Stop the war!
Остановите войну!
for scientists:
default search action
10th CARDIS 2011: Leuven, Belgium
- Emmanuel Prouff:
Smart Card Research and Advanced Applications - 10th IFIP WG 8.8/11.2 International Conference, CARDIS 2011, Leuven, Belgium, September 14-16, 2011, Revised Selected Papers. Lecture Notes in Computer Science 7079, Springer 2011, ISBN 978-3-642-27256-1
Smart Cards System Security
- Guillaume Bouffard, Jean-Louis Lanet, Jean-Baptiste Machemie, Jean-Yves Poichotte, Jean-Philippe Wary:
Evaluation of the Ability to Transform SIM Applications into Hostile Applications. 1-17 - Guillaume Barbu, Hugues Thiebeauld:
Synchronized Attacks on Multithreaded Systems - Application to Java Card 3.0 -. 18-33 - Pierre Neron, Quang-Huy Nguyen:
A Formal Security Model of a Smart Card Web Server. 34-49
Invasive Attacks
- Subidh Ali, Debdeep Mukhopadhyay:
Differential Fault Analysis of AES-128 Key Schedule Using a Single Multi-byte Fault. 50-64 - Thomas Roche, Victor Lomné, Karim Khalfallah:
Combined Fault and Side-Channel Attack on Protected Implementations of AES. 65-83 - Marc Joye, Mohamed Karroumi:
Memory-Efficient Fault Countermeasures. 84-101
New Algorithms and Protocols
- Vincent Dupaquis, Alexandre Venelli:
Redundant Modular Reduction Algorithms. 102-114 - Marcel Medwed, Christophe Petit, Francesco Regazzoni, Mathieu Renauld, François-Xavier Standaert:
Fresh Re-keying II: Securing Multiple Parties against Side-Channel and Fault Attacks. 115-132 - Pouyan Sepehrdad, Petr Susil, Serge Vaudenay:
Fast Key Recovery Attack on ARMADILLO1 and Variants. 133-150
Implementations and Hardware Security 1
- Stefan Tillich, Mario Kirschbaum, Alexander Szekely:
Implementation and Evaluation of an SCA-Resistant Embedded Processor. 151-165 - Erich Wenger, Mario Werner:
Evaluating 16-Bit Processors for Elliptic Curve Cryptography. 166-181 - Erich Wenger, Michael Hutter:
A Hardware Processor Supporting Elliptic Curve Cryptography for Less than 9 kGEs. 182-198
Implementations and Hardware Security 2
- Baris Ege, Elif Bilge Kavun, Tolga Yalçin:
Memory Encryption for Smart Cards. 199-216 - Stéphanie Kerckhof, François Durvaux, Nicolas Veyrat-Charvillon, Francesco Regazzoni, Guerric Meurice de Dormale, François-Xavier Standaert:
Compact FPGA Implementations of the Five SHA-3 Finalists. 217-233
Non-invasive Attacks
- Carolyn Whitnall, Elisabeth Oswald, Luke Mather:
An Exploration of the Kolmogorov-Smirnov Test as a Competitor to Mutual Information Analysis. 234-251 - Timo Bartkewitz, Kerstin Lemke-Rust:
A High-Performance Implementation of Differential Power Analysis on Graphics Cards. 252-265 - Ruben A. Muijrers, Jasper G. J. van Woudenberg, Lejla Batina:
RAM: Rapid Alignment Method. 266-282
Java Card Security
- Guillaume Bouffard, Julien Iguchi-Cartigny, Jean-Louis Lanet:
Combined Software and Hardware Attacks on the Java Card Control Flow. 283-296 - Guillaume Barbu, Guillaume Duc, Philippe Hoogvorst:
Java Card Operand Stack: Fault Attacks, Combined Attacks and Countermeasures. 297-313 - Ashar Javed:
Formal Analysis of CWA 14890-1. 314-335
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.