Search - IFIP - Lecture Notes in Computer Science Access content directly

Filter your results

3 results
Deposit type : Fulltext
labStructName_s : XLIM
labStructName_s : Laboratoire d'informatique de l'école normale supérieure
Image document

Combined Software and Hardware Attacks on the Java Card Control Flow

Guillaume Bouffard , Julien Iguchi-Cartigny , Jean-Louis Lanet
10th Smart Card Research and Advanced Applications (CARDIS), Sep 2011, Leuven, Belgium. pp.283-296, ⟨10.1007/978-3-642-27257-8_18⟩
Conference papers hal-00684616v1
Image document

Can code polymorphism limit information leakage?

Antoine Amarilli , Sascha Müller , David Naccache , Daniel Page , Pablo Rauzy , et al.
5th Workshop on Information Security Theory and Practices (WISTP), Jun 2011, Heraklion, Crete, Greece. pp.1-21, ⟨10.1007/978-3-642-21040-2_1⟩
Conference papers hal-01110259v1
Image document

Evaluation of the Ability to Transform SIM Applications into Hostile Applications

Guillaume Bouffard , Jean-Louis Lanet , Jean-Baptiste Machemie , Jean-Yves Poichotte , Jean-Philippe Wary
10th Smart Card Research and Advanced Applications (CARDIS), Sep 2011, Leuven, Belgium. pp.1-17, ⟨10.1007/978-3-642-27257-8_1⟩
Conference papers hal-00684113v1