Advertisement

Security issues for contactless smart cards

  • Michael W. David
  • Kouichi Sakurai
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 1431)

Abstract

We review the current technologies of contactless smart cards and compare them with contact cards. We discuss the problems of implementing encryption in contactless cards, and consider how to solve the problems. We also report the state of standardization of contactless smart card.

Keywords

Public key Smart-card Contactless-card Standards Efficient Implementation 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. [Amm]
    http://www.ammismartcards.comGoogle Scholar
  2. [Car]
    http://www.cardshow.com Smart Cards and Systems: Vol 2, Issues 30, 35, 36, 40Google Scholar
  3. [Cer]
    http://www.certicom.comGoogle Scholar
  4. [Gem]
    http://www.gemplus.comGoogle Scholar
  5. [GUQ]
    L.C.Guillou, M.Ugon, and J.-J. Quisqater ”The smart card: A standardized security device dedicated to public cryptology,” in Contemporary Cryptography, edited by G.J.Simmons, IEEE Press.Google Scholar
  6. [Kob]
    N.Koblitz, “Elliptic Curve Cryptosystems,” Math.Comp. Vol.48 (1987).Google Scholar
  7. [Mil]
    V.S.Miller, “Use of Elliptic CURVES in Cryptography,” Proc. CRYPTO'95.Google Scholar
  8. [MI]
    T.Matsumoto and H.Imai, “Public quadratic polynomial-tuples for efficient signature-verification and message-encryption” Proc. Eurocrypt88.Google Scholar
  9. [MILY]
    T.Matsumoto, H.Imai, C.S. Laih and S.M.Yen, “On verifiable implicit asking protocols for RSA computation,” Proc. ASIACRYPT'92.Google Scholar
  10. [Mul]
    The Web site at http: //www.multos.comGoogle Scholar
  11. [PG]
    J.Patarin and L.Goubin, ”Trapddor one-way permutations and multivariate polynomials,” in Proc. ICICS97.Google Scholar
  12. [Ram]
    http://www.ramtron.comGoogle Scholar
  13. [RSA]
    R.Rivest, A.Shamir, and L.Adleman, “A method for obtaining digital signatures and public key cryptosystems,” CACM 21 (1978).Google Scholar
  14. [Slb]
    http://www.slb.com/ms/etGoogle Scholar
  15. [Zhe]
    Y. Zheng, ”Signcryption and its applications in efficient public key solutions,” in Proc. Information Security Workshop'97.Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 1998

Authors and Affiliations

  • Michael W. David
    • 1
  • Kouichi Sakurai
    • 2
  1. 1.International Business DevelopmentCUBIC CoprorationNew YorkUSA
  2. 2.Compuer Science Dept.Kyushu UniversityFukuokaJapan

Personalised recommendations