11,3]]},"location":"Bangkok","end":{"date-parts":[[2015,11,6]]}},"container-title":["2015 IEEE Innovative Smart Grid Technologies - Asia (ISGT ASIA)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7364573\/7386954\/07387098.pdf?arnumber=7387098","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,24]],"date-time":"2017-06-24T06:25:26Z","timestamp":1498285526000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7387098\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,11]]},"references-count":32,"URL":"https:\/\/doi.org\/10.1109\/isgt-asia.2015.7387098","relation":{},"subject":[],"published":{"date-parts":[[2015,11]]}}}