IFIP TC6 Open Digital Library

10. CARDIS 2011: Leuven, Belgium

Smart Card Research and Advanced Applications - 10th IFIP WG 8.8/11.2 International Conference, CARDIS 2011, Leuven, Belgium, September 14-16, 2011, Revised Selected Papers

Emmanuel Prouff

Springer, Lecture Notes in Computer Science 7079, ISBN: 978-3-642-27256-1



Contents

Smart Cards System Security

Evaluation of the Ability to Transform SIM Applications into Hostile Applications.

Guillaume Bouffard, Jean-Louis Lanet, Jean-Baptiste Machemie, Jean-Yves Poichotte, Jean-Philippe Wary

 1-17

Synchronized Attacks on Multithreaded Systems - Application to Java Card 3.0 -.

Guillaume Barbu, Hugues Thiebeauld

 18-33

A Formal Security Model of a Smart Card Web Server.

Pierre Neron, Quang-Huy Nguyen

 34-49

Invasive Attacks

Differential Fault Analysis of AES-128 Key Schedule Using a Single Multi-byte Fault.

Subidh Ali, Debdeep Mukhopadhyay

 50-64

Combined Fault and Side-Channel Attack on Protected Implementations of AES.

Thomas Roche, Victor Lomné, Karim Khalfallah

 65-83

Memory-Efficient Fault Countermeasures.

Marc Joye, Mohamed Karroumi

 84-101

New Algorithms and Protocols

Redundant Modular Reduction Algorithms.

Vincent Dupaquis, Alexandre Venelli

 102-114

Fresh Re-keying II: Securing Multiple Parties against Side-Channel and Fault Attacks.

Marcel Medwed, Christophe Petit, Francesco Regazzoni, Mathieu Renauld, François-Xavier Standaert

 115-132

Fast Key Recovery Attack on ARMADILLO1 and Variants.

Pouyan Sepehrdad, Petr Susil, Serge Vaudenay

 133-150

Implementations and Hardware Security 1

Implementation and Evaluation of an SCA-Resistant Embedded Processor.

Stefan Tillich, Mario Kirschbaum, Alexander Szekely

 151-165

Evaluating 16-Bit Processors for Elliptic Curve Cryptography.

Erich Wenger, Mario Werner

 166-181

A Hardware Processor Supporting Elliptic Curve Cryptography for Less than 9 kGEs.

Erich Wenger, Michael Hutter

 182-198

Implementations and Hardware Security 2

Memory Encryption for Smart Cards.

Baris Ege, Elif Bilge Kavun, Tolga Yalçin

 199-216

Compact FPGA Implementations of the Five SHA-3 Finalists.

Stéphanie Kerckhof, François Durvaux, Nicolas Veyrat-Charvillon, Francesco Regazzoni, Guerric Meurice de Dormale, François-Xavier Standaert

 217-233

Non-invasive Attacks

An Exploration of the Kolmogorov-Smirnov Test as a Competitor to Mutual Information Analysis.

Carolyn Whitnall, Elisabeth Oswald, Luke Mather

 234-251

A High-Performance Implementation of Differential Power Analysis on Graphics Cards.

Timo Bartkewitz, Kerstin Lemke-Rust

 252-265

RAM: Rapid Alignment Method.

Ruben A. Muijrers, Jasper G. J. van Woudenberg, Lejla Batina

 266-282

Java Card Security

Combined Software and Hardware Attacks on the Java Card Control Flow.

Guillaume Bouffard, Julien Iguchi-Cartigny, Jean-Louis Lanet

 283-296

Java Card Operand Stack: Fault Attacks, Combined Attacks and Countermeasures.

Guillaume Barbu, Guillaume Duc, Philippe Hoogvorst

 297-313

Formal Analysis of CWA 14890-1.

Ashar Javed

 314-335