Smart Card Research and Advanced Applications

13th International Conference, CARDIS 2014, Paris, France, November 5-7, 2014. Revised Selected Papers

  • Marc Joye
  • Amir Moradi
Conference proceedings CARDIS 2014
Part of the Lecture Notes in Computer Science book series (LNCS, volume 8968)

Table of contents

  1. Front Matter
    Pages I-X
  2. Java Cards

    1. Front Matter
      Pages 1-1
    2. Jean-Louis Lanet, Guillaume Bouffard, Rokia Lamrani, Ranim Chakra, Afef Mestiri, Mohammed Monsif et al.
      Pages 3-17
    3. Guillaume Bouffard, Michael Lackner, Jean-Louis Lanet, Johannes Loinig
      Pages 18-31
  3. Software Countermeasures

    1. Front Matter
      Pages 33-33
    2. Victor Servant, Nicolas Debande, Houssem Maghrebi, Julien Bringer
      Pages 35-48
    3. Cong Chen, Thomas Eisenbarth, Aria Shahverdi, Xin Ye
      Pages 49-63
    4. Josep Balasch, Benedikt Gierlichs, Vincent Grosso, Oscar Reparaz, François-Xavier Standaert
      Pages 64-81
  4. Side-Channel Analysis

    1. Front Matter
      Pages 83-83
    2. Marios O. Choudary, Markus G. Kuhn
      Pages 85-103
    3. Tanja Lange, Christine van Vredendaal, Marnix Wakker
      Pages 104-121
    4. Vincent Grosso, Romain Poussier, François-Xavier Standaert, Lubos Gaspar
      Pages 122-136
  5. Embedded Implementations

    1. Front Matter
      Pages 137-137
    2. Jean-Claude Bajard, Nabil Merkiche
      Pages 139-153
    3. Kimmo Järvinen, Ingrid Verbauwhede
      Pages 154-170
  6. Public-Key Cryptography

    1. Front Matter
      Pages 171-171
    2. Ryad Benadjila, Thomas Calderon, Marion Daubignard
      Pages 173-192
    3. Aurore Guillevic, Damien Vergnaud
      Pages 193-211
  7. Leakage and Fault Attacks

    1. Front Matter
      Pages 213-213

About these proceedings

Introduction

This book constitutes the thoroughly refereed post-conference proceedings of the 13th International Conference on Smart Card Research and Advanced Applications, CARDIS 2014, held in Paris, France, in November 2014. The 15 revised full papers presented in this book were carefully reviewed and selected from 56 submissions. The papers are organized in topical sections on Java cards; software countermeasures; side-channel analysis; embedded implementations; public-key cryptography; and leakage and fault attacks.

Keywords

Counter measures Formal methods Human and societal aspects of security and privacy Mask attacks Protocol analysis Security Security in hardware Security services Side channel analysis Smart cards Software analysis Software and application security

Editors and affiliations

  • Marc Joye
    • 1
  • Amir Moradi
    • 2
  1. 1.TechnicolorLos AltosUSA
  2. 2.Ruhr UniversityBochumGermany

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-319-16763-3
  • Copyright Information Springer International Publishing Switzerland 2015
  • Publisher Name Springer, Cham
  • eBook Packages Computer Science
  • Print ISBN 978-3-319-16762-6
  • Online ISBN 978-3-319-16763-3
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349