Smart Card Research and Advanced Applications

11th International Conference, CARDIS 2012, Graz, Austria, November 28-30, 2012, Revised Selected Papers

  • Stefan Mangard

Part of the Lecture Notes in Computer Science book series (LNCS, volume 7771)

Table of contents

  1. Front Matter
  2. Java Card Security

    1. Michael Lackner, Reinhard Berlach, Johannes Loinig, Reinhold Weiss, Christian Steger
      Pages 1-15
    2. Guillaume Barbu, Philippe Andouard, Christophe Giraud
      Pages 16-30
  3. Protocols

    1. Sébastien Canard, Loïc Ferreira, Matt Robshaw
      Pages 46-61
  4. Side-Channel Attacks I

    1. Jean-Sébastien Coron, Emmanuel Prouff, Thomas Roche
      Pages 77-90
    2. Jean-Luc Danger, Sylvain Guilley, Philippe Hoogvorst, Cédric Murdica, David Naccache
      Pages 106-122
    3. François Durvaux, Mathieu Renauld, François-Xavier Standaert, Loic van Oldeneel tot Oldenzeel, Nicolas Veyrat-Charvillon
      Pages 123-140
  5. Implementations

    1. Josep Balasch, Bariş Ege, Thomas Eisenbarth, Benoit Gérard, Zheng Gong, Tim Güneysu et al.
      Pages 158-172
    2. Markus Pelnar, Michael Muehlberghuber, Michael Hutter
      Pages 173-187
  6. Implementations for Resource-Constrained Devices

    1. Yuto Nakano, Carlos Cid, Shinsaku Kiyomoto, Yutaka Miyake
      Pages 188-202
    2. Petr Sušil, Serge Vaudenay
      Pages 203-218
  7. Side-Channel Attacks II

    1. David Oswald, Christof Paar
      Pages 219-233
    2. Sebastien Tiran, Philippe Maurine
      Pages 234-247
    3. Johann Heyszl, Dominik Merli, Benedikt Heinz, Fabrizio De Santis, Georg Sigl
      Pages 248-262
  8. Invited Talk

    1. Eric Brier, Fortier Quentin, Roman Korkikian, K. W. Magld, David Naccache, Guilherme Ozari de Almeida et al.
      Pages 277-295
  9. Back Matter

About these proceedings


This book constitutes the thoroughly refereed post-conference proceedings of the 11th International Conference on Smart Card Research and Advanced Applications, CARDIS 2012, held in Graz, Austria, in November 2012. The 18 revised full papers presented together with an invited talk were carefully reviewed and selected from 48 submissions. The papers are organized in topical sections on Java card security, protocols, side-channel attacks, implementations, and implementations for resource-constrained devices.


AES elliptic curve cryptosystem embedded systems pervasive computing side-channel attacks

Editors and affiliations

  • Stefan Mangard
    • 1
  1. 1.Infineon Technologies AGNeubibergGermany

Bibliographic information

  • DOI
  • Copyright Information Springer-Verlag Berlin Heidelberg 2013
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-642-37287-2
  • Online ISBN 978-3-642-37288-9
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • Buy this book on publisher's site