default search action
3rd CARDIS 1998: Louvain-la-Neuve, Belgium
- Jean-Jacques Quisquater, Bruce Schneier:
Smart Card Research and Applications, This International Conference, CARDIS '98, Louvain-la-Neuve, Belgium, September 14-16, 1998, Proceedings. Lecture Notes in Computer Science 1820, Springer 2000, ISBN 3-540-67923-5
Session 1: Electronic Money and Commerce
- Eli Biham, Amichai Shulman:
User-Defined Divisibility of Ecash and a Practical Implementation. 1-18 - Pieter H. Hartel, Jake Hill, Matt Sims:
An Operational Model of QuickPay - Extended Abstract. 19-28 - Cristian Radu, Frederic Klopfert, Jan De Meester:
Interoperable and Untraceable Debit-Tokens for Electronic Fee Collection. 29-42 - Michel Dawirs, Joan Daemen:
The Banksys Signature Transport (BST) Protocol. 43-51
Session 2: The Java Card 1
- Reto Hermann, Dirk Husemann, Peter Trommler:
The OpenCard Framework. 52-70 - Boris Balacheff, Bruno Van Wilder, David Chan:
Smartcards - From Security Tokens to Intelligent Adjuncts. 71-84 - Jean-Louis Lanet, Antoine Requet:
Formal Proof of Smart Card Applets Correctness. 85-97
Session 3: The Java Card 2
- Pui-Nang Chan, Samuel T. Chanson, Ricci S. C. Ieong, James Pang:
Smart Card Payment over Internet with Privacy Protection. 98-104 - Jean-Jacques Vandewalle, Eric Vétillard:
Developing Smart Card-Based Applications Using Java Card. 105-124 - Rüdiger Weis, Stefan Lucks:
The Performance of Modern Block Ciphers in Java. 125-133 - Didier Donsez, Gilles Grimaud, Sylvain Lecomte:
Recoverable Persistent Memory for SmartCard. 134-140
Session 4: Attacks and Dealing with Specific Threats
- David M. Goldschlag, David W. Kravitz:
Pirate Card Rejection. 141-149 - John Kelsey, Bruce Schneier:
Secure Authentication with Multiple Parallel Keys. 150-156 - Marc Girault:
Relaxing Tamper-Resistance Requirements for Smart Cards by Using (Auto-)Proxy Signatures. 157-166 - Jean-François Dhem, François Koeune, Philippe-Alexandre Leroux, Patrick Mestré, Jean-Jacques Quisquater, Jean-Louis Willems:
A Practical Implementation of the Timing Attack. 167-182
Session 5: Authentication
- Henri Gilbert:
Techniques for Low Cost Authentication and Message Authentication. 183-192 - Mark Looi, Paul Ashley, Loo Tang Seet, Richard Au, Gary Gaskell, Mark Vandenwauver:
Enhancing SESAMEV4 with Smart Cards. 193-202 - Yair Frankel, Moti Yung:
How to Say "YES" with Smart Cards. 203-212
Session 6: Cryptography and Applications
- Feng Bao:
An Efficient Verifiable Encryption Scheme for Encryption of Discrete Logarithms. 213-220 - Josep Domingo-Ferrer, Jordi Herrera-Joancomartí:
Efficient Smart-Card Based Anonymous Fingerprinting. 221-228 - Rob Jerdonek, Peter Honeyman, Kevin Coffman, Jim Rees, Kip Wheeler:
Implementation of a Provably Secure, Smartcard-Based Key Distribution Protocol. 229-235 - Joan Daemen, Vincent Rijmen:
The Block Cipher BKSQ. 236-245
Session 7: Advanced Encryption Standard
- Ross J. Anderson, Eli Biham, Lars R. Knudsen:
Serpent and Smartcards. 246-253 - Guillaume Poupard, Serge Vaudenay:
Decorrelated Fast Cipher: An AES Candidate Well Suited for Low Cost Smart Card Applications. 254-264 - Bruce Schneier, Doug Whiting:
Twofish on Smart Cards. 265-276 - Joan Daemen, Vincent Rijmen:
The Block Cipher Rijndael. 277-284
Session 8: Architectures and Designs
- Constantinos Markantonakis:
Secure Log File Download Mechanisms for Smart Cards. 285-304 - Patrick Biget:
The Vault, an Architecture for Smartcards to Gain Infinite Memory. 305-312 - William J. Caelli, Vincent Cordonnier, Anthony Watson:
A Data Driven Model for Designing Applications with Smart Cards. 313-325 - Pierre Girard:
Secure Personalization Using Proxy Cryptography. 326-335
Session 9: Efficient Implementations 1
- Jean-François Dhem, Jean-Jacques Quisquater:
Recent Results on Modular Multiplications for Smart Cards. 336-352 - Guopei Qiao, Kwok-Yan Lam:
RSA Signature Algorithm for Microcontroller Implementation. 353-356
Session 10: Efficient Implementations 2
- Alain Durand:
Efficient Ways to Implement Elliptic Curve Exponentiation on a Smart Card. 357-365 - Helena Handschuh, Pascal Paillier:
Reducing the Collision Probability of Alleged Comp128. 366-371 - Helena Handschuh, Pascal Paillier:
Smart Card Crypto-Coprocessors for Public-Key Cryptography. 372-379
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.