Check out the new USENIX Web site. next up previous
Up: Providing authentication to messages Previous: Providing authentication to messages

Acknowledgements

We would like to express out gratitute towards the other members of the PASTA project. Funding has been received from the Royal Norwegian Research Council through the GDD project (project no. 112577/431).

Bibliography

1
M. Abadi, M. Burrows, C. Kaufman, and B. Lampson.
Authentication and delegation with smart-cards.
Science of Computer Programming, 21(2):93-113, October 1993.

2
M. Burrows, M. Abadi, and R. Needham.
A Logic of Authentication.
ACM Transactions on Computer Systems, 8(1):18-36, February 1990.

3
Henry Dreifus and Thomas Monk.
Smart Cards - A Guide to Building and Managing Smart Card Applications.
IEEE Computer Press, 1997.
ISBN 0-471-15748-1.

4
H. Gobioff, S. Smith, J. D. Tygar, and B. Yee.
Smart Cards in Hostile Environments.
In Proceedings of the Second USENIX Workshop on Electronic Commerce, Oakland, CA, November 1996.

5
David. Kahn.
The Codebreakers: The story of secret writing.
Macmillan Publishing Company, New York, USA, 1967.

6
B. Lampson, M. Abadi, M. Burrows, and E. Wobber.
Authentication in Distributed Systems: Theory and Practice.
ACM Transactions on Computer Systems, 10(4):265-310, November 1992.

7
A. J. Menezes, P. C. van Oorschot, and S. A. Vanstone.
Handbook of Applied Cryptography.
CRC Press, Inc., 1997.
ISBN 0-8493-8523-7.

8
R. L. Rivest.
RFC 1321: The MD5 Message-Digest Algorithm, April 1992.

9
C. E. Shannon.
Communication theory of secrecy systems.
Bell System Technical Journal, 28:656-715, October 1949.

10
G. J. Simmons, editor.
Contemporary Cryptology: The Science of Information Integrity.
IEEE Press, 1992.
ISBN 0-87942-277-7.

11
Douglas R. Stinson.
Cryptography: Theory and Practice.
CRC Press, Inc., 1995.
ISBN 0-8493-8521-0.

12
Sun Microsystems, Inc.
Java Card 2.0 Language Subset and Virtual Machine Specification.
Revision 1.0 Final, October 1997.

13
US Department of Defence.
Trusted Computer System Evaluation Criteria, 1985.
DOD 5200.28-STD.

14
B. Yee and D. Tygar.
Secure Coprocessors in Electronic Commerce Applications.
In Proceedings of The First USENIX Workshop on Electronic Commerce, New York, New York, July 1995.

Appendix

 

Example OTP and substitution table


\begin{turn}{-90}
\begin{tabular}
{\vert l\vert l\vert} \hline
{\tiny\bf Lett...
...Y} &
{\small\bf\texttt{0x8bde94b630f1504b}} \\ \hline
\end{tabular}\end{turn}

\begin{turn}{-90}
\begin{tabular}
{\vert l\vert l\vert} \hline
{\tiny\bf Lett...
...Y} &
{\small\bf\texttt{0x8bde94b630f1504b}} \\ \hline
\end{tabular}\end{turn}

About this document ...

Providing authentication to messages signed with
a smart card in hostile environments

This document was generated using the LaTeX2HTML translator Version 98.1p1 release (March 2nd, 1998)

Copyright © 1993, 1994, 1995, 1996, 1997, Nikos Drakos, Computer Based Learning Unit, University of Leeds.

The command line arguments were:
latex2html -dir html -local_icons -split 0 kort.tex.

The translation was initiated by Per Harald Myrvang on 1999-03-23


Per Harald Myrvang
1999-03-23