Skip to main content
  • Conference proceedings
  • © 2013

Smart Card Research and Advanced Applications

11th International Conference, CARDIS 2012, Graz, Austria, November 28-30, 2012, Revised Selected Papers

Editors:

  • State-of-the-art research
  • Fast-track conference proceedings
  • Unique visibility

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 7771)

Part of the book sub series: Security and Cryptology (LNSC)

Conference series link(s): CARDIS: International Conference on Smart Card Research and Advanced Applications

Conference proceedings info: CARDIS 2012.

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (19 papers)

  1. Front Matter

  2. Java Card Security

    1. Towards the Hardware Accelerated Defensive Virtual Machine – Type and Bound Protection

      • Michael Lackner, Reinhard Berlach, Johannes Loinig, Reinhold Weiss, Christian Steger
      Pages 1-15
    2. Dynamic Fault Injection Countermeasure

      • Guillaume Barbu, Philippe Andouard, Christophe Giraud
      Pages 16-30
  3. Protocols

    1. Improved (and Practical) Public-Key Authentication for UHF RFID Tags

      • Sébastien Canard, Loïc Ferreira, Matt Robshaw
      Pages 46-61
  4. Side-Channel Attacks I

    1. On the Use of Shamir’s Secret Sharing against Side-Channel Analysis

      • Jean-Sébastien Coron, Emmanuel Prouff, Thomas Roche
      Pages 77-90
    2. Low-Cost Countermeasure against RPA

      • Jean-Luc Danger, Sylvain Guilley, Philippe Hoogvorst, Cédric Murdica, David Naccache
      Pages 106-122
    3. Efficient Removal of Random Delays from Embedded Software Implementations Using Hidden Markov Models

      • François Durvaux, Mathieu Renauld, François-Xavier Standaert, Loic van Oldeneel tot Oldenzeel, Nicolas Veyrat-Charvillon
      Pages 123-140
  5. Implementations

    1. Compact Implementation and Performance Evaluation of Hash Functions in ATtiny Devices

      • Josep Balasch, BariÅŸ Ege, Thomas Eisenbarth, Benoit Gérard, Zheng Gong, Tim Güneysu et al.
      Pages 158-172
    2. Putting together What Fits together - GrÆStl

      • Markus Pelnar, Michael Muehlberghuber, Michael Hutter
      Pages 173-187
  6. Implementations for Resource-Constrained Devices

    1. Memory Access Pattern Protection for Resource-Constrained Devices

      • Yuto Nakano, Carlos Cid, Shinsaku Kiyomoto, Yutaka Miyake
      Pages 188-202
    2. Multipurpose Cryptographic Primitive ARMADILLO3

      • Petr SuÅ¡il, Serge Vaudenay
      Pages 203-218
  7. Side-Channel Attacks II

    1. Improving Side-Channel Analysis with Optimal Linear Transforms

      • David Oswald, Christof Paar
      Pages 219-233
    2. SCA with Magnitude Squared Coherence

      • Sebastien Tiran, Philippe Maurine
      Pages 234-247
    3. Strengths and Limitations of High-Resolution Electromagnetic Field Measurements for Side-Channel Analysis

      • Johann Heyszl, Dominik Merli, Benedikt Heinz, Fabrizio De Santis, Georg Sigl
      Pages 248-262
  8. Invited Talk

    1. Defensive Leakage Camouflage

      • Eric Brier, Fortier Quentin, Roman Korkikian, K. W. Magld, David Naccache, Guilherme Ozari de Almeida et al.
      Pages 277-295

Other Volumes

  1. Smart Card Research and Advanced Applications

About this book

This book constitutes the thoroughly refereed post-conference proceedings of the 11th International Conference on Smart Card Research and Advanced Applications, CARDIS 2012, held in Graz, Austria, in November 2012. The 18 revised full papers presented together with an invited talk were carefully reviewed and selected from 48 submissions. The papers are organized in topical sections on Java card security, protocols, side-channel attacks, implementations, and implementations for resource-constrained devices.

Editors and Affiliations

  • Infineon Technologies AG, Neubiberg, Germany

    Stefan Mangard

Bibliographic Information

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access