IFIP TC6 Open Digital Library

10. CARDIS 2011: Leuven, Belgium

Smart Card Research and Advanced Applications - 10th IFIP WG 8.8/11.2 International Conference, CARDIS 2011, Leuven, Belgium, September 14-16, 2011, Revised Selected Papers

Emmanuel Prouff

Springer, Lecture Notes in Computer Science 7079, ISBN: 978-3-642-27256-1


Smart Cards System Security

Evaluation of the Ability to Transform SIM Applications into Hostile Applications.

Guillaume Bouffard, Jean-Louis Lanet, Jean-Baptiste Machemie, Jean-Yves Poichotte, Jean-Philippe Wary


Synchronized Attacks on Multithreaded Systems - Application to Java Card 3.0 -.

Guillaume Barbu, Hugues Thiebeauld


A Formal Security Model of a Smart Card Web Server.

Pierre Neron, Quang-Huy Nguyen


Invasive Attacks

Differential Fault Analysis of AES-128 Key Schedule Using a Single Multi-byte Fault.

Subidh Ali, Debdeep Mukhopadhyay


Combined Fault and Side-Channel Attack on Protected Implementations of AES.

Thomas Roche, Victor Lomné, Karim Khalfallah


Memory-Efficient Fault Countermeasures.

Marc Joye, Mohamed Karroumi


New Algorithms and Protocols

Redundant Modular Reduction Algorithms.

Vincent Dupaquis, Alexandre Venelli


Fresh Re-keying II: Securing Multiple Parties against Side-Channel and Fault Attacks.

Marcel Medwed, Christophe Petit, Francesco Regazzoni, Mathieu Renauld, François-Xavier Standaert


Fast Key Recovery Attack on ARMADILLO1 and Variants.

Pouyan Sepehrdad, Petr Susil, Serge Vaudenay


Implementations and Hardware Security 1

Implementation and Evaluation of an SCA-Resistant Embedded Processor.

Stefan Tillich, Mario Kirschbaum, Alexander Szekely


Evaluating 16-Bit Processors for Elliptic Curve Cryptography.

Erich Wenger, Mario Werner


A Hardware Processor Supporting Elliptic Curve Cryptography for Less than 9 kGEs.

Erich Wenger, Michael Hutter


Implementations and Hardware Security 2

Memory Encryption for Smart Cards.

Baris Ege, Elif Bilge Kavun, Tolga Yalçin


Compact FPGA Implementations of the Five SHA-3 Finalists.

Stéphanie Kerckhof, François Durvaux, Nicolas Veyrat-Charvillon, Francesco Regazzoni, Guerric Meurice de Dormale, François-Xavier Standaert


Non-invasive Attacks

An Exploration of the Kolmogorov-Smirnov Test as a Competitor to Mutual Information Analysis.

Carolyn Whitnall, Elisabeth Oswald, Luke Mather


A High-Performance Implementation of Differential Power Analysis on Graphics Cards.

Timo Bartkewitz, Kerstin Lemke-Rust


RAM: Rapid Alignment Method.

Ruben A. Muijrers, Jasper G. J. van Woudenberg, Lejla Batina


Java Card Security

Combined Software and Hardware Attacks on the Java Card Control Flow.

Guillaume Bouffard, Julien Iguchi-Cartigny, Jean-Louis Lanet


Java Card Operand Stack: Fault Attacks, Combined Attacks and Countermeasures.

Guillaume Barbu, Guillaume Duc, Philippe Hoogvorst


Formal Analysis of CWA 14890-1.

Ashar Javed