Smart Card Research and Advanced Applications 9th IFIP WG 8.8/11.2 International Conference, CARDIS 2010, Passau, Germany, April 14-16, 2010, Proceedings / [electronic resource] :
edited by Dieter Gollmann, Jean-Louis Lanet, Julien Iguchi-Cartigny.
- 1st ed. 2010.
- X, 239 p. 78 illus. online resource.
- Security and Cryptology, 6035 2946-1863 ; .
- Security and Cryptology, 6035 .
Mathematical Algorithms -- The Polynomial Composition Problem in (?/n?)[X] -- Enhance Multi-bit Spectral Analysis on Hiding in Temporal Dimension -- Secure Delegation of Elliptic-Curve Pairing -- Side Channel Analysis -- Side-Channel Leakage across Borders -- Designing a Side Channel Resistant Random Number Generator -- Simple Power Analysis on Exponentiation Revisited -- Atomicity Improvement for Elliptic Curve Scalar Multiplication -- Systems -- Key-Study to Execute Code Using Demand Paging and NAND Flash at Smart Card Scale -- Firewall Mechanism in a User Centric Smart Card Ownership Model -- Logical Attacks -- Combined Attacks and Countermeasures -- Attacks on Java Card 3.0 Combining Fault and Logical Attacks -- Fault Analysis -- Improved Fault Analysis of Signature Schemes -- When Clocks Fail: On Critical Paths and Clock Faults -- Privacy -- Modeling Privacy for Off-Line RFID Systems -- Developing Efficient Blinded Attribute Certificates on Smart Cards via Pairings -- On the Design and Implementation of an Efficient DAA Scheme.
9783642125102
10.1007/978-3-642-12510-2 doi
Computer networks .
User interfaces (Computer systems).
Human-computer interaction.
Computers and civilization.
Cryptography.
Data encryption (Computer science).
Electronic data processing--Management.
Algorithms.
Computer Communication Networks.
User Interfaces and Human Computer Interaction.
Computers and Society.
Cryptology.
IT Operations.
Algorithms.
TK5105.5-5105.9
004.6
Mathematical Algorithms -- The Polynomial Composition Problem in (?/n?)[X] -- Enhance Multi-bit Spectral Analysis on Hiding in Temporal Dimension -- Secure Delegation of Elliptic-Curve Pairing -- Side Channel Analysis -- Side-Channel Leakage across Borders -- Designing a Side Channel Resistant Random Number Generator -- Simple Power Analysis on Exponentiation Revisited -- Atomicity Improvement for Elliptic Curve Scalar Multiplication -- Systems -- Key-Study to Execute Code Using Demand Paging and NAND Flash at Smart Card Scale -- Firewall Mechanism in a User Centric Smart Card Ownership Model -- Logical Attacks -- Combined Attacks and Countermeasures -- Attacks on Java Card 3.0 Combining Fault and Logical Attacks -- Fault Analysis -- Improved Fault Analysis of Signature Schemes -- When Clocks Fail: On Critical Paths and Clock Faults -- Privacy -- Modeling Privacy for Off-Line RFID Systems -- Developing Efficient Blinded Attribute Certificates on Smart Cards via Pairings -- On the Design and Implementation of an Efficient DAA Scheme.
9783642125102
10.1007/978-3-642-12510-2 doi
Computer networks .
User interfaces (Computer systems).
Human-computer interaction.
Computers and civilization.
Cryptography.
Data encryption (Computer science).
Electronic data processing--Management.
Algorithms.
Computer Communication Networks.
User Interfaces and Human Computer Interaction.
Computers and Society.
Cryptology.
IT Operations.
Algorithms.
TK5105.5-5105.9
004.6