-
3
-
-
78651429427
-
-
International Organization for Standardization: Information technology - Identification cards - Integrated circuit(s) cards with contacts - Part 3: Electronic signals and transmission protocols. (ISO)
-
International Organization for Standardization: Information technology - Identification cards - Integrated circuit(s) cards with contacts - Part 3: Electronic signals and transmission protocols. (ISO)
-
-
-
-
4
-
-
78651414975
-
-
International Organization for Standardization: Information technology - Identification cards - Integrated circuit(s) cards with contacts - Part 4: Interindustry comands for interchange. (ISO)
-
International Organization for Standardization: Information technology - Identification cards - Integrated circuit(s) cards with contacts - Part 4: Interindustry comands for interchange. (ISO)
-
-
-
-
5
-
-
0013497706
-
-
Master's thesis, University of Waterloo, Ontario, Canada (2001) Master of Mathematics in Combinatorics and Optimization.
-
Muir, J.A.: Techniques of Side Channel Cryptanalysis. Master's thesis, University of Waterloo, Ontario, Canada (2001) Master of Mathematics in Combinatorics and Optimization.
-
Techniques of Side Channel Cryptanalysis
-
-
Muir, J.A.1
-
6
-
-
84943632039
-
Timing attacks on implementations of diffie-hellman, rsa, dss, and other systems
-
Springer-Verlag
-
Kocher, P.: Timing attacks on implementations of diffie-hellman, rsa, dss, and other systems. In: Proceedings of the 16th Annual International Cryptology Conference on Advances in Cryptology, Springer-Verlag (1996) 104-113
-
(1996)
Proceedings of the 16th Annual International Cryptology Conference on Advances in Cryptology
, pp. 104-113
-
-
Kocher, P.1
-
7
-
-
84939573910
-
Differential power analysis
-
Springer-Verlag
-
Kocher, P., Jaffe, J., Jun, B.: Differential Power Analysis. In: Proceedings of the 19th Annual International Cryptology Conference on Advances in Cryptology, Springer-Verlag (1999) 388-397
-
(1999)
Proceedings of the 19th Annual International Cryptology Conference on Advances in Cryptology
, pp. 388-397
-
-
Kocher, P.1
Jaffe, J.2
Jun, B.3
-
8
-
-
84944319704
-
Statistics and secret leakage
-
Volume 1962 of Lecture Notes in Computer Science., Springer-Verlag
-
Coron, J.S., Kocher, P., Naccache, D.: Statistics and Secret Leakage. In: Proceedings of Financial Cryptography (FC2000). Volume 1962 of Lecture Notes in Computer Science., Springer-Verlag (2001) 157-173
-
(2001)
Proceedings of Financial Cryptography (FC2000)
, pp. 157-173
-
-
Coron, J.S.1
Kocher, P.2
Naccache, D.3
-
9
-
-
78650238574
-
Electromagnetic analysis (EMA): Measures and countermeasures for smart cards
-
Springer-Verlag
-
Quisquater, J.J., Samyde, D.: ElectroMagnetic Analysis (EMA): Measures and Countermeasures for Smart Cards. In: Proceedings of E-smart 2001. Volume 2140 of Lecture Notes in Computer Science., Springer-Verlag (2001) 200-210
-
(2001)
Proceedings of E-smart 2001
, vol.2140
, pp. 200-210
-
-
Quisquater, J.J.1
Samyde, D.2
-
10
-
-
35248862449
-
Electromagnetic analysis: Concrete results
-
Springer-Verlag
-
Gandol, K., Mourtel, C., Olivier, F.: ElectroMagnetic Analysis: Concrete Results. In: Proceedings of CHES'2001. Volume 2162 of Lecture Notes in Computer Science., Springer-Verlag (2001) 251-261
-
(2001)
Proceedings of CHES'2001. Volume 2162 of Lecture Notes in Computer Science
, pp. 251-261
-
-
Gandol, K.1
Mourtel, C.2
Olivier, F.3
-
11
-
-
85093467807
-
Design principles for tamper-resistant smartcard processors
-
Chicago, Illinois, USA
-
Kömmerling, O., Kuhn, M.G.: Design Principles for Tamper-Resistant Smartcard Processors. In: Proceedings of the USENIX Workshop on Smartcard Technology (Smartcard '99), Chicago, Illinois, USA (1999) 9-20
-
(1999)
Proceedings of the USENIX Workshop on Smartcard Technology (Smartcard '99)
, pp. 9-20
-
-
Kömmerling, O.1
Kuhn, M.G.2
-
12
-
-
24144482876
-
The sorcerer's apprentice guide to fault attacks
-
Italy
-
Bar-El, H., Choukri, H., Naccache, D., Tunstall, M., Whelan, C.: The Sorcerer's Apprentice Guide to Fault Attacks. In: Proceedings of Workshop on Fault Detection and Tolerance in Cryptography, Italy (2004)
-
(2004)
Proceedings of Workshop on Fault Detection and Tolerance in Cryptography
-
-
Bar-El, H.1
Choukri, H.2
Naccache, D.3
Tunstall, M.4
Whelan, C.5
-
13
-
-
84902496121
-
A survey on fault attacks
-
Toulouse, France, Kluwer academic publisher
-
Giraud, C., Thiebeauld, H.: A survey on fault attacks. In: Proceedings of CARDIS'04, Smart Card Research and Advanced Applications VI, Toulouse, France, Kluwer academic publisher (2004) 159-176
-
(2004)
Proceedings of CARDIS'04, Smart Card Research and Advanced Applications VI
, pp. 159-176
-
-
Giraud, C.1
Thiebeauld, H.2
-
15
-
-
78651435083
-
-
GlobalPlatform: GlobalPlatform.
-
GlobalPlatform: GlobalPlatform. (http://www.globalplatform.org/)
-
-
-
-
16
-
-
0348146566
-
Lightweight bytecode verification
-
Vancouver, Canada
-
Rose, E., Rose, K.: Lightweight bytecode verification. In: In Workshop on Fundamental Underpinnings of Java, OOPSLA '98 Workshop., Vancouver, Canada (1998)
-
(1998)
Workshop on Fundamental Underpinnings of Java, OOPSLA '98 Workshop
-
-
Rose, E.1
Rose, K.2
-
17
-
-
0036928460
-
Formal Development of an embedded verifier for Java Card Byte Code
-
Washington, D.C., USA
-
Casset, L., Burdy, L., Requet, A.: Formal Development of an embedded verifier for Java Card Byte Code. In: Proceedings of the IEEE International Conference on Dependable Systems & Networks, Washington, D.C., USA (2002)
-
(2002)
Proceedings of the IEEE International Conference on Dependable Systems & Networks
-
-
Casset, L.1
Burdy, L.2
Requet, A.3
-
19
-
-
0037051773
-
Bytecode verification on Java smart cards
-
Leroy, X.: Bytecode verification on Java smart cards. Software-Practice & Experience 32 (2002) 319-340
-
(2002)
Software-Practice & Experience
, vol.32
, pp. 319-340
-
-
Leroy, X.1
-
21
-
-
84894615629
-
A formal correspondence between offensive and defensive javacard virtual machines
-
Venice, Italy, Springer-Verlag
-
Barthe, G., Dufay, G., Jakubiec, L., Melo de Sousa, S.: A Formal Correspondence between Offensive and Defensive JavaCard Virtual Machines. In: Proceedings of VMCAF02. Volume 2294 of Lecture Notes in Computer Science., Venice, Italy, Springer-Verlag (2002) 32-45
-
(2002)
Proceedings of VMCAF02. Volume 2294 of Lecture Notes in Computer Science
, pp. 32-45
-
-
Barthe, G.1
Dufay, G.2
Jakubiec, L.3
De Melo Sousa, S.4
-
23
-
-
78649639131
-
Secure object sharing in java card
-
Chicago, Illinois, USA
-
Montgomery, M., Krishna, K.: Secure Object Sharing in Java Card. In: Proceedings of the USENIX Workshop on Smartcard Technology (Smartcard '99), Chicago, Illinois, USA (1999)
-
(1999)
Proceedings of the USENIX Workshop on Smartcard Technology (Smartcard '99)
-
-
Montgomery, M.1
Krishna, K.2
-
25
-
-
78651417212
-
FORMAVIE: Formal modelling and verification of java card 2.1.1 security architecture
-
Nice, France
-
Betarte, G., Giménez, E., Chetali, B., Loiseaux, C.: FORMAVIE: Formal Modelling and Verification of Java Card 2.1.1 Security Architecture. In: Proceedings of E-Smart 2002, Nice, France (2002) 215-229
-
(2002)
Proceedings of E-Smart 2002
, pp. 215-229
-
-
Betarte, G.1
Giménez, E.2
Chetali, B.3
Loiseaux, C.4
-
26
-
-
78650723729
-
JCAT: An environment for attack and test on Java Card
-
Orlando, FL, USA
-
Chaumette, S., Hatchondo, I., Sauveron, D.: JCAT: An environment for attack and test on Java Card. In: Proceedings of CCCT'03 and 9th ISAS'03. Volume 1., Orlando, FL, USA (2003) 270-275
-
(2003)
Proceedings of CCCT'03 and 9th ISAS'03
, vol.1
, pp. 270-275
-
-
Chaumette, S.1
Hatchondo, I.2
Sauveron, D.3
-
27
-
-
78651456132
-
-
The JCatools website.
-
Hatchondo, I., Sauveron, D.: The JCatools website. (http://sourceforge. net/projects/jcatools/)
-
-
-
Hatchondo, I.1
Sauveron, D.2
-
28
-
-
78651450671
-
-
CCIMB: International Common Criteria home page.
-
CCIMB: International Common Criteria home page. (http://www. commoncriteriaportal.org/)
-
-
-
|