Table of Contents
|
Smart Card Research and Advanced Applications Emmanuel Prouff |
Front Matter |
Smart Cards System Security
|
Evaluation of the Ability to Transform SIM Applications into Hostile Applications Guillaume Bouffard, Jean-Louis Lanet, Jean-Baptiste Machemie, Jean-Yves Poichotte, Jean-Philippe Wary |
1-17 |
Synchronized Attacks on Multithreaded Systems - Application to Java Card 3.0 Guillaume Barbu, Hugues Thiebeauld |
18-33 |
A Formal Security Model of a Smart Card Web Server Pierre Neron, Quang-Huy Nguyen |
34-49 |
Invasive Attacks
|
Differential Fault Analysis of AES-128 Key Schedule Using a Single Multi-byte Fault Sk Ali, Debdeep Mukhopadhyay |
50-64 |
Combined Fault and Side-Channel Attack on Protected Implementations of AES Thomas Roche, Victor Lomné, Karim Khalfallah |
65-83 |
Memory-Efficient Fault Countermeasures Marc Joye, Mohamed Karroumi |
84-101 |
New Algorithms and Protocols
|
Redundant Modular Reduction Algorithms Vincent Dupaquis, Alexandre Venelli |
102-114 |
Fresh Re-keying II: Securing Multiple Parties against Side-Channel and Fault Attacks Marcel Medwed, Christoph Petit, Francesco Regazzoni, Mathieu Renauld, François-Xavier Standaert |
115-132 |
Fast Key Recovery Attack on ARMADILLO1 and Variants Pouyan Sepehrdad, Petr Sušil, Serge Vaudenay |
133-150 |
Implementations and Hardware Security 1
|
Implementation and Evaluation of an SCA-Resistant Embedded Processor Stefan Tillich, Mario Kirschbaum, Alexander Szekely |
151-165 |
Evaluating 16-Bit Processors for Elliptic Curve Cryptography Erich Wenger, Mario Werner |
166-181 |
A Hardware Processor Supporting Elliptic Curve Cryptography for Less than 9 kGEs Erich Wenger, Michael Hutter |
182-198 |
Implementations and Hardware Security 2
|
Memory Encryption for Smart Cards Barış Ege, Elif Kavun, Tolga Yalçın |
199-216 |
Compact FPGA Implementations of the Five SHA-3 Finalists Stéphanie Kerckhof, François Durvaux, Nicolas Veyrat-Charvillon, Francesco Regazzoni, Guerric Dormale, François-Xavier Standaert |
217-233 |
Non-invasive Attacks
|
An Exploration of the Kolmogorov-Smirnov Test as a Competitor to Mutual Information Analysis Carolyn Whitnall, Elisabeth Oswald, Luke Mather |
234-251 |
A High-Performance Implementation of Differential Power Analysis on Graphics Cards Timo Bartkewitz, Kerstin Lemke-Rust |
252-265 |
RAM: Rapid Alignment Method Ruben Muijrers, Jasper Woudenberg, Lejla Batina |
266-282 |
Java Card Security
|
Combined Software and Hardware Attacks on the Java Card Control Flow Guillaume Bouffard, Julien Iguchi-Cartigny, Jean-Louis Lanet |
283-296 |
Java Card Operand Stack : Fault Attacks, Combined Attacks and Countermeasures Guillaume Barbu, Guillaume Duc, Philippe Hoogvorst |
297-313 |
Formal Analysis of CWA 14890-1 Ashar Javed |
314-335 |