


default search action
13th CARDIS 2014: Paris, France
- Marc Joye, Amir Moradi

:
Smart Card Research and Advanced Applications - 13th International Conference, CARDIS 2014, Paris, France, November 5-7, 2014. Revised Selected Papers. Lecture Notes in Computer Science 8968, Springer 2015, ISBN 978-3-319-16762-6
Java Cards
- Jean-Louis Lanet, Guillaume Bouffard

, Rokia Lamrani Alaoui, Ranim Chakra, Afef Mestiri, Mohammed Monsif, Abdellatif Fandi:
Memory Forensics of a Java Card Dump. 3-17 - Guillaume Bouffard

, Michael Lackner, Jean-Louis Lanet, Johannes Loinig:
Heap ... Hop! Heap Is Also Vulnerable. 18-31
Software Countermeasures
- Victor Servant, Nicolas Debande, Houssem Maghrebi, Julien Bringer:

Study of a Novel Software Constant Weight Implementation. 35-48 - Cong Chen, Thomas Eisenbarth

, Aria Shahverdi, Xin Ye:
Balanced Encoding to Mitigate Power Analysis: A Case Study. 49-63 - Josep Balasch, Benedikt Gierlichs, Vincent Grosso, Oscar Reparaz, François-Xavier Standaert

:
On the Cost of Lazy Engineering for Masked Software Implementations. 64-81
Side-Channel Analysis
- Marios O. Choudary

, Markus G. Kuhn
:
Efficient Stochastic Methods: Profiled Attacks Beyond 8 Bits. 85-103 - Tanja Lange, Christine van Vredendaal, Marnix Wakker:

Kangaroos in Side-Channel Attacks. 104-121 - Vincent Grosso, Romain Poussier, François-Xavier Standaert

, Lubos Gaspar:
Combining Leakage-Resilient PRFs and Shuffling - Towards Bounded Security for Small Embedded Devices. 122-136
Embedded Implementations
- Jean-Claude Bajard

, Nabil Merkiche:
Double Level Montgomery Cox-Rower Architecture, New Bounds. 139-153 - Kimmo Järvinen, Ingrid Verbauwhede

:
How to Use Koblitz Curves on Small Devices? 154-170
Public-Key Cryptography
- Ryad Benadjila, Thomas Calderon, Marion Daubignard:

Caml Crush: A PKCS#11 Filtering Proxy. 173-192 - Aurore Guillevic

, Damien Vergnaud
:
Algorithms for Outsourcing Pairing Computation. 193-211
Leakage and Fault Attacks
- Xin Ye, Thomas Eisenbarth

, William Martin:
Bounded, yet Sufficient? How to Determine Whether Limited Side Channel Information Enables Key Recovery. 215-232 - Christoph Dobraunig

, Maria Eichlseder
, Stefan Mangard
, Florian Mendel
:
On the Security of Fresh Re-keying to Counteract Side-Channel and Fault Attacks. 233-244 - Sébastien Ordas, Ludovic Guillaume-Sage, Karim Tobich, Jean-Max Dutertre

, Philippe Maurine:
Evidence of a Larger EM-Induced Fault Model. 245-259

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














