{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,13]],"date-time":"2026-01-13T21:50:22Z","timestamp":1768341022072,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":36,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,8,29]],"date-time":"2023-08-29T00:00:00Z","timestamp":1693267200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"Ministerstvo Vnitra \u00f0esk\u00e9 Republiky","award":["VJ01010084"],"award-info":[{"award-number":["VJ01010084"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,8,29]]},"DOI":"10.1145\/3600160.3600180","type":"proceedings-article","created":{"date-parts":[[2023,8,9]],"date-time":"2023-08-09T22:54:41Z","timestamp":1691621681000},"page":"1-10","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["Enabling Efficient Threshold Signature Computation via Java\u00a0Card API"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0003-5058-2571","authenticated-orcid":false,"given":"Anton\u00edn","family":"Dufka","sequence":"first","affiliation":[{"name":"Masaryk University, Czech Republic"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9784-7624","authenticated-orcid":false,"given":"Petr","family":"\u0160venda","sequence":"additional","affiliation":[{"name":"Masaryk University, Czech Republic"}]}],"member":"320","published-online":{"date-parts":[[2023,8,29]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-31511-5_4"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1007\/s13389-012-0027-1"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653734"},{"key":"e_1_3_2_1_4_1","volume-title":"Elliptic Curve Cryptography","author":"Brown Daniel","year":"2023","unstructured":"Daniel R.\u00a0L. Brown. 2009. Elliptic Curve Cryptography, Standards for Efficient Cryptography Group, ver. 2. https:\/\/www.secg.org\/sec1-v2.pdf. Accessed: 2023-06-27."},{"key":"e_1_3_2_1_5_1","unstructured":"BSI. 2016. TR-03110 Technical Guideline Advanced Security Mechanisms for Machine Readable Travel Documents and eIDAS Token. https:\/\/www.bsi.bund.de\/dok\/TR-03110-en. Accessed: 2023-06-27."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/3372297.3423367"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/3538969.3543798"},{"key":"e_1_3_2_1_8_1","volume-title":"Java Card Technology for Smart Cards: Architecture and Programmer\u2019s Guide","author":"Chen Zhiqun","unstructured":"Zhiqun Chen. 2000. Java Card Technology for Smart Cards: Architecture and Programmer\u2019s Guide. Addison-Wesley Longman Publishing Co., Inc., USA."},{"key":"e_1_3_2_1_9_1","unstructured":"Coinkite Inc.2022. Dual Secure Elements. https:\/\/github.com\/Coldcard\/firmware\/blob\/master\/docs\/mk4-secure-elements.md. Accessed: 2023-06-27."},{"key":"e_1_3_2_1_10_1","unstructured":"Deirdre Connolly Chelsea Komlo Ian Goldberg and Christopher\u00a0A. Wood. 2023. Two-Round Threshold Schnorr Signatures with FROST. Internet-Draft draft-irtf-cfrg-frost-13. Internet Engineering Task Force. https:\/\/datatracker.ietf.org\/doc\/draft-irtf-cfrg-frost\/13\/ (WIP)."},{"key":"e_1_3_2_1_11_1","volume-title":"Security and Cryptography for Networks","author":"Damg\u00e5rd Ivan","unstructured":"Ivan Damg\u00e5rd, Thomas\u00a0Pelle Jakobsen, Jesper\u00a0Buus Nielsen, Jakob\u00a0Illeborg Pagter, and Michael\u00a0B\u00e6ksvang \u00d8stergaard. 2020. Fast Threshold ECDSA with Honest Majority. In Security and Cryptography for Networks, Clemente Galdi and Vladimir Kolesnikov (Eds.). Springer International Publishing, Cham, 382\u2013400."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00024"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00050"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.5220\/0011145600003283"},{"key":"e_1_3_2_1_15_1","volume-title":"FROST: Flexible Round-Optimized Schnorr Threshold Signatures. In Selected Areas in Cryptography, Orr Dunkelman, Michael\u00a0J. Jacobson, Jr., and Colin O\u2019Flynn (Eds.)","author":"Komlo Chelsea","year":"2021","unstructured":"Chelsea Komlo and Ian Goldberg. 2021. FROST: Flexible Round-Optimized Schnorr Threshold Signatures. In Selected Areas in Cryptography, Orr Dunkelman, Michael\u00a0J. Jacobson, Jr., and Colin O\u2019Flynn (Eds.). Springer International Publishing, Cham, 34\u201365."},{"key":"e_1_3_2_1_16_1","unstructured":"Yehuda Lindell. 2022. How Smart Cryptography Makes Coinbase More Secure. https:\/\/www.coinbase.com\/blog\/how-smart-cryptography-makes-coinbase-more-secure. Accessed: 2023-03-30."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3133961"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSPW51379.2020.00022"},{"key":"e_1_3_2_1_19_1","unstructured":"NIST. 2023. NIST First Call for Multi-Party Threshold Schemes. https:\/\/csrc.nist.gov\/publications\/detail\/nistir\/8214c\/draft. Accessed: 2023-06-27."},{"key":"e_1_3_2_1_20_1","unstructured":"Oracle. 2018. Java Card Platform 3.1 Specification Release Notes. https:\/\/docs.oracle.com\/en\/java\/javacard\/3.1\/specnotes\/index.html. Accessed: 2023-06-27."},{"key":"e_1_3_2_1_21_1","unstructured":"Oracle. 2023. Java Card Platform 3.2 Specification Release Notes. https:\/\/docs.oracle.com\/en\/java\/javacard\/3.2\/specnotes\/index.html. Accessed: 2023-06-27."},{"key":"e_1_3_2_1_22_1","unstructured":"Oracle. 2023. Oracle Java Card technology. https:\/\/www.oracle.com\/java\/java-card\/. Accessed: 2023-06-27."},{"key":"e_1_3_2_1_23_1","unstructured":"David Oswald. 2015. Repository jc_curve25519. https:\/\/github.com\/david-oswald\/jc_curve25519. Commit: fa65318c. Accessed: 2023-06-27."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/359168.359176"},{"key":"e_1_3_2_1_25_1","unstructured":"Smart ID. 2017. The smart way to identify yourself. https:\/\/www.smart-id.com\/about-smart-id\/. Accessed: 2023-06-27."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/WIFS.2009.5386474"},{"key":"e_1_3_2_1_27_1","unstructured":"Rene Struik. 2022. Alternative Elliptic Curve Representations. Internet-Draft draft-ietf-lwig-curve-representations-23. Internet Engineering Task Force. https:\/\/datatracker.ietf.org\/doc\/draft-ietf-lwig-curve-representations\/23\/ (WIP)."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.5220\/0011294000003283"},{"key":"e_1_3_2_1_29_1","volume-title":"Performance Issues of Selective Disclosure and Blinded Issuing Protocols on Java Card","author":"Tews Hendrik","unstructured":"Hendrik Tews and Bart Jacobs. 2009. Performance Issues of Selective Disclosure and Blinded Issuing Protocols on Java Card. In Information Security Theory and Practice. Smart Devices, Pervasive Systems, and Ubiquitous Networks, Olivier Markowitch, Angelos Bilas, Jaap-Henk Hoepman, Chris\u00a0J. Mitchell, and Jean-Jacques Quisquater (Eds.). Springer Berlin Heidelberg, Berlin, Heidelberg, 95\u2013111."},{"key":"e_1_3_2_1_30_1","volume-title":"Efficient Implementations of Attribute-based Credentials on Smart Cards. Ph.\u00a0D. Dissertation","author":"Vullers Pim","unstructured":"Pim Vullers. 2014. Efficient Implementations of Attribute-based Credentials on Smart Cards. Ph.\u00a0D. Dissertation. Radboud University Nijmegen."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP46215.2023.00174"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1201\/9781420071474"},{"key":"e_1_3_2_1_33_1","unstructured":"Pieter Wuille Jonas Nick and Anthony Towns. 2020. Schnorr signatures for secp256k1. https:\/\/github.com\/bitcoin\/bips\/blob\/master\/bip-0340.mediawiki. Accessed: 2023-06-27."},{"key":"e_1_3_2_1_34_1","volume-title":"Taproot: SegWit Version 1 Spending Rules. https:\/\/github.com\/bitcoin\/bips\/blob\/master\/bip-0341.mediawiki. Accessed: 2023-06-27.","author":"Wuille Pieter","year":"2020","unstructured":"Pieter Wuille, Jonas Nick, and Anthony Towns. 2020. Taproot: SegWit Version 1 Spending Rules. https:\/\/github.com\/bitcoin\/bips\/blob\/master\/bip-0341.mediawiki. Accessed: 2023-06-27."},{"key":"e_1_3_2_1_35_1","volume-title":"Automatic Performance Profiler for Security Analysis of Cryptographic Smart Cards. Master\u2019s thesis","author":"Zaoral Luk\u00e1\u0161","unstructured":"Luk\u00e1\u0161 Zaoral. 2023. Automatic Performance Profiler for Security Analysis of Cryptographic Smart Cards. Master\u2019s thesis. Masaryk University, Faculty of Informatics. https:\/\/is.muni.cz\/th\/v7l30\/"},{"key":"e_1_3_2_1_36_1","unstructured":"ZenGo Ltd.2022. The smart way to identify yourself. https:\/\/zengo.com\/mpc-wallet\/. Accessed: 2023-06-27."}],"event":{"name":"ARES 2023: The 18th International Conference on Availability, Reliability and Security","location":"Benevento Italy","acronym":"ARES 2023"},"container-title":["Proceedings of the 18th International Conference on Availability, Reliability and Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3600160.3600180","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3600160.3600180","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T16:36:13Z","timestamp":1750178173000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3600160.3600180"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,8,29]]},"references-count":36,"alternative-id":["10.1145\/3600160.3600180","10.1145\/3600160"],"URL":"https:\/\/doi.org\/10.1145\/3600160.3600180","relation":{},"subject":[],"published":{"date-parts":[[2023,8,29]]},"assertion":[{"value":"2023-08-29","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}