-
2
-
-
38649094528
-
Java card key generation for identity based systems
-
Technical Report NUIM-CS-TR-2005-01, Department of Computer Science, National University of Ireland, Maynooth February
-
Dowling, T., Duffy, A.: Java card key generation for identity based systems. Technical Report NUIM-CS-TR-2005-01, Department of Computer Science, National University of Ireland, Maynooth (February 2005), http://www.cs.nuim.ie/ research/reports/2005
-
(2005)
-
-
Dowling, T.1
Duffy, A.2
-
3
-
-
70350587585
-
Decentralized authorization with ECDSA on a Java smart card
-
Norwell, MA, USA, pp, Kluwer Academic Publishers, Dordrecht
-
Elo, T., Nikander, P.: Decentralized authorization with ECDSA on a Java smart card. In: Proceedings of the fourth working conference on smart card research and advanced applications on Smart card research and advanced applications, Norwell, MA, USA, pp. 345-364. Kluwer Academic Publishers, Dordrecht (2001)
-
(2001)
Proceedings of the fourth working conference on smart card research and advanced applications on Smart card research and advanced applications
, pp. 345-364
-
-
Elo, T.1
Nikander, P.2
-
4
-
-
57049128814
-
Dismantling MIFARE classic
-
Jajodia, S, Lopez, J, eds, ESORICS 2008, Springer, Heidelberg
-
Garcia, F., de Koning Gans, G., Muijrers, R., van Rossum, P., Verdult, R., Schreur, R.W., Jacobs, B.: Dismantling MIFARE classic. In: Jajodia, S., Lopez, J. (eds.) ESORICS 2008. LNCS, vol. 5283, pp. 97-114. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.5283
, pp. 97-114
-
-
Garcia, F.1
de Koning Gans, G.2
Muijrers, R.3
van Rossum, P.4
Verdult, R.5
Schreur, R.W.6
Jacobs, B.7
-
5
-
-
70350601194
-
Wirelessly pickpocketing a Mifare Classic card
-
IEEE, Los Alamitos
-
Garcia, F.D., van Rossum, P., Verdult, R., Schreur, R.W.: Wirelessly pickpocketing a Mifare Classic card. In: IEEE Symposium on Security and Privacy (S&P 2009), pp. 3-15. IEEE, Los Alamitos (2009)
-
(2009)
IEEE Symposium on Security and Privacy (S&P
, pp. 3-15
-
-
Garcia, F.D.1
van Rossum, P.2
Verdult, R.3
Schreur, R.W.4
-
6
-
-
70350608996
-
-
Lenstra, A.: Key lengths. In: Bidgoli, H. (ed.) Handbook of Information Security. Information Warfare, Social, Legal, and International Issues and Security Foundations, II, pp. 617-635. Wiley, Chichester (2006)
-
Lenstra, A.: Key lengths. In: Bidgoli, H. (ed.) Handbook of Information Security. Information Warfare, Social, Legal, and International Issues and Security Foundations, vol. II, pp. 617-635. Wiley, Chichester (2006)
-
-
-
-
7
-
-
84944878354
-
-
CRC Press, Boca Raton
-
Menezes, A.J., van Oorschot, P.C., Vanstone, S.A.: Handbook of Applied Cryptography. CRC Press, Boca Raton (2001)
-
(2001)
Handbook of Applied Cryptography
-
-
Menezes, A.J.1
van Oorschot, P.C.2
Vanstone, S.A.3
-
8
-
-
70350577486
-
-
SUN Microsystems. Java Card v2.2.1 API (2003), http://java.sun.com/ javacard/specs.html
-
(2003)
Java Card v2.2.1 API
-
-
-
9
-
-
70350592722
-
-
SUN Microsystems. Java Card v2.2.2 API (2005), http://java.sun.com/ javacard/specs.html
-
(2005)
Java Card v2.2.2 API
-
-
-
10
-
-
77953771886
-
-
Version 3.0
-
SUN Microsystems. Java Card Specifications Version 3.0 (2008), http://java.sun.com/javacard/downloads/
-
(2008)
Java Card Specifications
-
-
-
11
-
-
84893081352
-
Reverse-engineering a cryptographic RFID tag
-
San Jose, CA, USA, pp
-
Nohl, K., Evans, D., Starbug, S., Plötz, H.: Reverse-engineering a cryptographic RFID tag. In: 17th USENIX Security Symposium, San Jose, CA, USA, pp. 185-194 (2004)
-
(2004)
17th USENIX Security Symposium
, pp. 185-194
-
-
Nohl, K.1
Evans, D.2
Starbug, S.3
Plötz, H.4
-
12
-
-
70350598283
-
-
Smart, N.P.: Elliptic curve based protocols. In: Blake, I.F., Seroussi, G., Smart, N.P. (eds.) Advances in Elliptic Curve Cryptography. LMS, 317, pp. 3-19. Cambridge Univ. Press, Cambridge (2005)
-
Smart, N.P.: Elliptic curve based protocols. In: Blake, I.F., Seroussi, G., Smart, N.P. (eds.) Advances in Elliptic Curve Cryptography. LMS, vol. 317, pp. 3-19. Cambridge Univ. Press, Cambridge (2005)
-
-
-
-
13
-
-
84946849368
-
Self-blindable credential certificates from the weil pairing
-
Boyd, C, ed, ASIACRYPT 2001, Springer, Heidelberg
-
Verheul, E.R.: Self-blindable credential certificates from the weil pairing. In: Boyd, C. (ed.) ASIACRYPT 2001. LNCS, vol. 2248, pp. 533-550. Springer, Heidelberg (2001)
-
(2001)
LNCS
, vol.2248
, pp. 533-550
-
-
Verheul, E.R.1
|