


default search action
10th CARDIS 2011: Leuven, Belgium
- Emmanuel Prouff:

Smart Card Research and Advanced Applications - 10th IFIP WG 8.8/11.2 International Conference, CARDIS 2011, Leuven, Belgium, September 14-16, 2011, Revised Selected Papers. Lecture Notes in Computer Science 7079, Springer 2011, ISBN 978-3-642-27256-1
Smart Cards System Security
- Guillaume Bouffard

, Jean-Louis Lanet, Jean-Baptiste Machemie, Jean-Yves Poichotte, Jean-Philippe Wary:
Evaluation of the Ability to Transform SIM Applications into Hostile Applications. 1-17 - Guillaume Barbu, Hugues Thiebeauld:

Synchronized Attacks on Multithreaded Systems - Application to Java Card 3.0 -. 18-33 - Pierre Neron, Quang-Huy Nguyen:

A Formal Security Model of a Smart Card Web Server. 34-49
Invasive Attacks
- Subidh Ali

, Debdeep Mukhopadhyay:
Differential Fault Analysis of AES-128 Key Schedule Using a Single Multi-byte Fault. 50-64 - Thomas Roche, Victor Lomné, Karim Khalfallah:

Combined Fault and Side-Channel Attack on Protected Implementations of AES. 65-83 - Marc Joye, Mohamed Karroumi:

Memory-Efficient Fault Countermeasures. 84-101
New Algorithms and Protocols
- Vincent Dupaquis, Alexandre Venelli:

Redundant Modular Reduction Algorithms. 102-114 - Marcel Medwed, Christophe Petit

, Francesco Regazzoni
, Mathieu Renauld, François-Xavier Standaert
:
Fresh Re-keying II: Securing Multiple Parties against Side-Channel and Fault Attacks. 115-132 - Pouyan Sepehrdad, Petr Susil, Serge Vaudenay:

Fast Key Recovery Attack on ARMADILLO1 and Variants. 133-150
Implementations and Hardware Security 1
- Stefan Tillich, Mario Kirschbaum, Alexander Szekely:

Implementation and Evaluation of an SCA-Resistant Embedded Processor. 151-165 - Erich Wenger, Mario Werner:

Evaluating 16-Bit Processors for Elliptic Curve Cryptography. 166-181 - Erich Wenger, Michael Hutter:

A Hardware Processor Supporting Elliptic Curve Cryptography for Less than 9 kGEs. 182-198
Implementations and Hardware Security 2
- Baris Ege, Elif Bilge Kavun, Tolga Yalçin

:
Memory Encryption for Smart Cards. 199-216 - Stéphanie Kerckhof, François Durvaux, Nicolas Veyrat-Charvillon, Francesco Regazzoni

, Guerric Meurice de Dormale, François-Xavier Standaert
:
Compact FPGA Implementations of the Five SHA-3 Finalists. 217-233
Non-invasive Attacks
- Carolyn Whitnall, Elisabeth Oswald

, Luke Mather:
An Exploration of the Kolmogorov-Smirnov Test as a Competitor to Mutual Information Analysis. 234-251 - Timo Bartkewitz, Kerstin Lemke-Rust:

A High-Performance Implementation of Differential Power Analysis on Graphics Cards. 252-265 - Ruben A. Muijrers, Jasper G. J. van Woudenberg, Lejla Batina:

RAM: Rapid Alignment Method. 266-282
Java Card Security
- Guillaume Bouffard

, Julien Iguchi-Cartigny, Jean-Louis Lanet:
Combined Software and Hardware Attacks on the Java Card Control Flow. 283-296 - Guillaume Barbu, Guillaume Duc, Philippe Hoogvorst:

Java Card Operand Stack: Fault Attacks, Combined Attacks and Countermeasures. 297-313 - Ashar Javed:

Formal Analysis of CWA 14890-1. 314-335

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














