{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,2]],"date-time":"2022-04-02T15:30:59Z","timestamp":1648913459233},"reference-count":24,"publisher":"Elsevier BV","issue":"2","license":[{"start":{"date-parts":[[2012,3,1]],"date-time":"2012-03-01T00:00:00Z","timestamp":1330560000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Computers &amp; Electrical Engineering"],"published-print":{"date-parts":[[2012,3]]},"DOI":"10.1016\/j.compeleceng.2011.11.014","type":"journal-article","created":{"date-parts":[[2011,12,20]],"date-time":"2011-12-20T23:30:11Z","timestamp":1324423811000},"page":"370-380","source":"Crossref","is-referenced-by-count":0,"title":["Efficient and secure stored-value cards with leakage resilience"],"prefix":"10.1016","volume":"38","author":[{"given":"Fuchun","family":"Guo","sequence":"first","affiliation":[]},{"given":"Yi","family":"Mu","sequence":"additional","affiliation":[]},{"given":"Willy","family":"Susilo","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.compeleceng.2011.11.014_b0005","doi-asserted-by":"crossref","unstructured":"Clemons EK, Croson DC, Weber BW. Reengineering money: the mondex stored value card and beyond. In: HICSS (4) 1996. IEEE; 1996. p. 254\u201361.","DOI":"10.1109\/HICSS.1996.495345"},{"key":"10.1016\/j.compeleceng.2011.11.014_b0010","unstructured":"Garcia FD, de Koning Gans G, Muijrers R, van Rossum P, Verdult R, Schreur RW, et al. Dismantling mifare classic. In: Jajodia S, L\u00f3pez J, editors. ESORICS 2008; vol. 5283 of LNCS. Heidelberg: Springer; 2008, p. 97\u2013114."},{"key":"10.1016\/j.compeleceng.2011.11.014_b0015","doi-asserted-by":"crossref","unstructured":"Quisquater JJ, Samyde D. Electromagnetic analysis (ema): measures and counter-measures for smart cards. In: Attali I, Jensen TP, editors. E-smart 2001, vol. 2140 of LNCS. Heidelberg: Springer; 2001. p. 200\u201310.","DOI":"10.1007\/3-540-45418-7_17"},{"key":"10.1016\/j.compeleceng.2011.11.014_b0020","doi-asserted-by":"crossref","unstructured":"Kocher PC, Jaffe J, Jun B. Differential power analysis. In: Wiener MJ, editor. CRYPTO 1999, vol. 1666 of LNCS. Heidelberg: Springer; 1999. p. 388\u201397.","DOI":"10.1007\/3-540-48405-1_25"},{"key":"10.1016\/j.compeleceng.2011.11.014_b0025","doi-asserted-by":"crossref","unstructured":"Kocher PC. Timing attacks on implementations of diffie-hellman, rsa, dss, and other systems. In: Koblitz N, editor. CRYPTO 1996, vol. 1109 of LNCS. Heidelberg: Springer; 1996. p. 104\u2013113.","DOI":"10.1007\/3-540-68697-5_9"},{"key":"10.1016\/j.compeleceng.2011.11.014_b0030","unstructured":"Halderman JA, Schoen SD, Heninger N, Clarkson W, Paul W, Calandrino JA, et al. Lest we remember: cold boot attacks on encryption keys. In: van Oorschot PC, editor. USENIX security symposium 2008. LNCS. Heidelberg: USENIX Association; 2008. p. 45\u201360."},{"key":"10.1016\/j.compeleceng.2011.11.014_b0035","doi-asserted-by":"crossref","unstructured":"Ishai Y, Sahai A, Wagner D. Private circuits: securing hardware against probing attacks. In: Boneh D, editor. CRYPTO 2003, vol. 2729 of LNCS. Heidelberg: Springer; 2003. p. 463\u201381.","DOI":"10.1007\/978-3-540-45146-4_27"},{"key":"10.1016\/j.compeleceng.2011.11.014_b0040","doi-asserted-by":"crossref","unstructured":"Gennaro R, Lysyanskaya A, Malkin T, Micali S, Rabin T. Algorithmic tamper-proof (atp) security: theoretical foundations for security against hardware tampering. In: Naor M, editor. TCC 2004, vol. 2951 of LNCS. Heidelberg: Springer; 2004. p. 258\u201377.","DOI":"10.1007\/978-3-540-24638-1_15"},{"key":"10.1016\/j.compeleceng.2011.11.014_b0045","doi-asserted-by":"crossref","unstructured":"Ishai Y, Prabhakaran M, Sahai A, Wagner D. Private circuits ii: keeping secrets in tamperable circuits. In: Vaudenay S, editor. EUROCRYPT 2006, vol. 4004 of LNCS. Heidelberg: Springer; 2006. p. 308\u201327.","DOI":"10.1007\/11761679_19"},{"issue":"2","key":"10.1016\/j.compeleceng.2011.11.014_b0050","doi-asserted-by":"crossref","first-page":"329","DOI":"10.1016\/j.compeleceng.2008.06.009","article-title":"Parallel crypto-devices for gf(p) elliptic curve multiplication resistant against side channel attacks","volume":"35","author":"Ghosh","year":"2009","journal-title":"Comput Elect Eng"},{"key":"10.1016\/j.compeleceng.2011.11.014_b0055","doi-asserted-by":"crossref","unstructured":"Bellare M, Canetti R, Krawczyk H. Keying hash functions for message authentication. In: Koblitz N, editor. CRYPTO 1996, vol. 1109 of LNCS. Heidelberg: Springer; 1996. p. 1\u201315.","DOI":"10.1007\/3-540-68697-5_1"},{"issue":"4","key":"10.1016\/j.compeleceng.2011.11.014_b0060","doi-asserted-by":"crossref","first-page":"297","DOI":"10.1007\/s00145-004-0314-9","article-title":"Short signatures from the weil pairing","volume":"17","author":"Boneh","year":"2004","journal-title":"J Cryptol"},{"key":"10.1016\/j.compeleceng.2011.11.014_b0065","doi-asserted-by":"crossref","unstructured":"Waters B. Efficient identity-based encryption without random oracles. In: Cramer R, editor. EUROCRYPT, vol. 3494 of LNCS. Heidelberg: Springer; 2005. p. 114\u201327.","DOI":"10.1007\/11426639_7"},{"key":"10.1016\/j.compeleceng.2011.11.014_b0070","doi-asserted-by":"crossref","unstructured":"Guo F, Mu Y. Optimal online\/offline signature: how to sign a message without online computation. In: Baek J, Bao F, Chen K, Lai X, editors. ProvSection 2008, vol. 5324 of LNCS. Heidelberg: Springer; 2008. p. 98\u2013111.","DOI":"10.1007\/978-3-540-88733-1_7"},{"key":"10.1016\/j.compeleceng.2011.11.014_b0075","doi-asserted-by":"crossref","unstructured":"Chaum D. Online cash checks. In: Quisquater JJ, Vandewalle J, editors. EUROCRYPT 1989, vol. 434 of LNCS. Heidelberg: Springer; 1989. p. 288\u201393.","DOI":"10.1007\/3-540-46885-4_30"},{"key":"10.1016\/j.compeleceng.2011.11.014_b0080","doi-asserted-by":"crossref","unstructured":"Chaum D. Blind signatures for untraceable payments. In: David Chaum, Ronald L. Rivest ATS, editors. CRYPTO 1982. New York: Plenum; 1982. p. 199\u2013203.","DOI":"10.1007\/978-1-4757-0602-4_18"},{"key":"10.1016\/j.compeleceng.2011.11.014_b0085","doi-asserted-by":"crossref","unstructured":"Camenisch J, Hohenberger S, Lysyanskaya A. Compact e-cash. In: Cramer R, editor. EUROCRYPT 2005, vol. 3494 of LNCS. Heidelberg: Springer; 2005. p. 302\u201321.","DOI":"10.1007\/11426639_18"},{"key":"10.1016\/j.compeleceng.2011.11.014_b0090","doi-asserted-by":"crossref","unstructured":"Au MH, Susilo W, Mu Y. Practical anonymous divisible e-cash from bounded accumulators. In: Tsudik G, editor. Financial Cryptography 2008, vol. 5143 of LNCS. Heidelberg: Springer; 2008. p. 287\u2013301.","DOI":"10.1007\/978-3-540-85230-8_26"},{"key":"10.1016\/j.compeleceng.2011.11.014_b0095","doi-asserted-by":"crossref","unstructured":"Even S, Goldreich O. Electronic wallet. In: CRYPTO 1983. New York: Plenum; 1983. p. 383\u20136.","DOI":"10.1007\/978-1-4684-4730-9_28"},{"key":"10.1016\/j.compeleceng.2011.11.014_b0100","doi-asserted-by":"crossref","unstructured":"Chaum D, Pedersen TP. Wallet databases with observers. In: Brickell EF, editor. CRYPTO 1992, vol. 740 of LNCS. Heidelberg: Springer; 1992. p. 89\u2013105.","DOI":"10.1007\/3-540-48071-4_7"},{"key":"10.1016\/j.compeleceng.2011.11.014_b0105","doi-asserted-by":"crossref","unstructured":"Brands S. Untraceable off-line cash in wallets with observers (extended abstract). In: Stinson DR, editor. CRYPTO 1993, vol. 773 of LNCS. Heidelberg: Springer; 1993, p. 302\u201318.","DOI":"10.1007\/3-540-48329-2_26"},{"key":"10.1016\/j.compeleceng.2011.11.014_b0110","unstructured":"Anderson R, Kuhn M. Tamper resistance \u2013 a cautionary note. In: The second USENIX workshop on electronic commerce proceedings, November 1996. p. 1\u201311."},{"issue":"2","key":"10.1016\/j.compeleceng.2011.11.014_b0115","doi-asserted-by":"crossref","first-page":"281","DOI":"10.1137\/0217017","article-title":"A digital signature scheme secure against adaptive chosen-message attacks","volume":"17","author":"Goldwasser","year":"1988","journal-title":"SIAM J Comput"},{"key":"10.1016\/j.compeleceng.2011.11.014_b0120","doi-asserted-by":"crossref","unstructured":"Boneh D, Boyen X. Short signatures without random oracles. In: Cachin C, Camenisch J, editors. EUROCRYPT 2004, vol. 3027 of LNCS. Heidelberg: Springer; 2004. p. 56\u201373.","DOI":"10.1007\/978-3-540-24676-3_4"}],"container-title":["Computers &amp; Electrical Engineering"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S004579061100190X?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S004579061100190X?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2019,6,21]],"date-time":"2019-06-21T04:02:42Z","timestamp":1561089762000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S004579061100190X"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,3]]},"references-count":24,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2012,3]]}},"alternative-id":["S004579061100190X"],"URL":"https:\/\/doi.org\/10.1016\/j.compeleceng.2011.11.014","relation":{},"ISSN":["0045-7906"],"issn-type":[{"value":"0045-7906","type":"print"}],"subject":[],"published":{"date-parts":[[2012,3]]}}}