default search action
11th CARDIS 2012: Graz, Austria
- Stefan Mangard:
Smart Card Research and Advanced Applications - 11th International Conference, CARDIS 2012, Graz, Austria, November 28-30, 2012, Revised Selected Papers. Lecture Notes in Computer Science 7771, Springer 2013, ISBN 978-3-642-37287-2
Java Card Security
- Michael Lackner, Reinhard Berlach, Johannes Loinig, Reinhold Weiss, Christian Steger:
Towards the Hardware Accelerated Defensive Virtual Machine - Type and Bound Protection. 1-15 - Guillaume Barbu, Philippe Andouard, Christophe Giraud:
Dynamic Fault Injection Countermeasure - A New Conception of Java Card Security. 16-30 - Julien Lancia:
Java Card Combined Attacks with Localization-Agnostic Fault Injection. 31-45
Protocols
- Sébastien Canard, Loïc Ferreira, Matthew Robshaw:
Improved (and Practical) Public-Key Authentication for UHF RFID Tags. 46-61 - Jan Hajny, Lukas Malina:
Unlinkable Attribute-Based Credentials with Practical Revocation on Smart-Cards. 62-76
Side-Channel Attacks I
- Jean-Sébastien Coron, Emmanuel Prouff, Thomas Roche:
On the Use of Shamir's Secret Sharing against Side-Channel Analysis. 77-90 - Luk Bettale:
Secure Multiple SBoxes Implementation with Arithmetically Masked Input. 91-105 - Jean-Luc Danger, Sylvain Guilley, Philippe Hoogvorst, Cédric Murdica, David Naccache:
Low-Cost Countermeasure against RPA. 106-122 - François Durvaux, Mathieu Renauld, François-Xavier Standaert, Loïc van Oldeneel tot Oldenzeel, Nicolas Veyrat-Charvillon:
Efficient Removal of Random Delays from Embedded Software Implementations Using Hidden Markov Models. 123-140
Implementations
- Tolga Yalçin, Elif Bilge Kavun:
On the Implementation Aspects of Sponge-Based Authenticated Encryption for Pervasive Devices. 141-157 - Josep Balasch, Baris Ege, Thomas Eisenbarth, Benoît Gérard, Zheng Gong, Tim Güneysu, Stefan Heyse, Stéphanie Kerckhof, François Koeune, Thomas Plos, Thomas Pöppelmann, Francesco Regazzoni, François-Xavier Standaert, Gilles Van Assche, Ronny Van Keer, Loïc van Oldeneel tot Oldenzeel, Ingo von Maurich:
Compact Implementation and Performance Evaluation of Hash Functions in ATtiny Devices. 158-172 - Markus Pelnar, Michael Muehlberghuber, Michael Hutter:
Putting together What Fits together - GrÆStl. 173-187
Implementations for Resource-Constrained Devices
- Yuto Nakano, Carlos Cid, Shinsaku Kiyomoto, Yutaka Miyake:
Memory Access Pattern Protection for Resource-Constrained Devices. 188-202 - Petr Susil, Serge Vaudenay:
Multipurpose Cryptographic Primitive ARMADILLO3. 203-218
Side-Channel Attacks II
- David F. Oswald, Christof Paar:
Improving Side-Channel Analysis with Optimal Linear Transforms. 219-233 - Sébastien Tiran, Philippe Maurine:
SCA with Magnitude Squared Coherence. 234-247 - Johann Heyszl, Dominik Merli, Benedikt Heinz, Fabrizio De Santis, Georg Sigl:
Strengths and Limitations of High-Resolution Electromagnetic Field Measurements for Side-Channel Analysis. 248-262 - Timo Bartkewitz, Kerstin Lemke-Rust:
Efficient Template Attacks Based on Probabilistic Multi-class Support Vector Machines. 263-276
Invited Talk
- Eric Brier, Quentin Fortier, Roman Korkikian, Khalid W. Magld, David Naccache, Guilherme Ozari de Almeida, Adrien Pommellet, A. H. Ragab, Jean Vuillemin:
Defensive Leakage Camouflage. 277-295
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.