7. CARDIS 2006: Tarragona, Spain
Smart Card Research and Advanced Applications, 7th IFIP WG 8.8/11.2 International Conference, CARDIS 2006, Tarragona, Spain, April 19-21, 2006, Proceedings
Josep Domingo-Ferrer, Joachim Posegga, Daniel Schreckling
Springer, Lecture Notes in Computer Science 3928, ISBN: 3-540-33311-8
Contents
Smart Card Applications
Design, Installation and Execution of a Security Agent for Mobile Stations.
William G. Sirett, John A. MacDonald, Keith Mayes, Constantinos Markantonakis
1-15
Implementing Cryptography on TFT Technology for Secure Display Applications.
Petros Oikonomakos, Jacques J. A. Fournier, Simon W. Moore
32-47
A Smart Card-Based Mental Poker System.
Jordi Castellà-Roca, Josep Domingo-Ferrer, Francesc Sebé
48-61
A Smart Card Solution for Access Control and Trust Management for Nomadic Users.
Daniel Díaz Sánchez, Andrés Marín López, Florina Almenárez Mendoza
62-77
Smart Cards and Residential Gateways: Improving OSGi Services with Java Cards.
Juan Jesús Sánchez Sánchez, Daniel Díaz Sánchez, José Alberto Vigo Segura, Natividad Martínez Madrid, Ralf Seepold
78-90
An Optimistic NBAC-Based Fair Exchange Method for Arbitrary Items.
Masayuki Terada, Kensaku Mori, Sadayuki Hongo
105-118
Side Channel Attacks
Generic Cryptanalysis of Combined Countermeasures with Randomized BSD Representations.
Tae Hyun Kim 0003, Dong-Guk Han, Katsuyuki Okeya, Jongin Lim
119-134
Amplifying Side-Channel Attacks with Techniques from Block Cipher Cryptanalysis.
Raphael C.-W. Phan, Sung-Ming Yen
135-150
Power Analysis to ECC Using Differential Power Between Multiplication and Squaring.
Toru Akishita, Tsuyoshi Takagi
151-164
Smart Card Networking
Cryptographic Protocols
Anonymous Authentication with Optional Shared Anonymity Revocation and Linkability.
Martin Schaffer, Peter Schartner
206-221
SEA: A Scalable Encryption Algorithm for Small Embedded Applications.
François-Xavier Standaert, Gilles Piret, Neil Gershenfeld, Jean-Jacques Quisquater
222-236
Low-Cost Cryptography for Privacy in RFID Systems.
Benoît Calmels, Sébastien Canard, Marc Girault, Hervé Sibert
237-251
RFID Security
Analysis of Power Constraints for Cryptographic Algorithms in Mid-Cost RFID Tags.
Tobias Lohmann, Matthias Schneider, Christoph Ruland
278-288
Noisy Tags: A Pretty Good Key Exchange Protocol for RFID Tags.
Claude Castelluccia, Gildas Avoine
289-299
Formal Methods
A Low-Footprint Java-to-Native Compilation Scheme Using Formal Methods.
Alexandre Courbot, Mariela Pavlova, Gilles Grimaud, Jean-Jacques Vandewalle
329-344
Automatic Test Generation on a (U)SIM Smart Card.
Céline Bigot, Alain Faivre, Christophe Gaston, Julien Simon
345-358