Sciweavers

CARDIS
2008
Springer
146views Hardware» more  CARDIS 2008»
14 years 2 months ago
Provably Secure Grouping-Proofs for RFID Tags
We investigate an application of RFIDs referred to in the literature as group scanning, in which several tags are "simultaneously" scanned by a reader device. Our goal is...
Mike Burmester, Breno de Medeiros, Rossana Motta
CARDIS
2008
Springer
153views Hardware» more  CARDIS 2008»
14 years 2 months ago
Ultra-Lightweight Implementations for Smart Devices - Security for 1000 Gate Equivalents
In recent years more and more security sensitive applications use passive smart devices such as contactless smart cards and RFID tags. Cost constraints imply a small hardware footp...
Carsten Rolfes, Axel Poschmann, Gregor Leander, Ch...
CARDIS
2008
Springer
147views Hardware» more  CARDIS 2008»
14 years 2 months ago
A Practical Attack on the MIFARE Classic
The mifare Classic is the most widely used contactless smart card in the market. Its design and implementation details are kept secret by its manufacturer. This paper studies the a...
Gerhard de Koning Gans, Jaap-Henk Hoepman, Flavio ...
CARDIS
2008
Springer
119views Hardware» more  CARDIS 2008»
14 years 2 months ago
Static Program Analysis for Java Card Applets
The Java Card API provides a framework of classes and interfaces that hides the details of the underlying smart card interface, thus relieving developers from going through the swa...
Vasilios Almaliotis, Alexandros Loizidis, Panagiot...
CARDIS
2008
Springer
117views Hardware» more  CARDIS 2008»
14 years 2 months ago
A Black Hen Lays White Eggs
Masayuki Yoshino, Katsuyuki Okeya, Camille Vuillau...
CARDIS
2008
Springer
105views Hardware» more  CARDIS 2008»
14 years 2 months ago
Fast Hash-Based Signatures on Constrained Devices
Digital signatures are one of the most important applications of microprocessor smart cards. The most widely used algorithms for digital signatures, RSA and ECDSA, depend on finite...
Sebastian Rohde, Thomas Eisenbarth, Erik Dahmen, J...
CARDIS
2008
Springer
113views Hardware» more  CARDIS 2008»
14 years 2 months ago
The Trusted Execution Module: Commodity General-Purpose Trusted Computing
This paper introduces the Trusted Execution Module (TEM); a high-level specification for a commodity chip that can execute usersupplied procedures in a trusted environment. The TEM...
Victor Costan, Luis F. G. Sarmenta, Marten van Dij...
CARDIS
2008
Springer
165views Hardware» more  CARDIS 2008»
14 years 2 months ago
Malicious Code on Java Card Smartcards: Attacks and Countermeasures
When it comes to security, an interesting difference between Java Card and regular Java is the absence of an on-card bytecode verifier on most Java Cards. In principle this opens u...
Wojciech Mostowski, Erik Poll
CARDIS
2008
Springer
106views Hardware» more  CARDIS 2008»
14 years 2 months ago
Secure Implementation of the Stern Authentication and Signature Schemes for Low-Resource Devices
Abstract. In this paper we describe the first implementation on smartcard of the code-based authentication protocol proposed by Stern at Crypto'93 and we give a securization o...
Pierre-Louis Cayrel, Philippe Gaborit, Emmanuel Pr...