04645nam 22008295 450 99646562050331620200701145228.01-280-38627-497866135641913-642-12510-710.1007/978-3-642-12510-2(CKB)2560000000009140(SSID)ssj0000446781(PQKBManifestationID)11321216(PQKBTitleCode)TC0000446781(PQKBWorkID)10498052(PQKB)10357076(DE-He213)978-3-642-12510-2(MiAaPQ)EBC3065216(PPN)149073291(EXLCZ)99256000000000914020100411d2010 u| 0engurnn|008mamaatxtccrSmart Card Research and Advanced Applications[electronic resource] 9th IFIP WG 8.8/11.2 International Conference, CARDIS 2010, Passau, Germany, April 14-16, 2010, Proceedings /edited by Dieter Gollmann, Jean-Louis Lanet, Julien Iguchi-Cartigny1st ed. 2010.Berlin, Heidelberg :Springer Berlin Heidelberg :Imprint: Springer,2010.1 online resource (X, 239 p. 78 illus.) Security and Cryptology ;6035Bibliographic Level Mode of Issuance: Monograph3-642-12509-3 Includes bibliographical references and index.Mathematical Algorithms -- The Polynomial Composition Problem inĀ (?/n?)[X] -- Enhance Multi-bit Spectral Analysis on Hiding in Temporal Dimension -- Secure Delegation of Elliptic-Curve Pairing -- Side Channel Analysis -- Side-Channel Leakage across Borders -- Designing a Side Channel Resistant Random Number Generator -- Simple Power Analysis on Exponentiation Revisited -- Atomicity Improvement for Elliptic Curve Scalar Multiplication -- Systems -- Key-Study to Execute Code Using Demand Paging and NAND Flash at Smart Card Scale -- Firewall Mechanism in a User Centric Smart Card Ownership Model -- Logical Attacks -- Combined Attacks and Countermeasures -- Attacks on Java Card 3.0 Combining Fault and Logical Attacks -- Fault Analysis -- Improved Fault Analysis of Signature Schemes -- When Clocks Fail: On Critical Paths and Clock Faults -- Privacy -- Modeling Privacy for Off-Line RFID Systems -- Developing Efficient Blinded Attribute Certificates on Smart Cards via Pairings -- On the Design and Implementation of an Efficient DAA Scheme.Security and Cryptology ;6035Computer communication systemsUser interfaces (Computer systems)Computers and civilizationData encryption (Computer science)Management information systemsComputer scienceAlgorithmsComputer Communication Networkshttps://scigraph.springernature.com/ontologies/product-market-codes/I13022User Interfaces and Human Computer Interactionhttps://scigraph.springernature.com/ontologies/product-market-codes/I18067Computers and Societyhttps://scigraph.springernature.com/ontologies/product-market-codes/I24040Cryptologyhttps://scigraph.springernature.com/ontologies/product-market-codes/I28020Management of Computing and Information Systemshttps://scigraph.springernature.com/ontologies/product-market-codes/I24067Algorithm Analysis and Problem Complexityhttps://scigraph.springernature.com/ontologies/product-market-codes/I16021Computer communication systems.User interfaces (Computer systems).Computers and civilization.Data encryption (Computer science).Management information systems.Computer science.Algorithms.Computer Communication Networks.User Interfaces and Human Computer Interaction.Computers and Society.Cryptology.Management of Computing and Information Systems.Algorithm Analysis and Problem Complexity.004.6Gollmann Dieteredthttp://id.loc.gov/vocabulary/relators/edtLanet Jean-Louisedthttp://id.loc.gov/vocabulary/relators/edtIguchi-Cartigny Julienedthttp://id.loc.gov/vocabulary/relators/edtCARDIS (Conference)BOOK996465620503316Smart Card Research and Advanced Applications773154UNISA