狂热语言 发表于 2025-3-25 06:26:01

Conference proceedings 2015d from 56 submissions. The papers are organized in topical sections on Java cards; software countermeasures; side-channel analysis; embedded implementations; public-key cryptography and leakage and fault attacks.

啤酒 发表于 2025-3-25 07:52:31

http://reply.papertrans.cn/87/8687/868618/868618_22.png

Repetitions 发表于 2025-3-25 14:37:41

Balanced Encoding to Mitigate Power Analysis: A Case Studyel. To study the practical relevance of the proposed countermeasure, it is applied to a software implementation of the block cipher Prince. This case study allows us to give realistic values for resulting implementation overheads as well as for the resulting side channel protection levels that can be achieved in realistic implementation scenarios.

surrogate 发表于 2025-3-25 18:45:27

Efficient Stochastic Methods: Profiled Attacks Beyond 8 Bitsmputationally and help the profiling phase to converge faster. We show how these ideas can also be applied to implement stochastic models more efficiently, and we also show that they can be applied and evaluated even for more than eight unknown data bits at once.

Plaque 发表于 2025-3-25 23:45:21

0302-9743 nce on Smart Card Research and Advanced Applications, CARDIS 2014, held in Paris, France, in November 2014. The 15 revised full papers presented in this book were carefully reviewed and selected from 56 submissions. The papers are organized in topical sections on Java cards; software countermeasures

彩色的蜡笔 发表于 2025-3-26 04:08:02

http://reply.papertrans.cn/87/8687/868618/868618_26.png

无脊椎 发表于 2025-3-26 06:27:29

Memory Forensics of a Java Card Dumpta structure of the card. Such a reverse engineering process is costly and prone to errors. Currently there are no tools available to help the process. We propose here an approach to find in the raw data obtained after a dump, the area containing the code and the data. Then, once the code area has b

间接 发表于 2025-3-26 12:17:19

Heap , Hop! Heap Is Also Vulnerablen was not performed, thus allowing to obtain dynamically a type confusion. To mitigate such attacks, typed stack have been introduced on recent smart card. We propose here a new attack path for performing a type confusion even in presence of a typed stack. Then we propose using a Fault Tree Analysis

向下五度才偏 发表于 2025-3-26 14:23:52

http://reply.papertrans.cn/87/8687/868618/868618_29.png

aspersion 发表于 2025-3-26 18:18:15

http://reply.papertrans.cn/87/8687/868618/868618_30.png
页: 1 2 [3] 4 5 6
查看完整版本: Titlebook: Smart Card Research and Advanced Applications; 13th International C Marc Joye,Amir Moradi Conference proceedings 2015 Springer Internationa