Amazon cover image
Image from Amazon.com

Smart Card Research and Advanced Applications [electronic resource] : 9th IFIP WG 8.8/11.2 International Conference, CARDIS 2010, Passau, Germany, April 14-16, 2010, Proceedings /

Contributor(s): Material type: TextTextSeries: Security and Cryptology ; 6035Publisher: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2010Edition: 1st ed. 2010Description: X, 239 p. 78 illus. online resourceContent type:
  • text
Media type:
  • computer
Carrier type:
  • online resource
ISBN:
  • 9783642125102
Subject(s): Additional physical formats: Printed edition:: No title; Printed edition:: No titleDDC classification:
  • 004.6 23
LOC classification:
  • TK5105.5-5105.9
Online resources:
Contents:
Mathematical Algorithms -- The Polynomial Composition Problem in (?/n?)[X] -- Enhance Multi-bit Spectral Analysis on Hiding in Temporal Dimension -- Secure Delegation of Elliptic-Curve Pairing -- Side Channel Analysis -- Side-Channel Leakage across Borders -- Designing a Side Channel Resistant Random Number Generator -- Simple Power Analysis on Exponentiation Revisited -- Atomicity Improvement for Elliptic Curve Scalar Multiplication -- Systems -- Key-Study to Execute Code Using Demand Paging and NAND Flash at Smart Card Scale -- Firewall Mechanism in a User Centric Smart Card Ownership Model -- Logical Attacks -- Combined Attacks and Countermeasures -- Attacks on Java Card 3.0 Combining Fault and Logical Attacks -- Fault Analysis -- Improved Fault Analysis of Signature Schemes -- When Clocks Fail: On Critical Paths and Clock Faults -- Privacy -- Modeling Privacy for Off-Line RFID Systems -- Developing Efficient Blinded Attribute Certificates on Smart Cards via Pairings -- On the Design and Implementation of an Efficient DAA Scheme.
In: Springer Nature eBook
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
No physical items for this record

Mathematical Algorithms -- The Polynomial Composition Problem in (?/n?)[X] -- Enhance Multi-bit Spectral Analysis on Hiding in Temporal Dimension -- Secure Delegation of Elliptic-Curve Pairing -- Side Channel Analysis -- Side-Channel Leakage across Borders -- Designing a Side Channel Resistant Random Number Generator -- Simple Power Analysis on Exponentiation Revisited -- Atomicity Improvement for Elliptic Curve Scalar Multiplication -- Systems -- Key-Study to Execute Code Using Demand Paging and NAND Flash at Smart Card Scale -- Firewall Mechanism in a User Centric Smart Card Ownership Model -- Logical Attacks -- Combined Attacks and Countermeasures -- Attacks on Java Card 3.0 Combining Fault and Logical Attacks -- Fault Analysis -- Improved Fault Analysis of Signature Schemes -- When Clocks Fail: On Critical Paths and Clock Faults -- Privacy -- Modeling Privacy for Off-Line RFID Systems -- Developing Efficient Blinded Attribute Certificates on Smart Cards via Pairings -- On the Design and Implementation of an Efficient DAA Scheme.

There are no comments on this title.

to post a comment.
© 2024 IIIT-Delhi, library@iiitd.ac.in