Smart Card Research and Advanced Applications

11th International Conference, CARDIS 2012, Graz, Austria, November 28-30, 2012, Revised Selected Papers

  • Stefan Mangard
Conference proceedings CARDIS 2012

DOI: 10.1007/978-3-642-37288-9

Part of the Lecture Notes in Computer Science book series (LNCS, volume 7771)

Table of contents (19 papers)

  1. Front Matter
  2. Java Card Security

    1. Towards the Hardware Accelerated Defensive Virtual Machine – Type and Bound Protection
      Michael Lackner, Reinhard Berlach, Johannes Loinig, Reinhold Weiss, Christian Steger
      Pages 1-15
    2. Dynamic Fault Injection Countermeasure
      Guillaume Barbu, Philippe Andouard, Christophe Giraud
      Pages 16-30
  3. Protocols

    1. Improved (and Practical) Public-Key Authentication for UHF RFID Tags
      Sébastien Canard, Loïc Ferreira, Matt Robshaw
      Pages 46-61
  4. Side-Channel Attacks I

    1. On the Use of Shamir’s Secret Sharing against Side-Channel Analysis
      Jean-Sébastien Coron, Emmanuel Prouff, Thomas Roche
      Pages 77-90
    2. Low-Cost Countermeasure against RPA
      Jean-Luc Danger, Sylvain Guilley, Philippe Hoogvorst, Cédric Murdica, David Naccache
      Pages 106-122
    3. Efficient Removal of Random Delays from Embedded Software Implementations Using Hidden Markov Models
      François Durvaux, Mathieu Renauld, François-Xavier Standaert, Loic van Oldeneel tot Oldenzeel, Nicolas Veyrat-Charvillon
      Pages 123-140
  5. Implementations

    1. Compact Implementation and Performance Evaluation of Hash Functions in ATtiny Devices
      Josep Balasch, Bariş Ege, Thomas Eisenbarth, Benoit Gérard, Zheng Gong, Tim Güneysu et al.
      Pages 158-172
    2. Putting together What Fits together - GrÆStl
      Markus Pelnar, Michael Muehlberghuber, Michael Hutter
      Pages 173-187
  6. Implementations for Resource-Constrained Devices

    1. Memory Access Pattern Protection for Resource-Constrained Devices
      Yuto Nakano, Carlos Cid, Shinsaku Kiyomoto, Yutaka Miyake
      Pages 188-202
    2. Multipurpose Cryptographic Primitive ARMADILLO3
      Petr Sušil, Serge Vaudenay
      Pages 203-218
  7. Side-Channel Attacks II

    1. Improving Side-Channel Analysis with Optimal Linear Transforms
      David Oswald, Christof Paar
      Pages 219-233
    2. SCA with Magnitude Squared Coherence
      Sebastien Tiran, Philippe Maurine
      Pages 234-247
    3. Strengths and Limitations of High-Resolution Electromagnetic Field Measurements for Side-Channel Analysis
      Johann Heyszl, Dominik Merli, Benedikt Heinz, Fabrizio De Santis, Georg Sigl
      Pages 248-262
  8. Invited Talk

    1. Defensive Leakage Camouflage
      Eric Brier, Fortier Quentin, Roman Korkikian, K. W. Magld, David Naccache, Guilherme Ozari de Almeida et al.
      Pages 277-295

About these proceedings


This book constitutes the thoroughly refereed post-conference proceedings of the 11th International Conference on Smart Card Research and Advanced Applications, CARDIS 2012, held in Graz, Austria, in November 2012. The 18 revised full papers presented together with an invited talk were carefully reviewed and selected from 48 submissions. The papers are organized in topical sections on Java card security, protocols, side-channel attacks, implementations, and implementations for resource-constrained devices.


AES elliptic curve cryptosystem embedded systems pervasive computing side-channel attacks

Editors and affiliations

  • Stefan Mangard
    • 1
  1. 1.Infineon Technologies AGNeubibergGermany

Bibliographic information

  • Copyright Information Springer-Verlag Berlin Heidelberg 2013
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-642-37287-2
  • Online ISBN 978-3-642-37288-9
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349