Sciweavers

CARDIS
2008
Springer
153views Hardware» more  CARDIS 2008»
14 years 1 months ago
Ultra-Lightweight Implementations for Smart Devices - Security for 1000 Gate Equivalents
In recent years more and more security sensitive applications use passive smart devices such as contactless smart cards and RFID tags. Cost constraints imply a small hardware footp...
Carsten Rolfes, Axel Poschmann, Gregor Leander, Ch...
CARDIS
2008
Springer
147views Hardware» more  CARDIS 2008»
14 years 1 months ago
A Practical Attack on the MIFARE Classic
The mifare Classic is the most widely used contactless smart card in the market. Its design and implementation details are kept secret by its manufacturer. This paper studies the a...
Gerhard de Koning Gans, Jaap-Henk Hoepman, Flavio ...
CARDIS
2008
Springer
119views Hardware» more  CARDIS 2008»
14 years 1 months ago
Static Program Analysis for Java Card Applets
The Java Card API provides a framework of classes and interfaces that hides the details of the underlying smart card interface, thus relieving developers from going through the swa...
Vasilios Almaliotis, Alexandros Loizidis, Panagiot...
CARDIS
2008
Springer
117views Hardware» more  CARDIS 2008»
14 years 1 months ago
A Black Hen Lays White Eggs
Masayuki Yoshino, Katsuyuki Okeya, Camille Vuillau...
CARDIS
2008
Springer
105views Hardware» more  CARDIS 2008»
14 years 1 months ago
Fast Hash-Based Signatures on Constrained Devices
Digital signatures are one of the most important applications of microprocessor smart cards. The most widely used algorithms for digital signatures, RSA and ECDSA, depend on finite...
Sebastian Rohde, Thomas Eisenbarth, Erik Dahmen, J...
CARDIS
2008
Springer
113views Hardware» more  CARDIS 2008»
14 years 1 months ago
The Trusted Execution Module: Commodity General-Purpose Trusted Computing
This paper introduces the Trusted Execution Module (TEM); a high-level specification for a commodity chip that can execute usersupplied procedures in a trusted environment. The TEM...
Victor Costan, Luis F. G. Sarmenta, Marten van Dij...
CARDIS
2008
Springer
165views Hardware» more  CARDIS 2008»
14 years 1 months ago
Malicious Code on Java Card Smartcards: Attacks and Countermeasures
When it comes to security, an interesting difference between Java Card and regular Java is the absence of an on-card bytecode verifier on most Java Cards. In principle this opens u...
Wojciech Mostowski, Erik Poll
CARDIS
2008
Springer
106views Hardware» more  CARDIS 2008»
14 years 1 months ago
Secure Implementation of the Stern Authentication and Signature Schemes for Low-Resource Devices
Abstract. In this paper we describe the first implementation on smartcard of the code-based authentication protocol proposed by Stern at Crypto'93 and we give a securization o...
Pierre-Louis Cayrel, Philippe Gaborit, Emmanuel Pr...
ATVA
2008
Springer
102views Hardware» more  ATVA 2008»
14 years 1 months ago
Time-Progress Evaluation for Dense-Time Automata with Concave Path Conditions
The evaluation of successor or predecessor state spaces through time progress is a central component in the model-checking algorithm of dense-time automata. The definition of the t...
Farn Wang
ATVA
2008
Springer
87views Hardware» more  ATVA 2008»
14 years 1 months ago
Goanna: Syntactic Software Model Checking
Goanna is an industrial-strength static analysis tool used in academia and industry alike to find bugs in C/C++ programs. Unlike existing approaches Goanna uses the off-the-shelf N...
Ralf Huuck, Ansgar Fehnker, Sean Seefried, Jö...