10. CARDIS 2011: Leuven, Belgium
Smart Card Research and Advanced Applications - 10th IFIP WG 8.8/11.2 International Conference, CARDIS 2011, Leuven, Belgium, September 14-16, 2011, Revised Selected Papers
Emmanuel Prouff
Springer, Lecture Notes in Computer Science 7079, ISBN: 978-3-642-27256-1
Contents
Smart Cards System Security
Evaluation of the Ability to Transform SIM Applications into Hostile Applications.
Guillaume Bouffard, Jean-Louis Lanet, Jean-Baptiste Machemie, Jean-Yves Poichotte, Jean-Philippe Wary
1-17
Synchronized Attacks on Multithreaded Systems - Application to Java Card 3.0 -.
Guillaume Barbu, Hugues Thiebeauld
18-33
Invasive Attacks
Differential Fault Analysis of AES-128 Key Schedule Using a Single Multi-byte Fault.
Subidh Ali, Debdeep Mukhopadhyay
50-64
Combined Fault and Side-Channel Attack on Protected Implementations of AES.
Thomas Roche, Victor Lomné, Karim Khalfallah
65-83
New Algorithms and Protocols
Fresh Re-keying II: Securing Multiple Parties against Side-Channel and Fault Attacks.
Marcel Medwed, Christophe Petit, Francesco Regazzoni, Mathieu Renauld, François-Xavier Standaert
115-132
Fast Key Recovery Attack on ARMADILLO1 and Variants.
Pouyan Sepehrdad, Petr Susil, Serge Vaudenay
133-150
Implementations and Hardware Security 1
Implementation and Evaluation of an SCA-Resistant Embedded Processor.
Stefan Tillich, Mario Kirschbaum, Alexander Szekely
151-165
A Hardware Processor Supporting Elliptic Curve Cryptography for Less than 9 kGEs.
Erich Wenger, Michael Hutter
182-198
Implementations and Hardware Security 2
Compact FPGA Implementations of the Five SHA-3 Finalists.
Stéphanie Kerckhof, François Durvaux, Nicolas Veyrat-Charvillon, Francesco Regazzoni, Guerric Meurice de Dormale, François-Xavier Standaert
217-233
Non-invasive Attacks
An Exploration of the Kolmogorov-Smirnov Test as a Competitor to Mutual Information Analysis.
Carolyn Whitnall, Elisabeth Oswald, Luke Mather
234-251
A High-Performance Implementation of Differential Power Analysis on Graphics Cards.
Timo Bartkewitz, Kerstin Lemke-Rust
252-265
Java Card Security
Combined Software and Hardware Attacks on the Java Card Control Flow.
Guillaume Bouffard, Julien Iguchi-Cartigny, Jean-Louis Lanet
283-296
Java Card Operand Stack: Fault Attacks, Combined Attacks and Countermeasures.
Guillaume Barbu, Guillaume Duc, Philippe Hoogvorst
297-313