index - Smart Card Research and Advanced Applications
   


Full Text Documents

Chargement de la page

Search

Chargement de la page

Table of Contents
Smart Card Research and Advanced Applications
Emmanuel Prouff
Front Matter

Smart Cards System Security


Evaluation of the Ability to Transform SIM Applications into Hostile Applications
Guillaume Bouffard, Jean-Louis Lanet, Jean-Baptiste Machemie, Jean-Yves Poichotte, Jean-Philippe Wary
1-17
Synchronized Attacks on Multithreaded Systems - Application to Java Card 3.0
Guillaume Barbu, Hugues Thiebeauld
18-33
A Formal Security Model of a Smart Card Web Server
Pierre Neron, Quang-Huy Nguyen
34-49

Invasive Attacks


Differential Fault Analysis of AES-128 Key Schedule Using a Single Multi-byte Fault
Sk Ali, Debdeep Mukhopadhyay
50-64
Combined Fault and Side-Channel Attack on Protected Implementations of AES
Thomas Roche, Victor Lomné, Karim Khalfallah
65-83
Memory-Efficient Fault Countermeasures
Marc Joye, Mohamed Karroumi
84-101

New Algorithms and Protocols


Redundant Modular Reduction Algorithms
Vincent Dupaquis, Alexandre Venelli
102-114
Fresh Re-keying II: Securing Multiple Parties against Side-Channel and Fault Attacks
Marcel Medwed, Christoph Petit, Francesco Regazzoni, Mathieu Renauld, François-Xavier Standaert
115-132
Fast Key Recovery Attack on ARMADILLO1 and Variants
Pouyan Sepehrdad, Petr Sušil, Serge Vaudenay
133-150

Implementations and Hardware Security 1


Implementation and Evaluation of an SCA-Resistant Embedded Processor
Stefan Tillich, Mario Kirschbaum, Alexander Szekely
151-165
Evaluating 16-Bit Processors for Elliptic Curve Cryptography
Erich Wenger, Mario Werner
166-181
A Hardware Processor Supporting Elliptic Curve Cryptography for Less than 9 kGEs
Erich Wenger, Michael Hutter
182-198

Implementations and Hardware Security 2


Memory Encryption for Smart Cards
Barış Ege, Elif Kavun, Tolga Yalçın
199-216
Compact FPGA Implementations of the Five SHA-3 Finalists
Stéphanie Kerckhof, François Durvaux, Nicolas Veyrat-Charvillon, Francesco Regazzoni, Guerric Dormale, François-Xavier Standaert
217-233

Non-invasive Attacks


An Exploration of the Kolmogorov-Smirnov Test as a Competitor to Mutual Information Analysis
Carolyn Whitnall, Elisabeth Oswald, Luke Mather
234-251
A High-Performance Implementation of Differential Power Analysis on Graphics Cards
Timo Bartkewitz, Kerstin Lemke-Rust
252-265
RAM: Rapid Alignment Method
Ruben Muijrers, Jasper Woudenberg, Lejla Batina
266-282

Java Card Security


Combined Software and Hardware Attacks on the Java Card Control Flow
Guillaume Bouffard, Julien Iguchi-Cartigny, Jean-Louis Lanet
283-296
Java Card Operand Stack : Fault Attacks, Combined Attacks and Countermeasures
Guillaume Barbu, Guillaume Duc, Philippe Hoogvorst
297-313
Formal Analysis of CWA 14890-1
Ashar Javed
314-335

 

 


Designed by Inria-IES Team : http://hal.inria.fr/    Hosted by HAL : http://hal.archives-ouvertes.fr/