default search action
13th CARDIS 2014: Paris, France
- Marc Joye, Amir Moradi:
Smart Card Research and Advanced Applications - 13th International Conference, CARDIS 2014, Paris, France, November 5-7, 2014. Revised Selected Papers. Lecture Notes in Computer Science 8968, Springer 2015, ISBN 978-3-319-16762-6
Java Cards
- Jean-Louis Lanet, Guillaume Bouffard, Rokia Lamrani Alaoui, Ranim Chakra, Afef Mestiri, Mohammed Monsif, Abdellatif Fandi:
Memory Forensics of a Java Card Dump. 3-17 - Guillaume Bouffard, Michael Lackner, Jean-Louis Lanet, Johannes Loinig:
Heap ... Hop! Heap Is Also Vulnerable. 18-31
Software Countermeasures
- Victor Servant, Nicolas Debande, Houssem Maghrebi, Julien Bringer:
Study of a Novel Software Constant Weight Implementation. 35-48 - Cong Chen, Thomas Eisenbarth, Aria Shahverdi, Xin Ye:
Balanced Encoding to Mitigate Power Analysis: A Case Study. 49-63 - Josep Balasch, Benedikt Gierlichs, Vincent Grosso, Oscar Reparaz, François-Xavier Standaert:
On the Cost of Lazy Engineering for Masked Software Implementations. 64-81
Side-Channel Analysis
- Marios O. Choudary, Markus G. Kuhn:
Efficient Stochastic Methods: Profiled Attacks Beyond 8 Bits. 85-103 - Tanja Lange, Christine van Vredendaal, Marnix Wakker:
Kangaroos in Side-Channel Attacks. 104-121 - Vincent Grosso, Romain Poussier, François-Xavier Standaert, Lubos Gaspar:
Combining Leakage-Resilient PRFs and Shuffling - Towards Bounded Security for Small Embedded Devices. 122-136
Embedded Implementations
- Jean-Claude Bajard, Nabil Merkiche:
Double Level Montgomery Cox-Rower Architecture, New Bounds. 139-153 - Kimmo Järvinen, Ingrid Verbauwhede:
How to Use Koblitz Curves on Small Devices? 154-170
Public-Key Cryptography
- Ryad Benadjila, Thomas Calderon, Marion Daubignard:
Caml Crush: A PKCS#11 Filtering Proxy. 173-192 - Aurore Guillevic, Damien Vergnaud:
Algorithms for Outsourcing Pairing Computation. 193-211
Leakage and Fault Attacks
- Xin Ye, Thomas Eisenbarth, William Martin:
Bounded, yet Sufficient? How to Determine Whether Limited Side Channel Information Enables Key Recovery. 215-232 - Christoph Dobraunig, Maria Eichlseder, Stefan Mangard, Florian Mendel:
On the Security of Fresh Re-keying to Counteract Side-Channel and Fault Attacks. 233-244 - Sébastien Ordas, Ludovic Guillaume-Sage, Karim Tobich, Jean-Max Dutertre, Philippe Maurine:
Evidence of a Larger EM-Induced Fault Model. 245-259
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.