REFERENCES
(2013). 2nd Generation Intel Core Processor Family,
Datasheet, Vol.1. Intel, 8th edition. Doc. No. 324641-
008.
(2013). Debian – The Universal Operating System. online:
http://www.debian.org/. retrieved: 04.2014.
(2014). AMD Geode LX Processor Family. AMD. Doc.
No. 33358E.
Aboba, B., Blunk, L., Vollbrecht, J., and Carlson, J. (2004).
Extensible Authentication Protocol (EAP). Technical
Report RFC:3748, IETF.
Asokan, N., Tsudik, G., and Waidner, M. (1996). Server-
supported signatures. In Computer Security - ES-
ORICS 96, volume 1146 of LNCS, pages 131–143.
Bellare, M., Canetti, R., and Krawczyk, H. (1996).
Keying Hash Functions for Message Authentication.
CRYPTO, LNCS, 1109:1–15.
Bergamo, P., D’Arco, P., De Santis, A., and Kocarev, L.
(2005). Security of Public-Key Cryptosystems Based
on Chebyshev Polynomials. IEEE Trans. on Circuits
and Systems I: Regular Papers, 52(7):1382 – 1393.
Bertoni, G., Daemen, J., Peeters, M., and van Assche, G.
(2011). The KECCAK SHA-3 submission. Technical
Report 3, STMicroelectronics and NXP Semiconduc-
tors.
Bicakci, K. and Baykal, N. (2002). Infinite Length Hash
Chains and their Applications. In Eleventh IEEE
International Workshops on Enabling Technologies:
Infrastructure for Collaborative Enterprises, 2002.
WET ICE 2002, pages 57–61.
BSI (2014). Kryptographische Verfahren: Empfehlungen
und Schl¨ussell¨angen.
Chang, S., Perlner, R., Burr, W. E., Turan, M. S., Kelsey,
J. M., Paul, S., and Bassham, L. E. (2012). Third
Round Report of the SHA-3 Cryptographic Hash Al-
gorithm Competition. Technical report, NIST.
Coppersmith, D. and Jakobsson, M. (2002). Almost Opti-
mal Hash Sequence Traversal. In Proc. of the Fourth
Conference on financial Cryptography, volume 2357
of LNCS, pages 102–119. Springer Berlin Heidelberg.
Dai, W. (2014). Crypto++ Library. online:
http://www.cryptopp.com/. retrieved: 04.2014.
Devanbu, P. T. and Stubblebine, S. (1998). Stack and Queue
Integrity on Hostile Platforms. In Proc. 1998 IEEE
Symposium on Research in Security and Privacy.
Di Pietro, R., Durante, A., Mancini, L., and Patil, V. (2005).
Practically Unbounded One-Way Chains for Authen-
tication with Backward Secrecy. In First International
Conference on Security and Privacy for Emerging Ar-
eas in Communications Networks, pages 400–402.
Di Pietro, R., Mancini, L. V., Durante, A., and Patil, V.
(2006). Addressing the Shortcomings of one-way
Chains. In Proc. of the 2006 ACM Symposium on
Information, computer and communications security
ASIACCS ’06, pages 289–296.
Florˆencio, D. and Herley, C. (2007). A Large-Scale Study
of Web Password Habits. In Proc. of the 16th interna-
tional conference on World Wide Web, pages 657–666.
Haller, N. and Metz, C. (1996). A One-Time Password Sys-
tem. Technical Report RFC:1938, IETF.
Hu, Y.-C., Jakobsson, M., and Perrig, A. (2005). Efficient
Constructions for One-way Hash Chains. In Proc. of
the Conference of Applied Cryptography and Network
Security (ACNS), pages 7–10.
ISO (2009). ISO/IEC 9945:2008 Information technology –
Portable Operating System Interface (POSIX
R
).
Jakobsson, M. (2002). Fractal Hash Sequence Represen-
tation and Traversal. In Proc. of the 2002 IEEE In-
ternational Symposium on Information Theory, pages
437–444.
Koblitz, N. (1987). Elliptic Curve Cryptosystems. Mathe-
matics of Computation, 48(177):203–209.
Lamport, L. (1981). Password Authentication with Insecure
Communication. Com. of the ACM, 24(11):770–772.
Lehmann, A. (2010). On the Security of Hash Function
Combiners. PhD thesis, Technische Universit¨at Darm-
stadt.
Menezes, A. J., van Oorschot, P. C., and Vanstone, S. A.
(1996). Handbook of Applied Cryptography. CRC
Press.
Miller, V. S. (1986). Use of Elliptic Curves in Cryptogra-
phy. In Williams, H. C., editor, Advances in Cryptol-
ogy - CRYPTO’85Proceedings, volume 218 of LNCS,
pages 417–426. Springer Berlin Heidelberg.
M’Raihi, D., Bellare, M., Naccache, D., and Ranen, O.
(2005). HOTP: An HMAC-Based One-Time Pass-
word Algorithm. Technical Report RFC: 4226, Net-
work Working Group, IETF.
M’Raihi, D., Machani, S., Pei, M., and Rydell, J. (2011).
TOTP: Time-Based One-Time Password Algorithm.
Technical Report RFC:6238, IETF.
NIST (2012). Secure Hash Standard (SHS).
NIST (2013). Digital Signature Standard (DSS).
NIST (2014). SHA-3 Standard: Permutation-Based Hash
and Extendable-Output Functions. draft.
Paar, C. and Pelzl, J. (2010). Understanding Cryptography.
Springer, 2nd edition.
Paoloni, G. (2010). How to Benchmark Code Execution
Times on Intel IA-32 and IA-64 Instruction Set Ar-
chitectures. White Paper 324264-001, Intel.
R. M. Stallman et. al. (2012). Using the GNU Compiler Col-
lection, For GCC version 4.7.2. Free Software Foun-
dation.
Rivest, L. and Shamir, A. (1996). PayWord and MicroMint:
Two simple micropayment schemes. In CryptoBytes,
pages 69–87.
Rivest, R., Shamir, A., and Adleman, L. (1978). A
Method for Obtaining Digital Signatures and Public-
Key Cryptosystems. Com. of the ACM, 21(2):120–
126.
Schneier, B. and Kelsey, J. (1998). Cryptographic Support
for Secure Logs on Untrusted Machines. In Proc. 7th
USENIX Security Symposium, San Antonio, Texas.
Xiao, D., Liao, X., Tang, G., and Li, C. (2004). Using
Chebyshev Chaotic Map to Construct Infinite Length
Hash Chains. In ICCCAS 2004, volume 1, pages 11–
12.
SECRYPT2014-InternationalConferenceonSecurityandCryptography
220