Smart Card Research and Advanced Applications

11th International Conference, CARDIS 2012, Graz, Austria, November 28-30, 2012, Revised Selected Papers

Editors:

ISBN: 978-3-642-37287-2 (Print) 978-3-642-37288-9 (Online)

Table of contents (19 chapters)

  1. Front Matter

    Pages -

  2. Java Card Security

    1. No Access

      Book Chapter

      Pages 1-15

      Towards the Hardware Accelerated Defensive Virtual Machine – Type and Bound Protection

    2. No Access

      Book Chapter

      Pages 16-30

      Dynamic Fault Injection Countermeasure

    3. No Access

      Book Chapter

      Pages 31-45

      Java Card Combined Attacks with Localization-Agnostic Fault Injection

  3. Protocols

    1. No Access

      Book Chapter

      Pages 46-61

      Improved (and Practical) Public-Key Authentication for UHF RFID Tags

    2. No Access

      Book Chapter

      Pages 62-76

      Unlinkable Attribute-Based Credentials with Practical Revocation on Smart-Cards

  4. Side-Channel Attacks I

    1. No Access

      Book Chapter

      Pages 77-90

      On the Use of Shamir’s Secret Sharing against Side-Channel Analysis

    2. No Access

      Book Chapter

      Pages 91-105

      Secure Multiple SBoxes Implementation with Arithmetically Masked Input

    3. No Access

      Book Chapter

      Pages 106-122

      Low-Cost Countermeasure against RPA

    4. No Access

      Book Chapter

      Pages 123-140

      Efficient Removal of Random Delays from Embedded Software Implementations Using Hidden Markov Models

  5. Implementations

    1. No Access

      Book Chapter

      Pages 141-157

      On the Implementation Aspects of Sponge-Based Authenticated Encryption for Pervasive Devices

    2. No Access

      Book Chapter

      Pages 158-172

      Compact Implementation and Performance Evaluation of Hash Functions in ATtiny Devices

    3. No Access

      Book Chapter

      Pages 173-187

      Putting together What Fits together - GrÆStl

  6. Implementations for Resource-Constrained Devices

    1. No Access

      Book Chapter

      Pages 188-202

      Memory Access Pattern Protection for Resource-Constrained Devices

    2. No Access

      Book Chapter

      Pages 203-218

      Multipurpose Cryptographic Primitive ARMADILLO3

  7. Side-Channel Attacks II

    1. No Access

      Book Chapter

      Pages 219-233

      Improving Side-Channel Analysis with Optimal Linear Transforms

    2. No Access

      Book Chapter

      Pages 234-247

      SCA with Magnitude Squared Coherence

    3. No Access

      Book Chapter

      Pages 248-262

      Strengths and Limitations of High-Resolution Electromagnetic Field Measurements for Side-Channel Analysis

    4. No Access

      Book Chapter

      Pages 263-276

      Efficient Template Attacks Based on Probabilistic Multi-class Support Vector Machines

  8. Invited Talk

    1. No Access

      Book Chapter

      Pages 277-295

      Defensive Leakage Camouflage

  9. Back Matter

    Pages -