找回密码
 To register

QQ登录

只需一步,快速开始

扫一扫,访问微社区

Titlebook: Smart Card Research and Advanced Applications VI; IFIP 18th World Comp Jean-Jacques Quisquater,Pierre Paradinas,Anas Abou Conference procee

[复制链接]
楼主: digestive-tract
发表于 2025-3-30 11:47:41 | 显示全部楼层
发表于 2025-3-30 12:37:11 | 显示全部楼层
Differential Power Analysis Model and Some Resultsstitution box against linear cryptanalysis increases..This result shows that the better shielded against linear cryptanalysis a block cipher is, the more vulnerable it is to side-channel attacks such as DPA.
发表于 2025-3-30 17:21:08 | 显示全部楼层
Place and Route for Secure Standard Cell Designsecure digital design flow to protect security applications against Differential Power Analysis attacks. Experimental results indicate that a perfect protection is attainable with the aid of the proposed differential routing strategy.
发表于 2025-3-30 23:00:48 | 显示全部楼层
发表于 2025-3-31 03:51:22 | 显示全部楼层
An Optimistic Fair Exchange Protocol for Trading Electronic Rightstocol with a trusted third-party. Since the recovery protocol doesn’t need the cooperation of the partner, fairness can be recovered without identifying or tracking the partner; one can trade vouchers securely even if the trading partner cannot be identified.
发表于 2025-3-31 07:09:46 | 显示全部楼层
Privacy Issues in RFID Banknote Protection Schemesnd modify the data stored in the smart device without optical access to the banknote. We prove also that despite what the authors claimed, an attacker can track the banknotes by using the access-key as a marker, circumventing the randomized encryption scheme that aims at thwarting such attacks.
发表于 2025-3-31 10:42:03 | 显示全部楼层
Privacy Protecting Protocols for Revokable Digital Signaturestended signatures. Our previous solution relies on a trusted third party who is able to link the issuer of the signature with the intended recipient, which may lead to severe privacy problems. In this paper we extend our framework and propose protocols that allow the user to retain her privacy with respect to this trusted third party.
发表于 2025-3-31 13:32:19 | 显示全部楼层
Card-Centric Framework - Providing I/O Resources for Smart Cardsd technologies showed only reasonable performance. To cater for performance issues, another demo system that made use of enhanced smart card technologies was implemented. It not only shows a significant improvement in performance, but also proves the feasibility of the framework in the future.
发表于 2025-3-31 19:28:59 | 显示全部楼层
On The Security of the , Primitivee attacker (as it is the case in the context of probing attacks), and using very few plaintext-ciphertext pairs..The attack methodology we describe could be applied to other data scrambling primitives exhibiting highly biased linear relations.
发表于 2025-4-1 01:16:04 | 显示全部楼层
Enforcing High-Level Security Properties for Appletsscribed as high-level security properties, stating for example that no pin verification must take place within a transaction..Behavioural interface specification languages, such as JML (Java Modeling Language), have been successfully used to validate functional properties of smart card applications.
 关于派博传思  派博传思旗下网站  友情链接
派博传思介绍 公司地理位置 论文服务流程 影响因子官网 SITEMAP 大讲堂 北京大学 Oxford Uni. Harvard Uni.
发展历史沿革 期刊点评 投稿经验总结 SCIENCEGARD IMPACTFACTOR 派博系数 清华大学 Yale Uni. Stanford Uni.
|Archiver|手机版|小黑屋| 派博传思国际 ( 京公网安备110108008328) GMT+8, 2025-5-31 23:55
Copyright © 2001-2015 派博传思   京公网安备110108008328 版权所有 All rights reserved
快速回复 返回顶部 返回列表