2007
DOI: 10.1007/978-3-540-73408-6_16
|View full text |Cite
|
Sign up to set email alerts
|

OpenHSM: An Open Key Life Cycle Protocol for Public Key Infrastructure’s Hardware Security Modules

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
17
0
1

Year Published

2008
2008
2016
2016

Publication Types

Select...
3
3

Relationship

1
5

Authors

Journals

citations
Cited by 11 publications
(19 citation statements)
references
References 7 publications
0
17
0
1
Order By: Relevance
“…Martina et al [15] proposed an open protocol targeted at secure private key management within hardware security modules (HSMs). The authors argued that such security modules protect the private key against attacks that involve logical and physical tampering or even the extraction of sensitive information from the protected area.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Martina et al [15] proposed an open protocol targeted at secure private key management within hardware security modules (HSMs). The authors argued that such security modules protect the private key against attacks that involve logical and physical tampering or even the extraction of sensitive information from the protected area.…”
Section: Related Workmentioning
confidence: 99%
“…Sensor A tampering attempt transmission Sensor B tampering attempt transmission (15) (11) (5) (4) study of this system was carried out in Kazienko et al [6]. In such work, it was presented a mathematical analysis and small-scale experiments in order to measure what is the processing overhead due to the application of SENSORLock in communications between sensors.…”
Section: Broadcast Key Distributionmentioning
confidence: 99%
“…As already exposed in section 1, this work is directly derived from the work by Martina [13] in the effort of establishing an open protocol to run embedded in HSMs. The protocols proposed by Martina in his work are used to create a liable environment to store our private keys for PKI usage.…”
Section: Related Workmentioning
confidence: 99%
“…To authenticate, the algorithm authenticateGroup uses a nonce u in order to avoid Dolev-Yao's replay attack [6] as explained by Martina [13].…”
Section: Basic Algorithmsmentioning
confidence: 99%
See 1 more Smart Citation