IFIP TC6 Open Digital Library

8. CARDIS 2008: London, UK

Smart Card Research and Advanced Applications, 8th IFIP WG 8.8/11.2 International Conference, CARDIS 2008, London, UK, September 8-11, 2008. Proceedings

Gilles Grimaud, François-Xavier Standaert

Springer, Lecture Notes in Computer Science 5189, ISBN: 978-3-540-85892-8



Contents

Malicious Code on Java Card Smartcards: Attacks and Countermeasures.

Wojciech Mostowski, Erik Poll

 1-16

Static Program Analysis for Java Card Applets.

Vasilios Almaliotis, Alexandros Loizidis, Panagiotis Katsaros, Panagiotis Louridas, Diomidis Spinellis

 17-31

On Practical Information Flow Policies for Java-Enabled Multiapplication Smart Cards.

Dorina Ghindici, Isabelle Simplot-Ryl

 32-47

New Differential Fault Analysis on AES Key Schedule: Two Faults Are Enough.

Chong Hee Kim, Jean-Jacques Quisquater

 48-60

DSA Signature Scheme Immune to the Fault Cryptanalysis.

Maciej Nikodem

 61-73

A Black Hen Lays White Eggs.

Masayuki Yoshino, Katsuyuki Okeya, Camille Vuillaume

 74-88

Ultra-Lightweight Implementations for Smart Devices - Security for 1000 Gate Equivalents.

Carsten Rolfes, Axel Poschmann, Gregor Leander, Christof Paar

 89-103

Fast Hash-Based Signatures on Constrained Devices.

Sebastian Rohde, Thomas Eisenbarth, Erik Dahmen, Johannes Buchmann, Christof Paar

 104-117

Fraud Detection and Prevention in Smart Card Based Environments Using Artificial Intelligence.

Wael William Zakhari Malek, Keith Mayes, Constantinos Markantonakis

 118-132

The Trusted Execution Module: Commodity General-Purpose Trusted Computing.

Victor Costan, Luis F. G. Sarmenta, Marten van Dijk, Srinivas Devadas

 133-148

Management of Multiple Cards in NFC-Devices.

Gerald Madlmayr, Oliver Dillinger, Josef Langer, Josef Scharinger

 149-161

Coupon Recalculation for the GPS Authentication Scheme.

Georg Hofferek, Johannes Wolkerstorfer

 162-175

Provably Secure Grouping-Proofs for RFID Tags.

Mike Burmester, Breno de Medeiros, Rossana Motta

 176-190

Secure Implementation of the Stern Authentication and Signature Schemes for Low-Resource Devices.

Pierre-Louis Cayrel, Philippe Gaborit, Emmanuel Prouff

 191-205

A Practical DPA Countermeasure with BDD Architecture.

Toru Akishita, Masanobu Katagi, Yoshikazu Miyato, Asami Mizuno, Kyoji Shibutani

 206-217

SCARE of an Unknown Hardware Feistel Implementation.

Denis Réal, Vivien Dubois, Anne-Marie Guilloux, Frédéric Valette, M'hamed Drissi

 218-227

Evaluation of Java Card Performance.

Samia Bouzefrane, Julien Cordry, Hervé Meunier, Pierre Paradinas

 228-240

Application of Network Smart Cards to Citizens Identification Systems.

Joaquín Torres Márquez, Mildrey Carbonell, Jesús Téllez Isaac, José María Sierra

 241-254

SmartPro: A Smart Card Based Digital Content Protection for Professional Workflow.

Alain Durand, Marc Éluard, Sylvain Lelievre, Christophe Vincent

 255-266

A Practical Attack on the MIFARE Classic.

Gerhard de Koning Gans, Jaap-Henk Hoepman, Flavio D. Garcia

 267-282

A Chemical Memory Snapshot.

Jörn-Marc Schmidt

 283-289

Recent Advances in Electronic Cash Design.

Aline Gouget

 290-293