


default search action
14th CARDIS 2015: Bochum, Germany
- Naofumi Homma, Marcel Medwed:

Smart Card Research and Advanced Applications - 14th International Conference, CARDIS 2015, Bochum, Germany, November 4-6, 2015. Revised Selected Papers. Lecture Notes in Computer Science 9514, Springer 2016, ISBN 978-3-319-31270-5
Side-Channel Attacks
- David F. Oswald

:
Side-Channel Attacks on SHA-1-Based Product Authentication ICs. 3-14 - Eleonora Cagli, Cécile Dumas

, Emmanuel Prouff:
Enhancing Dimensionality Reduction Methods for Side-Channel Attacks. 15-33 - Guilherme Perin, Lukasz Chmielewski:

A Semi-Parametric Approach for Side-Channel Attacks on Protected RSA Implementations. 34-53
Java Cards
- Sergej Proskurin

, Michael Weiß
, Georg Sigl:
seTPM: Towards Flexible Trusted Computing on Mobile Devices Based on GlobalPlatform Secure Elements. 57-74 - Julien Lancia, Guillaume Bouffard

:
Java Card Virtual Machine Compromising from a Bytecode Verified Applet. 75-88 - Benoit Laugier, Tiana Razafindralambo:

Misuse of Frame Creation to Exploit Stack Underflow Attacks on Java Card. 89-104
Evaluation Tools
- Louis Dureuil, Marie-Laure Potet, Philippe de Choudens, Cécile Dumas

, Jessy Clédière
:
From Code Review to Fault Injection Attacks: Filling the Gap Using Fault Model Inference. 107-124 - Romain Poussier, Vincent Grosso, François-Xavier Standaert

:
Comparing Approaches to Rank Estimation for Side-Channel Security Evaluations. 125-142 - Ibrahima Diop, Mathieu Carbone, Sébastien Ordas, Yanis Linge, Pierre-Yvan Liardet, Philippe Maurine:

Collision for Estimating SCA Measurement Quality and Related Applications. 143-157
Fault Attacks
- Mario Werner, Erich Wenger, Stefan Mangard

:
Protecting the Control Flow of Embedded Processors against Fault Attacks. 161-176 - Lucien Goubet, Karine Heydemann, Emmanuelle Encrenaz, Ronald De Keulenaer:

Efficient Design and Evaluation of Countermeasures against Fault Attacks Using Formal Verification. 177-192 - Bodo Selmke, Stefan Brummer, Johann Heyszl, Georg Sigl:

Precise Laser Fault Injections into 90 nm and 45 nm SRAM-cells. 193-205
Countermeasures
- Sébastien Gambs, Carlos Eduardo Rosar Kós Lassance, Cristina Onete:

The Not-so-Distant Future: Distance-Bounding Protocols on Smartphones. 209-224 - Christoph Dobraunig

, François Koeune, Stefan Mangard, Florian Mendel
, François-Xavier Standaert
:
Towards Fresh and Hybrid Re-Keying Schemes with Beyond Birthday Security. 225-241 - Yoo-Seung Won, Philip Hodgers, Máire O'Neill, Dong-Guk Han:

On the Security of Balanced Encoding Countermeasures. 242-256
Implementations
- Thomas De Cnudde, Begül Bilgin, Oscar Reparaz, Ventzislav Nikov, Svetla Nikova

:
Higher-Order Threshold Implementation of the AES S-Box. 259-272 - Begül Bilgin, Miroslav Knezevic, Ventzislav Nikov, Svetla Nikova

:
Compact Implementations of Multi-Sbox Designs. 273-285

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














