


default search action
11th CARDIS 2012: Graz, Austria
- Stefan Mangard:

Smart Card Research and Advanced Applications - 11th International Conference, CARDIS 2012, Graz, Austria, November 28-30, 2012, Revised Selected Papers. Lecture Notes in Computer Science 7771, Springer 2013, ISBN 978-3-642-37287-2
Java Card Security
- Michael Lackner, Reinhard Berlach, Johannes Loinig, Reinhold Weiss, Christian Steger:

Towards the Hardware Accelerated Defensive Virtual Machine - Type and Bound Protection. 1-15 - Guillaume Barbu, Philippe Andouard, Christophe Giraud

:
Dynamic Fault Injection Countermeasure - A New Conception of Java Card Security. 16-30 - Julien Lancia:

Java Card Combined Attacks with Localization-Agnostic Fault Injection. 31-45
Protocols
- Sébastien Canard, Loïc Ferreira, Matthew Robshaw:

Improved (and Practical) Public-Key Authentication for UHF RFID Tags. 46-61 - Jan Hajny, Lukas Malina

:
Unlinkable Attribute-Based Credentials with Practical Revocation on Smart-Cards. 62-76
Side-Channel Attacks I
- Jean-Sébastien Coron, Emmanuel Prouff, Thomas Roche:

On the Use of Shamir's Secret Sharing against Side-Channel Analysis. 77-90 - Luk Bettale:

Secure Multiple SBoxes Implementation with Arithmetically Masked Input. 91-105 - Jean-Luc Danger, Sylvain Guilley, Philippe Hoogvorst, Cédric Murdica, David Naccache:

Low-Cost Countermeasure against RPA. 106-122 - François Durvaux, Mathieu Renauld, François-Xavier Standaert

, Loïc van Oldeneel tot Oldenzeel, Nicolas Veyrat-Charvillon:
Efficient Removal of Random Delays from Embedded Software Implementations Using Hidden Markov Models. 123-140
Implementations
- Tolga Yalçin

, Elif Bilge Kavun:
On the Implementation Aspects of Sponge-Based Authenticated Encryption for Pervasive Devices. 141-157 - Josep Balasch, Baris Ege, Thomas Eisenbarth

, Benoît Gérard, Zheng Gong, Tim Güneysu
, Stefan Heyse, Stéphanie Kerckhof, François Koeune, Thomas Plos, Thomas Pöppelmann, Francesco Regazzoni
, François-Xavier Standaert
, Gilles Van Assche, Ronny Van Keer, Loïc van Oldeneel tot Oldenzeel, Ingo von Maurich
:
Compact Implementation and Performance Evaluation of Hash Functions in ATtiny Devices. 158-172 - Markus Pelnar, Michael Muehlberghuber, Michael Hutter:

Putting together What Fits together - GrÆStl. 173-187
Implementations for Resource-Constrained Devices
- Yuto Nakano, Carlos Cid, Shinsaku Kiyomoto, Yutaka Miyake:

Memory Access Pattern Protection for Resource-Constrained Devices. 188-202 - Petr Susil, Serge Vaudenay:

Multipurpose Cryptographic Primitive ARMADILLO3. 203-218
Side-Channel Attacks II
- David F. Oswald

, Christof Paar:
Improving Side-Channel Analysis with Optimal Linear Transforms. 219-233 - Sébastien Tiran, Philippe Maurine:

SCA with Magnitude Squared Coherence. 234-247 - Johann Heyszl, Dominik Merli, Benedikt Heinz, Fabrizio De Santis, Georg Sigl:

Strengths and Limitations of High-Resolution Electromagnetic Field Measurements for Side-Channel Analysis. 248-262 - Timo Bartkewitz, Kerstin Lemke-Rust:

Efficient Template Attacks Based on Probabilistic Multi-class Support Vector Machines. 263-276
Invited Talk
- Eric Brier, Quentin Fortier, Roman Korkikian, Khalid W. Magld, David Naccache, Guilherme Ozari de Almeida, Adrien Pommellet

, A. H. Ragab, Jean Vuillemin:
Defensive Leakage Camouflage. 277-295

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














